Tuesday, July 1, 2014

DOWNLOAD IDM 6.20 WITH CRACk + Serial Keys

Internet Download Manager gives you the tools to download many types of files from the Internet and organize them as you see fit. You can categorize each file as you download it, and then access all downloads right from the app's main interface.

DOWNLOAD IDM 6.20 WITH CRACk + Serial Keys

How To Crack IDM 6.20 tutorial :

Sunday, December 29, 2013

Internet download manager 6.18 clean patch (idm 6.18 crack)

Hello H4x0rs today i will share with you  the easiest method to register idm 6.18  using a crack basically you don't need any skills to do this just follow the steps :

Step 1 :
Download IDM 6.18 from the offical site here
Download  Patch IDM 6.18 Build 7 here 
Total virus report 
Step 2:
install the IDM 6.18
Registre IDM with One of the  

following Keys:
close IDM 6.18 application or CTRL+ALT+DEL and terminate IDMan.exe processeur
Step 3 :
extratct Patch file anywhere your PC  
then run Patch IDM 6.18 Build 7.exe as administarator

Now click on installer .
Congratulations Now You have IDM 6.18 full version !!

please if you have any questions or suggestions post it in this topic and i will see what i can do :) ,
and if you need the serial method click here

Version  6.19 Build 9 :

Sunday, December 1, 2013

Download PuTTY SSH and telnet client

PuTTY is an SSH and telnet client, developed originally by Simon Tatham for the Windows platform. PuTTY is open source software that is available with source code and is developed and supported by a group of volunteers.
You can download PuTTY here.
Download Pagehttp://www.chiark.greenend.org.uk/~sgtatham/putty/download.html
File size196 kb
Operating SystemWindows 2000/XP/Windows 7/windows 8

Download Advanced Port Scanner

Very small size, fast and simple for use port scanner . Just type IP Addresses of the computer or you can scan a range ,  and you´ll get detailed descriptions for common ports.
this software is similar to Angry Ip scanner 

File size426 KB
Operating SystemWindows 95/98/ME/NT4.0/2000/XP/2003/Vista/2008


Monday, November 4, 2013

Download Instant PDF Password Remover v3.0 tools for free

Instant PDF Password Remover is the FREE tool to instantly remove Password of protected PDFdocument. It can remove both User & Owner password along with all PDF file restrictions such as Copy, Printing, Screen Reader etc.

Often we receive password protected PDF documents in the form of mobile bills, bank statements or other financial reports. It is highly inconvenient to remember or type these complex and long passwords.

'Instant PDF Password Remover' helps you to quickly remove the Password from these PDF documents. Thus preventing the need to type these complex/long password every time you open such protected PDF documents.

Note that it cannot help you to remove the unknown password. It will only help you to remove the KNOWN password so that you don't have to enter the password everytime while opening the PDF file.

It makes it even easier with the 'Right Click Context Menu' integration. This allows you to simply right click on the PDF file and launch the tool. Also you can Drag & Drop PDF file directly onto the GUI window to start the password removal operation instantly.

It can unlock PDF document protected with all versions of Adobe Acrobat Reader using different (RC4, AES) encryption methods. 

Saturday, October 19, 2013

Hacking and Security Tools for Beginners and Elite - Complete Tool Kit

Here is this post I have listed out few of the frequently and widely used Tools used by Hackers of all levels.But one thing i would like to mention is that "Hackers make tool but tool do not make Hackers"If you depend more on tools then you cannot evolve as a hacker rather you will be surrounded by tools and dependent on them.

1.Password Cracking Tools:

a) John the ripper-http://www.openwall.com/john/

b) THC hydra-http://www.thc.org/thc-hydra/

c) Brutus-http://www.hoobie.net/brutus/

d) L0PhtCrack-http://www.l0phtcrack.com/

e) SAMInside-http://insidepro.com

f) Cain and abel-http://www.oxid.it/cain.html

g) Pwdump-http://www.foofus.net/fizzgig/pwdump/

2.Pentesting Tools:

a) Metasploit framework- http://www.metasploit.com/

b) Canvas- http://www.immunitysec.com/products-canvas.shtml

3.Sql injector Tools:

a) Sqlihelper

b) Havij

c) SQL Exploiter

4.Website Vulnerability Scanner:

a) Acunetix- http://www.acunetix.com/

b) Rational appscan- http://www.ibm.com/software/awdtools/appscan/

5.Vulnerability Scanner:

a) Nessus-http://www.nessus.org/

b) Retina-http://www.eeye.com/html/Products/Retina/index.html

c) Sara-http://www-arc.com/sara/

6.Port Scanner:

a) Nmap- http://nmap.org/

b) Angry Ip scanner- http://www.angryziber.com/ipscan/

c) Super Scan- http://www.foundstone.com/us/resources/proddesc/superscan.htm

7.Intrusion detection Tools:

a) Snort-http://www.snort.org/

b) Sguil-http://sguil.sourceforge.net/

8.Live CDs:

a) Ophcrack- http://ophcrack.sourceforge.net/

b) Backtrack- http://www.backtrack-linux.org/

c) Hiren’s boot cd- http://www.hiren.info/pages/bootcd

d) Ultimate boot cd- http://www.ultimatebootcd.com/

9.Wireless Tools:

a) Wireshark- http://www.wireshark.org/

b) Kismet-http://www.kismetwireless.net/

c) Aircrack- http://www.aircrack-ng.org/

d) Netstumbler- http://www.stumbler.net/

10.Steganography Tools:

A list of  few "STEGANOGRAPHY TOOLS " free to DOWNLOAD.

11.IP Tracing Tools:

a) Neo Trace- http://www.networkingfiles.com/neotrace/

b) Visual Trace-http://www.visualiptrace.com

12.Software Cracking Tools:

a) Debuggers-OllyDbg,WinDbg

b) Unpackers-QUnpack

c) DisAssemblers-WIN32Dasm

d) Decompilers-Boomerang,Mocha,JAD

e) Hex Editors-Hexworkshop,Hview, HxDSetupEN

A list of few "REVERSE ENGINEERING" tools free to Download.

13.Virtual Enviroment Software:

a) Vmware- http://www.vmware.com/

b) Virtual box- http://www.virtualbox.org/

c) Sandboxie- http://www.sandboxie.com/

Friday, October 18, 2013

[Resolver v1.0.9] The reverse/bruteforce DNS lookup

Resolver is a windows based tool which designed to preform a reverse DNS Lookup for a given IP address or for a range of IP’s in order to find its PTR. Updated to Version 1.0.3 added dns records brute force.

Resolver features:

  • Resolve a Single IP
  • Resolve an IP Range
  • Resolve IP’s provided in a text file
  • Export Results to a text file
  • Copy results to Clipboard
  • DNS Records brute force

Change (Spoof) MAC Address on Windows 2000, XP, 2003, VISTA, 2008, Windows 7

Method 1:
This is depending on the type of Network Interface Card (NIC) you have.  If you have a card that doesn’t support Clone MAC address, then you have to go to second method.
    1. Go to Start->Settings->Control Panel and double click on Network and Dial-up Connections.
    2. Right click on the NIC you want to change the MAC address and click on properties.
    3. Under “General” tab, click on the “Configure” button
    4. Click on “Advanced” tab
    5. Under “Property section”, you should see an item called “Network Address” or "Locally Administered Address", click on it. (See figure below as an example)

    6. On the right side, under “Value”, type in the New MAC address you want to assign to your NIC.  Usually this value is entered without the “-“ between the MAC address numbers.
    7. Goto command prompt and type in “ipconfig /all” or “net config rdr” to verify the changes.  If the changes are not materialized, then use the second method.
    8. If successful, reboot your systems.

Method 2:
This method requires some knowledge on the Windows Registry.  If you are not familiar with Windows Registry, just use the simple-to-useSMAC MAC Address Changer to change the MAC addresses (the easiest and safest way,) or consult with a technical person before you attempt on the following steps.  Also, make sure you have a good backup of your registry.
1.     Goto command prompt and type “ipconfig /all”, and
    I. Record the Description for the NIC you want to change.
    II. Record the Physical Address for the NIC you want to change.  Physical Address is the MAC Address

figure 1.
2.     Goto command prompt and type “net config rdr”, and you should see something like
figure 2.
3.     Remember the number between the long number (GUID) inside the { }.  For example, in the above “net config rdr” output, for MAC address “00C095ECB793,” you should remember {1C9324AD-ADB7-4920-B02D-AB281838637A}.  You can copy and paste it to the Notepad, that’s probably the easiest way.  (See figure 2.)
4.     Go to Start -> Run, type “regedt32” to start registry editor.  Do not use “Regedit.”
5.     Do a BACKUP of your registry in case you screw up the following steps.  To do this
  1. Click on “HKEY_LOCAL_MACHINE on Local Machine” sub-window
  2. Click on the root key “HKEY_LOCAL_MACHINE”. 
  3. Click on the drop-down menu “Registry -> Save Subtree As” and save the backup registry in to a file.  Keep this file in a safe place.
6.    Go to “HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002BE10318}.  Double click on it to expand the tree.  The subkeys are 4-digit numbers, which represent particular network adapters.  You should see it starts with 0000, then 0001, 0002, 0003 and so on.  (See figure 3.)
Figure 3.
7.     Go through each subkey that starts with 0000.  Click on 0000, check DriverDesc keyword on the right to see if that's the NIC you want to change the MAC address.  The DriveDesc should match the Description you recorded from step (a.-I.).  If you are not 100% sure about the DriverDesc, then you can verify by checking if the NetCfgInstanceID keyword value matches the GUID from step (c).
If there is no match, then move on to 0001, 0002, 0003, and so on, until you find the one you want.  Usually 0000 contains the first NIC you installed on the computer.
In this demonstration, 0000 is the NIC I selected. (See figure 3.)
8.     Once you selected the subkey (i.e. 0000), check if there is a keyword "NetworkAddress" exist in the right side of the window.(See figure 3.)
    I. If "NetworkAddress" keyword does not exist, then create this new keyword:
        i. Click on the drop down menu “Edit -> Add Value”.
        ii.  In the Add Value window, enter the following value then click OK.  (See figure 4.)
            Value Name: = NetworkAddress
         Data Type: = REG_SZ 
            Figure 4.
        iii.  String Editor window will pop up at this time (see figure 5.)  
        iv.  Enter the new MAC address you want to modify.  Then click OK.
        (There should not be any "-" in this address.  Your entry should only consist of 12 digits as seen in the figure 5.)
    II. If "NetworkAddress" keyword exists, make sure it shows the keyword type is REG_SZ, and it should show asNetworkAddress:REG_SZ:  .  This keyword might not have a value at this time.  
        i. Double click on the keyword NetworkAddress and the String Editor window will pop up. (See Figure 5.)
        ii.  Enter the new MAC address you want to modify.  Then click OK.
        (There should not be any "-" in this address.  Your entry should only consist of 12 digits as seen in the figure 5.)
        Figure 5.

9.     There are 2 ways to make the new MAC address active.  Method I does not require a system reboot:
    I.  Goto Start->Setting->Control Panel, and double click on "Network Neighborhood".
    WARNING: Make sure you understand that you WILL lose the network connection after completing step "ii." below, and
    if you have a DHCP client, you will get a new IP address after completing step "iii."
        i.  Select the Network Adaptor you just changed the MAC address.
        ii.  Right click on the selected Network Adaptor and click "Disable."
       Verify the status column for this adaptor changes to "Disabled"
        iii.  Right click on the selected Network Adaptor and click "Enable."
       Verify the status column for this adaptor changes to "Enabled"
        iv.  If for any reason it cannot be disabled or re-enabled, you have to
        reboot your system to make the changes effective.
    II.  Reboot your Windows system. 
10.  Once completing step j (if rebooting the system, wait until the reboot is completed), go to command prompt, type “ipconfig /all” to confirm the new MAC address.

Few Online Tools for Computer and Online Security

Computer security is of foremost importance these days even more than our physical security..lol.There are few online tools available through which we ensure our security to certain extent.We cannot say our PC will be 100% secure but to some extent we will be benefited  for sure.
(if you are looking for Antiviru software Click here)
File scanner:

It can used to scan files upto size 1mb and archieve file(zip,arj format etc) upto 1mb.The database is updated every 3 hours to ensure that newest virus are detected.

Here you can scan a single file each time and that should not be more than 16mb.

Here you can scan a file upto 20mb.You can send file by SSL and via email also.

Here you can scan file upto 20mb,where the file will be scanned by 24 antivirus engine and is one of the best online scanning tool.

System scanner:

It can scan your PC ,system memory,boot sector.It can be used without uninstalling the existing security product.

It can be used to scan the system.It is the one of the old Anti-virus company and easy to use.

Administrative previleges is required to use this online scanner.It is user friendly and operates from the browser.

You need the activex control to use this online tool.It is a good product from panda.

Browser scanner:

You need to install the required plugin to use this tool.It checks for vulnerability and issues in the browser.

It scans for browser functionality and issues.

It will scan the browser for issues and vulnerabilites.You need to close all other tabs before using it and enable persistent cookies.

It test your browser and give scores for uniqueness and trackable functionality.

Url scanner:

It scans the url with multiple antivirus engine.It is simple to use.

Just copy and drop the suspicious url and press enter.

It is a simple tool to use as the file scanner of it.

It scan the link from potential threats with a simple click.

Port scanner:

It scans the Ipaddress for open ports.There is a list of some essential ports on the webpage.

It is one of the best port scanning tool and easy to use.

It scans an Ipaddress for open and closed TCP ports.

Here you can scan for ports to test the strength of your firewall.

It provide a range of ports to scan and list of some essential ports.

If you find this post useful and interesting then do drop your comment.,it will be appreciated.. :)

Http Tunneling | Bypass firewall and proxy

In most of the institutions and companies due to security risk many restrictions are being imposed on network like blocked ports etc.There are many ports that are blocked for outbound connection and few ports for http connection are opened so that people working over there can access there email etc.As the http port outbound is opened so it can be used for http tunnel to access restricted applications like IM etc.In this post we will see how we can do that.
What is Http Tunnel?
It is a technique in which the communications that are restricted in the network are bundled within the http protocol and allowed to communicate.The user uses a httptunnel software with client-server but to use it with administrative privileges.

How it works?
The user need a http_Tunnel-client and a server other than the original client-server.What happens that when the original_client decides to connect to a desire server then it sends its request through the httptunnel_client to the httptunnel_server then to the original_server as shown in the figure below.

 Actually the restrcited application that is the client(in the figure) sends a request other than http through the httptunnel_client bundle inside the http request.Then the httptunnel_server receives its unwrap,decrypt,uncompress it and forward it to the original server in the same way the data is transferred.The main concept over here is that there is middle (client-server) other than the orginal client-server.

1.Undo restrictions on applications like instant messengers etc

2.Helpful in accessing restrcited pages and sites.

3.May be helpful in bypassing firewall  restriction but not in an extensive manner.

Lets see how we can use http tunneling.

Http Tunneling Software:




4.Super Network Tunnel(Download)



1.Http Tunneling Software(Client-server)

2.Administrative Previlage.


Step 1.
Here I have used the soft named HttpTunnel for tunneling with both server and client.Download and install it.

Step 2.
Now click on the client and server part of it and you can use port mapping or socks5 for connecting throught the client.

Step 3.
Here I have used Rediff bol as a restricted application and socks5 for connecting.As you set the settings click on "Test" to see if it could connect ot the server,if it is successful then proceed as shown below.

Http tunnel in the network can be still detected by analysing the data and packets in the network.On more thing is that http connections last for less interval of time but since in http tunnel with tcp protocol bundled in side it may last for extended period of time so it may create a suspicion in the mind of the network admininstrator.

[SuperPutty Password Decryptor] SuperPutty Session Login Password Recovery Software

SuperPutty Password Decryptor is the Free desktop tool to instantly recover all the login passswords from SuperPutty session history.

SuperPutty is a Windows GUI Application that allows PuTTY SSH Client to be opened in Tabs. It also stores the session details allowing users to automatically login without entering the password every time.

SuperPutty Password Decryptor helps you to quickly recover all the stored login passwords from this session file. It also automatically detects SuperPutty session file for the current user and displays it. Alternatively, you can also select another session file copied from remote system.

After the successful recovery, you can generate detailed password report in HTML/XML/TEXT file. It is very simple and easy to use tool with its cool GUI interface.

[Arachni v0.4.5.1-0.4.2] Open Source Web Application Security Scanner Framework

Arachni is a Free/Open Source project, the code is released under the Apache License Version 2.0 and you are free to use it as you see fit.

Initially started as an educational exercise, it has since evolved into a powerful and modular framework allowing for fast, accurate and flexible security/vulnerability assessments. More than that, Arachni is highly extend-able allowing for anyone to improve upon it by adding custom components and tailoring most aspects to meet most needs.

New Changes

  • Optimized pattern matching to use less resources by grouping patterns to only be matched against the per-platform payloads. Bottom line, pattern matching operations have been greatly reduced overall and vulnerabilities can be used to fingerprint the remote platform.
  • Modules
    • Path traversal ( path_traversal)
      • Updated to use more generic signatures.
      • Added dot-truncation for MS Windows payloads.
      • Moved non-traversal payloads to the file_inclusion module.
    • File inclusion ( file_inclusion) — Extracted from path_traversal.
      • Uses common server-side files and errors to identify issues.
    • SQL Injection ( sqli) — Added support for the following databases:
      • Firebird
      • SAP Max DB
      • Sybase
      • Frontbase
      • IngresDB
      • HSQLDB
      • MS Access
    • localstart_asp — Checks if localstart.asp is accessible.
  • Plugins — Added:
    • Uncommon headers ( uncommon_headers) — Logs uncommon headers.