More

Monday, 21 December 2015

How to View Shared Folders with Computer Management

The best tool for this task is named Computer Management. You can open it in many ways. A complete tutorial can be found here: Reasons Why Computer Management Is My Favorite Administrative Tool.

On the left side of the Computer Management there is a panel with lots of sections. Go to "System Tools -> Shared Folders -> Shares".
Shared, Network Folders, List, Windows 8, Windows 7

how to View Your Shared Folders in File Explorer - Windows 8


In Windows 8, the procedure is as simple as in Windows 7:
Open File Explorer and go to the Network section. There, double click or tap your computer's name.
Shared, Network Folders, List, Windows 8

View of Shared Folders in Windows Explorer - Windows 7


The simplest method for viewing all the files you have shared is to open Windows Explorer, click Network and then the name of your computer. You will see a list with all the folders shared by your computer with the network.

Shared, Network Folders, List, Windows 7

Stop automatic Driver updates windows10

Stop automatic Driver updatesWhile it is recommended that you let make Windows download Drivers & Realistic Icons automatically, if you wish, you can stop Windows 10 / 8 from automatically installing Drivers, open Control panel > Advanced System settings > Hardware tab > Device Installation settings.

turn off or Disable Automatic App Updates in Windows 8.1


You will be required to log in to your Windows PC with your Microsoft Account. This is a must as some services like this one depend on the Microsoft Account. Once this condition is met, openWindows Store by clicking on its Tile on your Start Screen. Next open the Charms Bar and click on Settings. Now click on App updates.
windows 8.1 app updates
Here you will see the setting: Automatically update my apps.
turn off automatic app updates windows 8.1
It will be enabled by default. If you wish to turn off or disable automturn off automatic app updates windows 8.1

Sunday, 20 December 2015

Block unwanted Windows Updates in Windows 10


block-unwanted-windows-updates-windows-10In case, for some reason you wish to hide or block unwanted Windows Update on your Windows 10 computer, you can use the Show or Hide Updates tool from Microsoft.
Once you have downloaded the standalone package from Microsoft, run it.
Click on Next to proceed.
The Show or Hide Updates tool will scan your system for updates.
show or hide updates

windows10 dreg and drop

People usually press the right button of mouse to open the context menu,

Maximize Or Close The Window

mouse tricks
mouse tricks

This is actually quite a common mouse trick but I find it worth adding in my list of useful mouse tricks. If you want to close a Window just double-click on the Windows Logo on top left corner of your Window.
To maximize or restore the Window, double-click your mouse on the title bar.

windows 10 Select Vertical Text Using [ALT] Key

it is very funny tricks for you.

so are you ready?

mouse tricks
Do you know how to select the text vertically? It’s very easy, just press and hold the [ALT] key and select the text using left button of your mouse.
I must mention here that this trick too doesn’t work on online pages. You can use this trick too only on your Microsoft Office documents only.

Mouse Tricks For Windows

 I am going to tell you about some of the mouse tricks which I often use, to make life on the computer much easier.

WINDOWS10 Create a folder without any icon

Create a folder without any icon
HERE we will learn  how to create a folder without any icon. We will see how it is done in Windows 10, but the procedure is the same in earlier Windows versions

WINDOWS10 Basic Notepad Tips and Tricks for Windows users


The humble Notepad in Windows is one of the most used  programs. It is a very basic text editoryou can use for simple documents. Let us have a look at some notepad tips and tricks.

Notepad Tips and Tricks

Monday, 14 December 2015

Hack Mobile Number.

Welcome,This is my First post about mobile hacking,In this post,We are going to create any mobile number (police,fire department,ex-girlfriends,etc) and send messages,Sure this method has only 75% success rate,but it works like a charm for the most time.In spoofing attack the attacker (you)  make himself a source or desire address.This post is only for education purposes,and this trick 
can be traced back to the source very easily,So don't create a scene.



So What Do WE Need :

#SET-Social Engineering Toolkit, Available On Backtrack. 
#Brain-To Sense what is wrong and what is right,And to follow this procedure.

how to hack website by sqlmap and backtrack.



real hackers point
In this tutorial, we will learn how to Find a vulnerable Link in a website, Exploit that link by SQL Injection and taking total control over any website,This includes access to usernames and passwords database, 


What Do We Need For This Attack ?

# Backtrack 5 (Would work On Windows Too,Just find a sql injecting software)
# SQLMAP - Automatic SQL injection and database takeover tool (Included in Backtrack)
# Internet Access

Windows 7 with Metasploit using Kali Linux

Today i am gonna show how to exploit any windows OS using metasploit. Exploiting a windows vulnerability to logging  into the system with out username and password using Metasploit.

Before Hacking, you want to know about metasploit framework. If your are new one to hacking, its less possible to know about Metasploit.


Metasploit  Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development.

Its best-known sub-project is the open source Metasploit Framework, a tool for developing and executing exploit code against a remote target machine. Other important sub-projects include the Opcode Database, shellcode archive and related research.

The Metasploit Project is well known for its anti-forensic and evasion tools, some of which are built into the Metasploit Framework.

Friday, 11 December 2015

WireShark

WireShark

WireShark

This list wouldn’t be complete without the ever popular WireShark. WireShark is an interactive network protocol analyzer and capture utility. It provides for in-depth inspection of hundreds of protocols and runs on multiple platforms.

Xirrus Wi-Fi Inspector

 Xirrus Wi-Fi Inspector

XirrusWiFiInspector
Xirrus Wi-Fi Inspector can be used to search for Wi-Fi networks, manage and troubleshoot connections, verify Wi-Fi coverage,

WirelessNetView

WirelessNetView

WirelessNetView

WirelessNetView is a lightweight utility (available as a standalone executable or installation package) that monitors the activity of reachable wireless networks and displays information related to them, such as SSID, Signal Quality, MAC Address,

Advanced IP Scanner

AdvancedIPScanner

 

Advanced IP Scanner is a fast and easy to use network scanner that detects any network devices (including wireless devices such as mobile phones, printers and WIFI routers) on your network. It allows you to connect to common services such as HTTP, FTP and shared folders if they are enabled on the remote machine. You are also able to wake up and shut down remote computers.

P2 eXplorer Free

20

P2 eXplorer Free

P2 eXplorer is a forensic image mounting tool that allows you to mount a forensic image as a physical disk

forensics NetSleuth

19

NetSleuth is a network forensics analysis tool that identifies devices on your network. It operates in ‘live’ mode (where it will actively capture network packets and interpret device information) or in ‘offline’ mode where it will process a PCAP file that you import.

Computer Forensics HELIX3 Free

18

HELIX3 Free

HELIX3 is a Live CD based on Linux that was built to be used in Incident Response, Computer Forensics and E-Discovery scenarios.

digital forensic PlainSight

PlainSight

16
PlainSight is a Live CD based on Knoppix (a Linux distribution) that allows you to perform digital forensic

Mandiant RedLine

15

Mandiant RedLine

RedLine offers the ability to perform memory and file analysis of a specific host

Digital Forensic Framework

14

Digital Forensic Framework

The Digital Forensics Framework (DFF) is a digital forensic investigation tool and a development platform that allows you to collect, preserve and reveal digital evidence.

LastActivityView

13

LastActivityView

I briefly touched on LastActivityView when pointing out the NirSoft suite of tools in my Top 10 Free System Troubleshooting Tools for SysAdmins article.

Network Forensic Analysis Tool

12
Xplico is an open source Network Forensic Analysis Tool (NFAT) that aims to extract applications data from internet traffic
(e.g. Xplico can extract an e-mail message from POP, IMAP or SMTP traffic). Features include support for a multitude of protocols (e.g. HTTP, SIP, IMAP, TCP, UDP), TCP reassembly, and the ability to output data to a MySQL or SQLite database, amongst others.

12 Xplico

Once you’ve installed Xplico, access the web interface by navigating to http://<IPADDRESS>:9876 and logging in with a normal user account. The first thing you need to do is create a case and add a new session. When you create a new session you can either load a PCAP file (acquired from Wireshark for example) or start a live capture. Once the session has finished decoding, use the navigation menu on the left hand side to view the results.

forensic DEFT

11
DEFT is another Linux Live CD which bundles some of the most popular free and open source computer forensic tools available. It aims to help with Incident Response, Cyber Intelligence and Computer Forensics scenarios.

10 Bulk Extractor

10 Bulk Extractor

10
bulk_extractor is a computer forensics tool that scans a disk image, file, or directory of files and extracts
information such as credit card numbers, domains, e-mail addresses, URLs, and ZIP files. The extracted information is output to a series of text files (which can be reviewed manually or analysed using other forensics tools or scripts).
Tip: Within the output text files you will find entries for data that resemble a credit card number, e-mail address, domain name, etc. You will also see a decimal value in the first column of the text file that, when converted to hex, can be used as the pointer on disk where the entry was found (i.e. if you were analysing the disk manually using a hex editor for example, you would jump to this hexadecimal value to view the data).
Bulk_extractor comes as a command-line tool or a GUI tool. In the example above I set the bulk extractor tool to extract information from a forensics image I took earlier and output the results to a folder called “BE_Output”. The results can then be viewed in the Bulk Extractor Viewer and the output text files mentioned above.

Free Hex Editor Neo

9
Free Hex Editor Neo is a basic hex editor that was designed to handle very large files.

Oxygen Forensic Suite 2013 Standard

If you are investigating a case that requires you to gather evidence from a mobile phone to support your case, Oxygen Forensics Suite (Standard Edition) is a tool that will help you achieve this. Features include the ability to gather Device Information (Manufacturer, OS Platform, IMEI, Serial Number, etc.), Contacts, Messages (Emails, SMS, MMS, etc.) and recovery of deleted messages, Call Logs, and Calendar and Task information. It also comes with a file browser which allows you to access and analyse user photos, videos, documents and device databases.
5

CAINE (Computer Aided INvestigative Environment)

CAINE

CAINE (Computer Aided INvestigative Environment) is Linux Live CD that contains a wealth of digital forensic tools. Features include a user-friendly GUI, semi-automated report creation and tools for Mobile Forensics, Network Forensics, Data Recovery and more.
4

Linux ‘dd’

dd comes by default on the majority of Linux distributions available today (e.g. Ubuntu, Fedora). This tool can be used for various digital forensic tasks such as forensically wiping a drive (zero-ing out a drive) and creating a raw image of a drive.
Note: dd is a very powerful tool that can have devastating effects if not used with care. It is recommended that you experiment in a safe environment before using this tool in the real world.
Tip: A modified version of dd is available from http://sourceforge.net/projects/dc3dd/ – dc3dd includes additional features that were added specifically for digital forensic acquisition tasks.
3

To use dd, simply open a terminal window and type dd followed by a set of command parameters (which command parameters will obviously depend on what you want to do). The basic dd syntax for forensically wiping a drive is:
dd if=/dev/zero of=/dev/sdb1 bs=1024

where if = input file, of = output file, bs = byte size
Note: Replace /dev/sdb1 with the drive name of the drive you want to forensically wipe and 1024 with the size of the byte blocks you want to write out.
The basic dd syntax for creating a forensic image of a drive is:
dd if=/dev/sdb1 of=/home/andrew/newimage.dd bs=512 conv=noerror,sync
where if = input file (or in this case drive), of = output file, bs = byte size, conv = conversion options
Tip: For additional usage info, from a terminal window, type “man dd” without quotes to bring up the help manual for the dd command.

downloade here FTK Imager


FTK Imager is a data preview and imaging tool that allows you to examine files and folders on local hard drives, network drives, CDs/DVDs, and review the content of forensic images or memory dumps. Using FTK Imager you can also create SHA1 or MD5 hashes of files, export files and folders from forensic images to disk, review and recover files that were deleted from the Recycle Bin (providing that their data blocks haven’t been overwritten), and mount a forensic image to view its contents in Windows Explorer.
Note: There is a portable version of FTK Imager that will allow you to run it from a USB disk.
2

SANS Investigative Forensic Toolkit

click here SANS SIFT

The SANS Investigative Forensic Toolkit (SIFT) is an Ubuntu based Live CD which includes all the tools you need to conduct an in-depth forensic or incident response investigation. It supports analysis of Expert Witness Format (E01), Advanced Forensic Format (AFF), and RAW (dd) evidence formats. SIFT includes tools such as log2timeline for generating a timeline from system logs, Scalpel for data file carving, Rifiuti for examining the recycle bin, and lots more.
01 SANS SIFT

Wednesday, 9 December 2015

WEBCAM



This trick is used to hack WEBCAM of Yahoo messenger. You can view the other persons on their Yahoo WEBCAM without their knowledge, who always keep denying your CAM request.The only drawback of this trick is,you need physical access to the target computer(to store a files in target computer) whose CAM you want to hack.

Steganography?

What is Steganography?

Steganography is a way or lets say technique of encoding hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message.
In this post,I have presented the software name Our Secret, which hide your private data in the other file.

webcamlock


webcam looker by nerdprogrammer
The webcam looker turns your computer into a comprehensive powerful video security system to keep an eye on your home,business,school,etc where webcams or cctvs and other video capturing devices are available. Webcam looker is a Surveillance software which provides you the features to capture images and videos from analogue or digital cameras.
Webcam looker supports various numbers of video making devices(ie video sources).You can checkout images and videos from all cameras by simultaneously changing the cameras from main application window.
Webcam looker has a highly optimized motion detection feature available in it.
As soon as the motion is detected in monitoring area,the program generates an alert so that you get alert.
webcam looker by nerdprogrammer
Webcam Looker video surveillance software allows you to choose any 12 of alerting actions like sending email with attached image to your registered email address,short messaging service(sms),Skype,archiving and then saving video and snapshots to your system,sound an alert alarm,upload captured images to the Internet via FTP or HTTP and much more.

Click To Download WEBCAMCOOKER.

stealth program


What is Computer Virus?
A computer virus is a stealth program that is injected into your computer without your knowledge and runs against your wishes and frustrate you some time. Viruses can also replicate themselves. All computer viruses are man-made.A virus can replicates itself by being copied or initiating its copying to another program, computer boot sector or files,etc.Some viruses are also used to get useful information of users like credit card details,email-id passwords,etc.
In this post i am sharing "Deadlines Virus Maker" with you all.This software will help you out to make some computer viruses easily.

Features Deadlines Virus Maker:




  1. Show message box at Windows Start-up.
  2. Can be added to Start-up.
  3. Close Widows Live Messenger.
  4. Close Skype.
  5. Close Yahoo Messenger.
  6. Random things happens to computer.
  7. Infinite Beeping.
  8. Infinite Message Boxes.
  9. Disconnect from the Internet.
  10. Disable Firewall.
  11. Disable Browser(Chrome,Firefox & IE).
  12. Open Random files.
  13. Force Shutdown.
  14. Disable Task Manager.
  15. Disable Command Prompt.
  16. Disable Reg-edit.
  17. Disable Windows Explorer.
  18. Randomly Move Mouse.
  19. Press Keyboard keys Randomly.
  20. Slow Computer.
  21. Force Restart.
  22. Crazy CD Drive.
  23. Disable Mouse.
  24. Delete Clipboard Text.
  25. Kill every process.
  26. Disable Calculator.
  27. Disable Notepad.
  28. File Pumper.
  29. File Binder.
  30. Extension Spoofer.
  31. Visit random URL at random time.

Prevent v1.0

Prevent cut, paste, copy, delete, re-naming of files & folders using this cool application Prevent v1.0
Prevent v1.0 is a freeware application which runs on all Windows Operating System. The installer in downloading package when run will only places the Prevent 1.0 folder in the system Program Files
folder.
Sometimes you don't want that anyone won't cut,copy,past,delete or rename your files or folder's in your computer,for this Prevent v1.0 is a perfect freeware application as no one will ever know what wrong with your computer while they try to cut,copy,past,delete or rename your files or folder's on your computer.
If you don't want anyone deleting or renaming or messing around with you data, then Prevent may be able to help you alot.

The downloading package contains following files:

  1. Prevent Setup.
  2. Read Me file.
  3. Uninstall.
To install the program, click on Prevent.exe.Once,accept the term's and conditions and wait till it gets installed.Once installation is completed,open Prevent and then Set your Hotkey to and click on activate to start the Prevent operation.Remember your saved hotkey as to stop Prevent.exe you will need to press that hotkey. You may set hotkey as Ctrl+P if you wish. The default hotkey are Win+F8 to kill Pre_1 and Win+F9 to kill Pre_2. But the single hotkey set by you will kill both processes at the same time.

Prevent can perform the  following operations :

1. Stops Cut.
2. Stops Paste.
3. Stops Copy.
4. Stops Delete.
5. Stops Copy To.
6. Stops Move to.
7. Stops Send To.
8. Prevents renaming.
9. Disables Task Manager-End Process button. Also it doesn't allow you to right click on process name and click on end process.It also grays out the context menu item or stops the process.
NOTE:To uninstall or remove Prevent, use the Uninstaller situated in the Prevent folder or simply delete its Program folder.

android rat


AndroRat is a client/server application developed in Java Android for the client side and in Java/Swing for the Server.
The name AndroRat is a mix of Android and RAT (Remote Access Tool).
The goal of the application is to give the control of the android system remotely and retrieve information from it.


Tuesday, 8 December 2015

Undetectable Keylogger Code in C++ :




Things Required :Image result for C

-Download and Install Dev-cpp Compiler.You can download file Form Here.
-Basic Knowledge of DOS and C++

Following is Source Code For Keylogger:

#include <windows.h>
#include <stdio.h>
#include <winuser.h>

#define BUFSIZE 80

int test_key(void);
int create_key(char *);
int get_keys(void);

Sunday, 29 November 2015

How To Unblock Or hack Cyberoam To Access The Blocked Sites 2013 Tricks

Recently Our College has uploaded the Cyberoam client on the college server and we cannot access 90% sites through this whatever the site we want to open it says it was blocked by ur Administrator... what the f*ck sites like opera and firefox are blocked.Really ROFL  After Got fked up from this I am giving you all the Detailed and 100% working Hack for cyberoam and how to unblock any site in college as Most of the colleges have cyberoam Installed


WHAT IS CYBEROAM ??

Cyberoam’s all-inclusive UTM solution offers a well-coordinated defense through tightly integrated best-of-breed security solutions over a single interface -Stateful inspection firewall, VPN, gateway anti-virus, gateway anti-spam, gateway anti-malware, intrusion prevention system (IPS), content filtering, bandwidth management (QoS), multiple link management and enhanced user-based reporting.
That means it maintains records "Who is Doing What" ?


HOW TO UNBLOCK CYBEROAM TO ACCESS BLOCKED SITES ??

Deep Web Links 2015 - ONION Links

ALL HACKERS READY ??

Tested all of the below .onion links (+pastebin). The PDF only contains 100% working links and is 9 pages long.  YOU CAN DOWNLOAD IT HERE



OR you look at these:

Link 1
Link 2
Link 3
Link 4

2014
Link 5
LINK 6



Hidden Wikis

  • The Hidden Wiki - The original Hidden Wiki (after Matt's), owned by ion. Created January 2009. Went down for a while but it's back up now. A bit outdated.
  • Hidden Wiki Mirror - An exact mirror of ion's Hidden Wiki. Updated on a fairly regular basis.
  • HackBloc's Hidden Wiki Mirror - An editable up-to-date Hidden Wiki. Generally free from vandalism.
  • Old THW Mirror - Hasn't been updated for 8 months.
  • Older THW Mirror - An old Hidden Wiki mirror. Outdated.


Directories



Search Engines

  • Grizzly Search Engine - New search engine. Currently needs javascript to work, will soon make a non-JS version.
  • TORCH - Tor Search Engine. Claims to index around 1.1 Million pages.
  • Deepsearch - Another search engine.
  • Torgle - Torgle revived. Based on OnionWare's server. Web crawler.
  • The Abyss - Administrator's search engine. Supports submitted links.
  • Ahmia.fi - Clearnet search engine for Tor Hidden Services (allows you to add new sites to its database).
  • DuckDuckGoclearnet - Clearnet metasearch engine with heavy filtering. Not like the aforementioned search engines to look up Hidden Services. Just searches the clearnet.

Starting Places

Related Hacking Stuff

link-2 =kali linux

File Sharing

  • TorShare - 2GB file upload limit. No illegal files. Server encrypts filenames. Allows zip and rar files.
  • Sky Fortress - Open source, upload and download encrypted files.
  • The Onion Cloud - Tor/ownCloud based cloud. Login/Pass: public/public.
  • TOR Upload Service - Allows files up to ~10GB, uses javascript/flash.
  • Onion Fileshare - 2GB Upload file size limit. Upload any files you want.
  • ES Simple Uploader - Upload images, docs and other files. 2 MiB upload limit. (Host: FH)
  • sTORage - Upload files. Has WebDAV support. It is being taken down. Please move any files you may host there.
  • Onionweb filehosting - ~100mb file size limit, only accepts archive files; no illegal files.

Image Hosting

  • Magic Mirror - Open source, encrypted image hosting - you can only see files if you are linked to them - NO CP.
  • bittitclearnet - Host and sell your original pictures for Bitcoins.
  • SquareBoard - Upload and share high quality images. (Moderated)

PasteBins

  • anonHTML - anonymous plaintext and (rendered) HTML hosting
  • AnonPaste - minimalist, opensource online pastebin; the server has no knowledge of pasted data. Data is encrypted/decrypted in the browser using 256 bits AES.
  • pad.riseup.netclearnet - Etherpad service from Riseup
  • BlackBin - Uncensored, open source pastebin

Hosting


View the Webhost Comparison for a bit more information.

  • Freedom Hosting (More info) - Invite-only. Hosting Service with PHP/MySQL. As of 2011-06-04, it hosts about 50% of the live OnionWeb by onion. UPDATE 2011-06-05, probably owns a lot more than that now. Likely owns around 75% of OnionNet.
  • ANONSERVER - Paid-for. Tor web hosting, provides FTP/SSH. Down?
  • torhost.onion - Free anonymous web hosting. Has a free plan, and a free "fairpaid" plan -- useful services will get more bandwidth, web space, etc.
  • OnionHosting - Paid-for, no CP. Run by the administrator of several other services. High prices and very flexible.
  • Pachinco's WebHosting Service - Free, no CP. Contact the administrator for hosting. Allows the following scripts: FlatPress, PunBB, SMF, and gpEasy.

Forums and BBS

Other forum types. Usually phpBB.

Communications

See also: The compendium of clearnet Email providers
  • SMS For Tor - Encrypted private messaging service
  • Startbook - online management of your bookmarks/favorites
  • Hell Online - "The Anti-social Network" - Seems to be a type of Twitter clone.

Politics


  • Libreria - Libreria: Varios libros disponibles de diferentes autores en inglés y espa?ol. (English and spanish, mostly political)