Design 2015 ~ EthiCal HaCkeRs
  • Keyloggers

    Keyyloggers Tools and Tutorials. Learn how keyloggers work and how to use them . ...

  • Cookie Stealers

    Cookie Stealers Tools and Tutorials. Learn how Stealers work and how to use them ...

  • Botnets

    Botnet Tools and tutorials. What is Zeus and Citadel bot and how to use them . ...

  • RATS

    Remote Administration tools and tutorials. ...

  • Website Hacking

    How to Hack Websites Vulnerabilities tools and tutorials ...

Facebook Photo Verification Bypass Tool


Facebook Photo Verification Bypass Tool

Your FB Account is Locked ? Getting "Pretending to be some one else" error ? 
Here is a Simple Solution for you.
First one is you can use Japan Proxy on Mobile Phone or in PC Use  m.facebook.com and Japan Proxy. we know in japan this error is not appearing so we have to change our geo location to japan.
for that you just need a fresh alive japan proxy. you can take it from google, many sites are available there which provide free proxies.  
2nd Step is this simple tool in which you have to put only one japan ip/proxy and just login to facebook. it willl not ask for verifying photos of friends. you will got another 4 Options.. 
one of in these 4 . 
1:  Date of Birth ?
2:  Security Question ?
3: Txt a Code to your cell
4: Upload an ID ?

if you have cell access , or provided cell in account you can easily get your account back... if you dont have cell no. in account then it will ask for DOB  if u know what is DOB then you can tell them and its done. or security question the last one is uploading an Gov ID or license. 
Note:  dont worry if you got only sec Q option or Dob option and u dnt know that... keep trying after some days.. it will show all option then you can try another.

Next Tool:  Fake Gov ID & License & Passport Generator is coming soon. keep visiting.

Download Link




NanoCore R.A.T 1.0.3.0 Cracked Download



STABLE & FAST - Aeonhack's NanoCore R.A.T - 1.0.3.0

The first cracked version of NanoCore RAT was leaked in December 2013; but this was an alpha version with very few capabilities enabled. The second leak in mid-February 2014 was a beta version with many more capabilities enabled and it was shortly after this version was posted to underground forums that we began to see spikes in NanoCore detections. There was a relatively short period of time between the leak of the first beta version (1.0.2.0) and the first spike, possibly due to it taking time for the news to spread or the bad guys becoming familiar with the new RAT before they started using it.
A history of leaks
  • Alpha version leaked in December 2013
  • Beta version 1.0.2.0 leaked in February 2014
  • Beta version 1.0.3.0 leaked by multiple sources in March and April 2014
  • Beta version 1.1.0.7 leaked by multiple sources in July and August 2014
  • Beta version 1.1.0.10 leaked in October 2014
  • Full version 1.2.2.0 (premium plugins) leaked in March 2015

Download Link


Bifrost RAT 1.2.1 Free Download



Bifrost  Remote Administration Tool [
RAT]

Developer: ksv
Compiler: c++
Date Released: September 27th, 2004

Face Dominator 2.9 Latest Version Crack Free Download



FB Event Manager – Complete management of Events on facebook, Scrape users, Ask users to join it, etc.

Customize Your Account – You can upload accounts,Check active and deactivate accounts of facebook to upload a huge text file of accounts easily change the account profile name and language of the accounts.

Fanpage Manager – It can create Fanpage automatically or with your custom data. You can also use your keywords and categories to create pages

Friend Adder – You can add targeted friends in your account. Targeting can be done based on Geo-Location or from fanpages.

Wall Poster – You can post your message on the wall of friends or walls of fanpages with your targated keywords.

Group Manager – you can invite your friends to join the groups,send request to groups,Post photo,url and messages on groups easily.

Supports IP Proxies – It support both private and public proxies for all its features. You can also use Hide my Ass VPN to use with this tool.

Automatic Captcha – It support Decaptcher.com and Deathbycaptcha.com for decoding captcha


Features
Wall Posters
Auto Group Joiner
Targeted Friend Adder
Group Scraper
Fans Scraper
Multithreaded & Proxy Support
Group Campaign Manager
Group Request Manager
And Many More….

How It Works


FaceDominator is a tool which is very useful for managing and automating your facebook advertising campaign. Learn more about FaceDominator Features with our Case Studies to help your business.

 Download Link

How to Create Invisible Name Facebook Account "Ghost ID"

 

How to Make a Ghost FB ID or You can say Invisible id without any alphabet word.
Its Simple and easy.Just Do Follow Step Correctly,
STEPS :
1- Use Indonesian Proxy
Note: if you have any vpn like "hidemyass" use that.. and bypass this manual ip changing method..
Open Google Chrome and click on the settings and search Proxy on the search bar (or) paste this on your chrome address bar “chrome://settings/search#proxy
Click on the “Change Proxy Settings” and from the Internet Popup that appears click on “LAN Settings“.
Click on “Use a proxy settings for LAN” and use this IP “118.98.35.251 ” & port “8080“.
 

Note : Sometimes it happened that proxy doesnt work because it expires.So Dont worry just google it indonesia proxy u will get it.. :)


2- Change Your Account Language To : Bahasa Indonesia

Scroll to the bottom of the Setting and you will find English(US). You need to change it to the language in which you have entered.


3- Change your Facebook Account NameFor Changing Your Name

Go to " Settings ------->> General ------>> Name

and Change your only first name to -
> k ﱞﱞﱞﱞﱞﱞﱞﱞﱞﱞﱞﱞ k

Remove both "k" letters  and save your name .

and remove all middle and last name

5. You are done :D


some tweaks will make your Facebook profile without name like this which is given below



You can see invisible only from Smart phone N PC 
Look demo
 :) https://www.facebook.com/profile.php?id=100007758072985

5 Cool Changes to Make Facebook Stylish


‘Facebook Addict’ is the name earned by me since I joined Facebook on 2009. Before I joined Facebook, I was an Orkut freak. I am not a normal user on Orkut but little aggressive there as I was finding tricks for Orkut a lot. When Facebook was introduced at first,

Tab Napping Tutorial (Advance Phishing Attack)

Tab napping tutorial  ( Hack Facebook accounts ) Video Tutorial


Tab Napping is a new form of phishing that is hitting the internet now. With the conventional form of phishing, for example, you might receive an email that is supposedly from your bank, and it might ask you to login and update or confirm your account details, of course, there would be a link to your banks website in the email for you to click, which would take you to a page that looks identical to your real banks login page.

Predator Pain Logger v11 Cracked by Meth




Features:

[-] Encrypted Enamel of Username and of Password ( RC4Encryption (* Your Menyimpan Info hacking [of] Terenkripsi
[-] Runs Hidden and
[do] not detect
[-] Mutex ( Making server ascertain You walk for once if double click slave
[-] Windows XP, Windows Vista, Windows Seven (* UAC Bypass / Work startup
[-] Cleaning Keyboard Hooks ( But do not bettter of personal version but better than all free logger [about/around]
[-] International Chosen ( Select;Choose moment of keylogs and of screenshot enter
[-] Test Send Enamel
[-] Icon Changer ( Put Hand To All Operating System
[-] File of Pumper ( Pump bytes to Your server to increase size measure, making larger ones server
[-] Built In Binder (* Enhanced [By] P Doorstep Encoding to file of binded, [doing/conducting] this situs and av onlinecannot detect by file of binded. become for example at pemindai of NVT always will emerge as bound something if You set mind on to fasten. this also make file of binded Your of Scantime FUD Always but I do not enhance this Runpe
[-] Some aspect of logger is Multi Threaded ( For example the thief and deliver enamel so that theres there [is] lag, up freeze or postponement
[-] For the Windows of Vista and of Windows Seven (* Enhanced [by] UAC Bypass to kill forever moment of server is walking ( disk of cleaner, desktop remote, Restore System, at screen keyboard, Prompt Command
[-] just Windows XP (* Disable Taskmanager, Folderoption, Deactivating Registrytools, Shutdown, CMD
[-] Vanish Cache Vapour
[-] Block of Website



Other Features 
[-] Stealing IP 
[-] Stealing Firefox 
[-] Stealing Filezilla 
[-] Stealing Logger Clipboard 
[-] Stealing Screenshot 
[-] Stealing No-Ip DUC 
[-] Stealing IMVU 
[-] Stealing Dyndns 
[-] Stealing Pidgin 
[-] Stealing FTPCOMMANDER 
[-] Stealing Paltalk 
[-] Stealing Smartftp 
[-] Stealing Coreftp 
[-] Stealing Flashfxp 
[-] Stealing Info Sys 
[-] Stealing CD Key



Video Tutorial

DarkComet RAT ( Remote Administration Tool ) Full Tutorial

How To Setup DarkComet RAT Full Tutorial + Port Forwarding Solution

Today We Will Learn :-

  • How Can You Hack A Computer ?
  • What is DNS ? And Its DNS Use In RAT ( Remote Administration Tool ) 
  • What Is UNPN  ?
  • How to Setup UNPN for RATS ?
  • How To Setup DarkComet ?
  • How to Port Forward TCP/UDP ?
  • Setup Rat Without Port forwarding  
  • List of the Top Ten Rats

DOWNLOAD NOW DARKCOMET 5.3
RAR PASS:   leet
Before Starting Please note that this tutorial is only for educational purpose i am not responsible for any of your act done after reading this tutorial 

Many Peoples Now a days were requesting me to write one article on how could they setup a RAT ( Remote Administration Tool ) which is used to remotely control the computer,s or in simple words to hack the computers.

         To setup Rat You Must have the basic knowledge of some important things which we will discuss below and many peoples on the internet are searching for how to setup RAT but they are confused of different methods which create,s a nexus and they fail to setup their RAT server but after reading this article i guarantee you that you will be able to setup you rat server.

  1. How Can You Hack A Computer ?
Well Everyone ask this Question and to hack a computer there are many ways of hacking computer by exploiting it and one of the most famous way to hack the computer used by many hackers is to execute the RAT Server in the victim,s computer , once you have executed the server you will be able to control his computer from A to Z mean everything.

 2. What is DNS ? And Use of DNS in RAT ?
DNS Stands for Domain Name Service and we use DNS in our RAT to make our server long lasting even forever and With the help of DNS we can access our slave,s computer for long time untill the DNS wont expire.
        
       DNS ( Domain Name Server ) plays a middle man role between your Ip Address and The Victim,s Ip Address to transfer the Data And if we use our ip address in the RAT server the RAT server will work and we will be able to hack the pc of victim but as we know that the Ip Address changes with time so when our ip address will be changed we will lose our all of slaves so this is the reason we use DNS because when slave,s computer will send the data like pictures or anything to us it will first send the data to DNS domain name sever and after DNS will verify the our latest Ip Address and after verifying the Ip Address it will send the data to us via our IP.

To make it easy for you i have prepared a drawing for you so you can understand it quiet easily check it.






















In this Picture you can see that DNS is playing a middle man role and it only updates our ip address so even if our ip changes with time we have no worries to lose our slaves.

How can you get a DNS service ? 
 You can get a free DNS service and from www.noip.com 


What Is Port Forwarding ? And Its Use in RAT
  Port is a protocol which is used to transfer data from one Ip Address to Another Ip Address and there are two types of Ports which are mentioned below.
  • TCP
  • UDP
   TCP and UDP are two types of Ports which are the backbone to setup your RAT server and we will have to forward both TCP and UDP both of the same number on our computer and also on our router , while many peoples do one big mistake that they only forward TCP/UDP Port on their computer or only on their router so please keep in mind that you have to forward the both TCP/UDP port with same number on your router and also as well as on your computer.


What If You cant Forward the Port ? To Setup RAT 
 If You Cant forward the port to setup RAT due to some reasons then there is one more option lefted for you which is like a wildcard , Yes i will show you how to setup RAT using UNPN function so you can setup Rat without port forwarding.


What is UNPN ? And its Key Role In RAT 
 Universal Plug and Play is a set of networking protocols that permits networked devices to send and receive data on any port which is being used and called by UNPN. As i mentioned that many peoples are having problem in port forwarding so today i will share two methods of setting up rat one with port forwarding and one without port forwarding and both work,s well for me.

Now we have learned almost every basic thing necessary to setup a Rat Server so lets get started.

TUTORIAL : - 

First Download Darkcomet from here Click here to Download " and after to forward your port also download auto port forwarding tool so click here " click here to download auto port forwarding tool  " 
To Get Started you should download two things one is RAT ( Remote Administration Tool ) and second is NO-IP Client. ( No-Ip) Client will automatically update our ip to the DNS 

For this tutorial i would be using the famous and the most stable RAT Tool
 " Dark Comet V 5.3 "  Download " Dark-Comet 5.3 ". It is the most stable and working version.


NO-IP Setup 

  • Goto www.noip.com click on Sign Up 
  • Fill Up the Form and chose free Dns 


Step 1  ( Port Forwarding ) 
  
1. Open CMD and type
  ipconfig
After this  you will find the Default GateWay IP address so note down or copy it

 Note:- Every Router has its different gateway theme 

2. Open Web-Browser and type the IP Address in the URL Address BAR and Login GateWay Will Appear.
























3. Login to the Router 

Default User and Password,s are 
  • user : admin
  • pass : admin
  • user  : admin
  • pass  : admin123  ( If you fail to login try Googling your router,s default user pass ) or contact the admin

4. After Login find the place to forward the ports like in my router the path is Networking > Forwarding 



5. After Finding the Port Forwarding Section write down your IP V 4 : IP Address which you can also find by typing in cmd " ipconfig "  
  • Write the IP Address in Servers IP BOX
  • Write 1122 port number in begin and end box and select tcp/udp or if you have only one choice then select TCP and after adding the TCP add UDP in the same way.
  • Click Save 


After Forwarding the TCP/UDP port from the Router Now Open DarkComet 
  • Click on Socket TAB












  • Right Click on Socke Handle Boxes and click on Add Port To Listen And Write down " 1122 " port in the box.


  • After Writing the Port Click on Listen and it will start listening
  • Now Goto www.canyouseeme.org 




  • If you get the Success in Green it mean you have done it and port is forwarded and now there are 100% chances that your RAT will work. and if you get Error in RED sign saying " Error: I could not see your service on....." Then you have done somthing wrong in forwarding your port on Router. So try to search on Google That " How TO Port Forward on 'your router name'  " 
  • Note that If you are still getting that error please read furthure below we can do one more thing as we can setup rat using UNPN function so please have some patience and move to the UNPN. 


UNPN ( Setup Without Port forwarding ) 
Note :- If you have sucessfully forwarded your port please move to step 2 and leave it 


 Many Routers are enabled with UNPN function but try to check that UNPN is enabled on your router by logging in and checking in the forwarding or networking section.

  • You Must Have Utorrent So download it - Click here 
  • Open Dark-Comet and click on socket 



  •  Now Right Click below the Socket Handle and A box will open so write down 1122 port in that box




  • Note: DO Not Close DarkComet leave it as it is 
  • Now open Utorrent and click on Option > Preferences 
  • Now In This write down the port 1122 in a box near random ports and click on OK 



  • After Clicking OK you have done it now Port is forwarded using UNPN so check it by entering your port inwww.canyouseeme.org 

The Myth Or Logic Behind that trick 






 STEP 2 ( Creation of Server ) 
  
  •  To create the server please click on DarkComet-Rat to open Options  
  • After Click on Server Module And then click on Minimalist.



  • Now  A box will appear and you have to type your details in it.



  1.  In Stub Id write your server name .
  2. In IP/DNS write you DNS Address which you created while sign up on www.noip.com.
  3. In Port write down the same port you forwarded " 1122 " .
  4. Click on Normal and Chose the path where to save the server and click save.


Step 4 ( Setting UP No-Ip DNS Client ) 

  • Download the NO-IP client by clicking here ( or goto noip.com and click on download ) 
  • Now After Downloading Install it and Open it 
  • If you cant find it please search in start menu " DUC " you will get it 


  • Click on Edit Hosts 


  • Chose Your Hosts by click on check box and click on save 
Now Click on Refresh Now and you will see 3 green signals and its a good symbol keep in mind that before starting DarkComet Please Refresh it once because it will update your ip address in your slaves so you can access them and also if you will not refresh your no-ip in 60 days they will delete your account so refresh your noip daily.

Now send the server which you created to any of your victim which you want to hack and after he executes that server on his/her Computer then he will appear on your DarkComet Module and you can control his pc for a long time.

Note that do not try to test the server on your own computer because it will not work on your own computer so try to test it on any,ones computer and the victim must not have Anti Virus because Dark comet is detected by almost every anti Virus so you will have to encrypt your server to make it Undetectable.

I hope you liked my tutorial and you have learned many things from this tutorial and if you face any problem just comment your problem below in the comment box i will replay as soon as possible.

Easy Binder 2.0


Easy Binder Free Download 

Easy Binder  is a tool that combines (binds) unlimited files (no matter their type) into a single standalone executable (a Container). The Container (the final bound file) is a simple compiled program that, when opened, will automatically launch the included files.

Easy Binder can run any type of file from the bound file without affecting its direct functionality. For instance, if you bind an executable, a text file and an image file, when the Container file is run, the executable will be run too while the other files will be opened with the default image file viewer (IrfanView, Paint etc.) and text file viewer (Notepad, Wordpad etc.).

Easy Binder features:
# unlimited files can be bound (joined)
# can bind any file type that is needed by the executable for a properly run
# the icon of the Host file (final bound file) can be changed
# Its 100% Free

Aegis Crypter 6.3 Edition 2015 FUD solutions


[FREE]Aegis Crypter 2015 [6.3 Edition] FUD solutions


Aegis Crypter 2015 new function
1.Increase the delay running

Crime24 Stealer Tutorial

Free Download Crime24 Cookie Stealer 

Zeus Botnet Full Tutorial

This Tutorial is for education purposes ONLY and I am NOT responsible in any way on how you use the information provided and what you do with the files. Thank you and enjoy reading.

Citadel Botnet Setup Full Tutorial Guide

Citadel Botnet Setup Full Tutorial Guide with Clean Builder


Today i am going in to introduce new botnet is called CITADEL ZEUS BOTNET its an latest version of ZEUS.




Download Citadel  







Contents =
==============


1. Description and facilities.
2. Setting up the server.
2.1. HTTP-server.
2.2. The interpreter PHP.
2.3. MySQL-server.
2.4. Control Panel.
2.4.1. Setting.
2.4.2. Update.
2.4.3. File / system / fsarc.php.
3. Setting Bot.
4. Working with BackConnect.
.


==============================
= 1. Description and facilities. =
==============================
ICE9 - software to steal personal user data from remote systems, Windows. On
plain language of "Troy", "backdoor", "virus". But the author does not like these words, therefore, further documentation
He will call this software "Bot".


Boat is fully based on the WinAPI Interception in UserMode (Ring3), this means that the bot does not use
no drivers or downloads in Ring0. This feature makes it possible to run even from Bota
Guest Account Windows. Plus, it ensures greater stability and adaptability
subsequent versions of Windows.


Bot is developed in Visual C + + version 9.0 +, with no additional libraries are used
Type msvcrt, ATL, MFC, QT, etc. Bot code is written with the following priorities (in descending order):
1. stability (carefully checked all the results of the call functions, etc.)
2. size (to avoid duplication of algorithms, repetitive calls, functions, etc.)
3. speed (not the type of instruction while (1 ){..}, for (int i = 0; i


Functions and features bot:
1. Sniffer traffic for the protocol TCP.
1.1. Interception of FTP logins on any port.
1.2. Interception of POP3 logins on any port.
1.3. The interception of any data from the traffic (a personal request).


2. Intercepting HTTP / HTTPS requests to wininet.dll, ie all programs working with this
library. This includes Internet Explorer (any version), Maxton, etc.
2.1. Substitution ..


3. The functions of the server.
3.1 Socks4/4a/5.
3.2 Bekkonekt for any services (RDP, Socks, FTP, etc.) on the infected machine. You can
access to a computer that is behind a NAT, or, for example, that
banned from the internet connection.
3.3 Getting a screenshot of your screen in real time.
- Do not add ---







- 2.3. MySQL-server. --
----------------------
MySQL is required to store all data on botnete. The recommended version is not lower than 5.1.30, as well
worth considering that when the control panel in the older versions have some
problem. All table control panel, go to a MyISAM, it is important to optimize
speed of work with this format, on the basis of the available server resources.


We recommend the following changes to the MySQL-server setup (my or my.ini):


max_connections = 2000 # Or higher


Download MySQL: http://dev.mysql.com/downloads/






To nix-systems exhibit the right:
. - 777
/ system - 777
/ tmp - 777






ALL FOR EDUCATION PURPOSE ONLY I AM NOT RESPONSE FOR ANY HARM FULL INFECTION OF SYSTEM ETC-

Crypter Tools Make Your Sever Undetectable FUD

Crypter Tools

All Crypter Collection

Super Phisher (Fake Login Page Creator)


Download Now

Rar Pass: leet

Ardamax Keylogger Tutorial

Ardamax Keylogger Full Step By Step Tutorial

Step 1: Download Ardamax Keylogger 


Step 2:
Now, after installing, you will get Ardamax log icon in task bar. Right click on it and select “Enter registrationkey” and make it full version by entering serial key from Serial key.txt file.

Step 3: Now, again right click on Ardamax taskbar icon and select “Remote Installation” to see Remote Installation Windows, click Next on it.

Step 4: 
Click on “Next” to get Appearance screen. Here, click on “Additional components” and untick “Log Viewer” and hit Next.

Step 5: 
Now,on Invisibility screen, check all options and hit Next.



Step 6: Now, on Security screen, click on “Enable” and put the password (remember this pass- you’ll need this later). Check all boxes and hit Next.




Step 7: Now, you come to Options, and select options as you need. eg: It is better to have keylogger run after every restart – so tick “Run On Windows Startup” and so on. Click on Next.


Step 8: On “Control” screen, check the box “Send log every” and put time as 5/10 minutes(whatever you wants). Then, in delivery, check “Email”. Leave Include as it is. And uncheck “Send only if log size exceeds”. Proceed with “Next”.

Step 9: Now, on Email, enter as below:
Send To : Enter email id to receive keylogs
Username and password: Enter your any Username and pass of email id for sending Keylogs on your email id which yov have mentioned above.
Now hit “Next”.



Step10: In “Control” window dont change anything and hit “Next”.


Step 11: In “Screenshots” window, select options as you need and hit Next.



Step 12: In “Webcam” window, select options as you need and hit Next.




Step 13: In Screenshots screen, you can put your own values and hit “Next” to come to Destination. Choose the Keylogger Engine path where you want to put the keylogger on your computer. Untick “Open the folder containing the keylogger engine” to avoid yourself from being keylogged. Choose the icon you want to use for keylogger.



Step 14: Now, click “Next” and then “Finish”.

Now, when you have keylogger engine ready. But, this is detected by antivirus as hacktool and so we have to bypass antivirus detection. For this, keylogger is crypted using FUD Crypter. I will not talk about this over here as I have written article on this FUD Crypter.
Note: Your antivirus may detect the downloaded Ardamax keylogger file as virus. Please deactivate your antivirus while installing this Ardamax keylogger. Don’t worry, I never play such cheap pranks of hacking my readers.