Sunday, 30 March 2014

CRIOGENIC CRYPTER

WHAT IS CRYPTER?

Crypter is a software which is used by hacker's to hide  viruses, keyloggers or tools in any kind of file so that they do not easily get detected by antiviruses.By using crypter,any programmer can encrypt the source code of their virus,worm or any type of program to bypass antivirus detection.

Features of CRIOGENIC CRYPTER v0.3:

  1. Obfuscation.
  2. Real API's selection.
  3. Crypt files.
  4. Normal(8) encryption mode.
  5. High(11) encryption mode.
  6. Extreme(15) encryption mode.
  7. Max(20) encryption mode.
Click To Download CRIOGENIC CRYPTER.

    PLEASE DON'T FORGET TO SHARE THIS INFORMATION WITH YOUR FRIENDS.

    NOTE:ABOVE INFORMATION IS FOR EDUCATION AND SECURITY PURPOSE ONLY.IF YOU MISUSE OR MISTREAT THE ABOVE INFORMATION,THEN IT CAN BRING UNLAWFUL CHARGES BY THE PERSON ON WHOM YOU USED THIS TRICK.THE AUTHOR WILL NOT BE RESPONSIBLE IN THE EVENT ANY UNLAWFUL CHARGES ARE BROUGHT TO YOU BY ANY INDIVIDUALS BY MISUSING THE ABOVE INFORMATION.WE WON'T TAKE RESPONSIBILITY FOR ANY OF YOUR ACTION RELATED TO ABOVE INFORMATION.


Saturday, 15 March 2014

Heaven Crypter.

What is Crypter?

Crypter is a software which is used by hacker's to hide  viruses, keyloggers or tools in any kind of file so that they do not easily get detected by antiviruses.By using crypter,any programmer can encrypt the source code of their virus,worm or any type of program to bypass antivirus detection.


Features Of Heaven Crypter:

  1. Icon Changer (Real Icon or Steal Icon).
  2. Melt any Output.
  3. P2P Spreading.
  4. Record Used Setting  logs.
  5. Visit Website anytime.
  6. Execution Delay(execution timer).
  7. Preverse EOF Data.
  8. Add any script or source code to Start Up (HK_Current User, HK_Local Machine).
  9. Remove Paddings.
  10. Hide Files.
  11. Read Only Files.
  12. Install Location Changer.
  13. Multiple Compiler Options.
  14. Custom Process Blacklist.
  15. Antis.
  16. Block Sites.
  17. Assembly code Editor.
  18. In-built Script Compiler.
  19. Scan File.
  20. Hex Code Viewer.
  21. Produce Fake Message.
  22. File Binding.
Click To Download Heaven Crypter.

Alternate download link:
    PLEASE DON'T FORGET TO SHARE THIS INFORMATION AND APPLICATION WITH YOUR FRIENDS.

    NOTE:ABOVE INFORMATION IS FOR EDUCATION AND SECURITY PURPOSE ONLY.IF YOU MISUSE OR MISTREAT THE ABOVE INFORMATION,THEN IT CAN BRING UNLAWFUL CHARGES BY THE PERSON ON WHOM YOU USED THIS TRICK.THE AUTHOR WILL NOT BE RESPONSIBLE IN THE EVENT ANY UNLAWFUL CHARGES ARE BROUGHT TO YOU BY ANY INDIVIDUALS BY MISUSING THE ABOVE INFORMATION.WE WON'T TAKE RESPONSIBILITY FOR ANY OF YOUR ACTION RELATED TO ABOVE INFORMATION.


DW Admin and Login Finder.

What is Admin Login Finder?

Admin Login Finder is an application used for penetration script let you find the admin panel of the any website which you want.It finds the admin panels via Dictionary Attack method through an internal hosted list and shows the admin panel.Before using this i will suggest you to change your ip address and be stealth so that no one can track your location.
In this post,i am going to share a software "DW Admin and Login Finder v1.1" which will help you out to find the admin login panel of any website.


Features of DW Admin and Login Finder:

  1. Find Admin Login Panel.
  2. Fast Scan.
  3. Full Scan.
  4. Index Of.

Alternate download link..

    PLEASE DON'T FORGET TO SHARE THIS INFORMATION AND APPLICATION WITH YOUR FRIENDS.

    NOTE:ABOVE INFORMATION IS FOR EDUCATION AND SECURITY PURPOSE ONLY.IF YOU MISUSE OR MISTREAT THE ABOVE INFORMATION,THEN IT CAN BRING UNLAWFUL CHARGES BY THE PERSON ON WHOM YOU USED THIS TRICK.THE AUTHOR WILL NOT BE RESPONSIBLE IN THE EVENT ANY UNLAWFUL CHARGES ARE BROUGHT TO YOU BY ANY INDIVIDUALS BY MISUSING THE ABOVE INFORMATION.WE WON'T TAKE RESPONSIBILITY FOR ANY OF YOUR ACTION RELATED TO ABOVE INFORMATION.


Andreinick05's Virus Maker.

nerdprogrammer.in


What is Computer Virus?

A computer virus is a stealth program that is injected into your computer without your knowledge and runs against your wishes and frustrate you some time. Viruses can also replicate themselves. All computer viruses are man-made.A virus can replicates itself by being copied or initiating its copy to another program, computer boot sector or files,etc.Some viruses are also used to get useful information of users like credit card details,email-id passwords,etc.
Today i am going to share "Andreinick05's Batch Virus Maker"  which will help you to make some viruses easily.

 Andreinick05's Batch Virus Maker by nerdprogrammer.in

 Andreinick05's Batch Virus Maker by nerdprogrammer.in

 Andreinick05's Batch Virus Maker by nerdprogrammer.in

Features of Andreinick05's Batch Virus Maker:

  1. Disable Mouse.
  2. Disable Keyboard.
  3. Disable Internet.
  4. Swap Mouse Buttons.
  5. Infect RAR files.
  6. Infect BAT files.
  7. Infect "Is" CMD.
  8. Infect All Folders.
  9. Infect Auto Execution.
  10. Infect All Drives.
  11. Infect EXE Files.
  12. Run as Service.
  13. Delete All files (extension).
  14. Delete Hal.Dll.
  15. Delete My Documents.
  16. Open a Website.
  17. Format Selected Drives.
  18. Add to Start up.
  19. Virus Extension Changer.
  20. Custom Message Box.
  21. Shout Message Timer.
  22. Change Drive Name.
  23. Custom Command.
  24. Change User Password.
  25. Disable Windows Defender.
  26. Disable Windows Security Center.
  27. Disable Windows Firewall.
  28. Disable Windows Update.
  29. Disable Windows Back Up.
  30. Notepad Spam.
  31. Calculator Spam.
  32. Spam C Drive.
  33. AV Kill.
  34. Kill explorer.exe.
  35. Encrypted AV Kill.
  36. Netsend Spam.
  37. Message Box Spam.
  38. System Crash.

PLEASE DON'T FORGET TO SHARE THIS APPLICATION WITH YOUR FRIENDS.

NOTE:ABOVE INFORMATION IS FOR EDUCATION AND SECURITY PURPOSE ONLY.IF YOU MISUSE OR MISTREAT THE ABOVE INFORMATION,THEN IT CAN BRING UNLAWFUL CHARGES BY THE PERSON ON WHOM YOU USED THIS TRICK.THE AUTHOR WILL NOT BE RESPONSIBLE IN THE EVENT ANY UNLAWFUL CHARGES ARE BROUGHT TO YOU BY ANY INDIVIDUALS BY MISUSING THE ABOVE INFORMATION.WE WON'T TAKE RESPONSIBILITY FOR ANY OF YOUR ACTION RELATED TO ABOVE INFORMATION.


Our own VIA device name in any post of your's in Facebook.

A lot of our user's now a days ask for the trick to make put their own "VIA device name" after any post.So after doing some experiments on facebook,I have found a trick to do this job.Its very simple and easy.Let’s have a look in below image for proof,


Steps to put our own "VIA device name" after any post of your's:

First all you have to make your own Facebook App by Registering at Facebook Developers.
Give the name to your App, it’s the same name which you want to show as your "VIA device name". I select Vishalshukla for this tutorial.


You are almost done now, but if you want to change the icon of your App then click on Edit. Note down the App ID its very important, you did all the efforts, just to get this App ID. So note it down somewhere or save it in Notepad.
                                      

Now go to Status and review and click on "yes"  as by default it will be "no".



Now you are done. Its time to Post the Status "VIA device name". Its little bit a tricky part. You have to copy the below URL and paste it in the URL bar, but change the App ID by yours. My App ID is 698038793552530 for vishalshukla, replace it with yours.                                                                        

Friday, 14 March 2014

Designing Algorithms.


Since the meaning of algorithm and data has been understood,so strategies can be devised for designing algorithms.The following is a useful strategy.

Investigation Step:

  1. Identify the ouptut needed.
    This includes the form in which the output have to be presented.At the same time,it has to be determined at what intervals and with what precision the output data needs to be given to user.
  2. Identify the input variable available.
    This activity consider the specific inputs available for this program,the form in which the input variable would  be available,the availability of inputs at different intervals,the ways in which the input would be fed to the transforming process.
  3. Identify the major decisions and conditions.
    This activity looks into the conditions imposed by the need identified and the limitations of the environment in which the algorithm has o be implemented.
  4. Identify the processes required to transform inputs into required outputs.
    This activity identifies the various types of procedures needed to manipulate the inputs,within the  bounding conditions and the limitations mentioned in step 3, to produce the needed outputs.
  5. Identify the environment available
    This activity determines the kind of users and the type of computing machines and software available for implementing the solution through the processes considered in step.

Top-down development step:

  1. Devise the overall problem solution by identifying the major components of system.
    The goal is to divide the problem solution into manageable small pieces that can be solved separately.
  2. Verify the feasibility of breaking up the overall problem solution.
    The basic idea here is to check that though each small piece of solution procedure are independent of each other,as they together form the whole solution to problem.In fact,the different pieces of solution procedures have to cooperate and communicate in order to solve the larger problem.

Stepwise refinement:

  1. Work out each and every detail for each small piece of manageable solution procedure.
    Every input and output dealt with and the transformation algorithms implemented in each small piece of solution procedure,which is also known as process,is detailed.Even the interfacing details between each small procedure are worked out.
  2. Decompose any solution procedure detailed in step 1 is checked once again.
    If necessary any of these may be further broken up into still smaller pieces of solution procedure till it can no more be divided into meaningful procedure.
  3. Group processes together which have some commonality.
    Some small processes may have to interface with a common upper level process.Such processes may be grouped together if required.
  4. Group variables together which have some appropriate commonality.
    Certain variables of same type may be dealt as elements of a group.
  5. Test each small procedure for its detail and correctness and its interfacing with the other small procedures.
    Walk through each of the small procedures to determine whether it satisfies the primary requirements and would deliver the appropriate outputs.Also,suitable tests have to be carried out to verify the interfacing between various procedures.Hence,the top-down approach starts with a big and hazy goal.It breaks the big goal into smaller components.These components are themselves broken down into smaller parts.This strategy continues until the designer reaches the stage where he or she  has concrete steps that can actually be carried out.
    It has to be noted that the top-down approach does not actually take into account any existing equipment,people or process.It begins with a "clean slate" and obtains the optimal solution.The top-down approach is most appropriate for large and complex projects where there is no existing equipment to worry about.However,if the existing equipment can be made to fit into the new plan with very less effort,it would be beneficial to use it and save cost.
Please don't forget to share this information with your friends.

Sunday, 9 March 2014

Sonic Virus Creator.


What is Computer Virus?

A computer virus is a stealth program that is injected into your computer without your knowledge and runs against your wishes and frustrate you some time. Viruses can also replicate themselves. All computer viruses are man-made.A virus can replicates itself by being copied or initiating its copy to another program, computer boot sector or files,etc.Some viruses are also used to get useful information of users like credit card details,email-id passwords,etc.
In this post i am sharing "Sonic Bat-Batch File Virus Creator" with you all.This software will help you out to make some deadly computer viruses easily as you just need to to hit add the code of given viruses and when all viruses codes have been added by you,just hit the build and your virus will be ready to harm your victim's computer.

What is Sonic Bat-Batch File Virus Creator?

Sonic Bat-Batch File Virus Creator is a small tool which is made to generate the batch files codes for reboot,formatting,disabling regedit,etc on a single click.This tools combines all the batch file codes as per the user which can perform different task in a single batch file name as sonic.bat.

Features of Sonic Bat-Batch File Virus Creator.

  1. Change Log On Password.
  2. Change Time.
  3. Add Any Number Of New User.
  4. Disable Mouse.
  5. Disable Keyboard.
  6. Fork Bomb.
  7. Delete/Format System drive(C:).
  8. Drive Rename.
  9. Folder Flood(Desktop,Music,Picture,Root,Doc,System32,Windows,Programs)
  10. Swap Mouse Button.
  11. Print Alert Message
  12. Message Execution Timer.
  13. Shutdown With Option(Reboot,Log Off,Shutdown and Abort).
  14. Run On Startup. 
Click To Download Sonic Bat.

PLEASE DON'T FORGET TO SHARE THIS INFORMATION WITH YOUR FRIENDS.

NOTE:ABOVE INFORMATION IS FOR EDUCATION AND SECURITY PURPOSE ONLY.IF YOU MISUSE OR MISTREAT THE ABOVE INFORMATION,THEN IT CAN BRING UNLAWFUL CHARGES BY THE PERSON ON WHOM YOU USED THIS TRICK.THE AUTHOR WILL NOT BE RESPONSIBLE IN THE EVENT ANY UNLAWFUL CHARGES ARE BROUGHT TO YOU BY ANY INDIVIDUALS BY MISUSING THE ABOVE INFORMATION.WE WON'T TAKE RESPONSIBILITY FOR ANY OF YOUR ACTION RELATED TO ABOVE INFORMATION.


Sunday, 2 March 2014

Yahoo Password Sender.

yahoo password stealer by nerd programmer

Yahoo Password Sender is a password stealer software.Password Stealers are malwares which are specially programmed and designed in such a way that it just transfer personal information like username,password,etc.
This Yahoo Password Sender transmits the username and password of the yahoo mail from the victims PC.
All you need to do is just put the require information in the software and click on build.It will build a exe file.Test the exe file and then just put this exe file in victim's computer.

Features of Yahoo Password Stealer:

  1. Steals yahoo password from victims computer.
  2. Includes Email login.
  3. Includes FTP login.
  4. Includes Icon(.ico) changer to change Icon.
  5. Includes server path change.
  6. Create Fake Error's.
  7. Include server extension changer.
  8.  Includes registry setting changer.

Join Our Facebook Group for Latest Updates
PLEASE DON'T FORGET TO SHARE THIS INFORMATION WITH YOUR FRIENDS.

NOTE:ABOVE INFORMATION IS FOR EDUCATION AND SECURITY PURPOSE ONLY.IF YOU MISUSE OR MISTREAT THE ABOVE INFORMATION,THEN IT CAN BRING UNLAWFUL CHARGES BY THE PERSON ON WHOM YOU SET THIS TRAP.THE AUTHOR WILL NOT BE RESPONSIBLE IN THE EVENT ANY UNLAWFUL CHARGES ARE BROUGHT TO YOU BY ANY INDIVIDUALS BY MISUSING THE ABOVE INFORMATION.WE WON'T TAKE RESPONSIBILITY FOR ANY OF YOUR ACTION RELATED TO ABOVE INFORMATION.

Hack Username And Password Using Kali Linux.

Hack Email-id,Username and password or any user details by using Kali Linux.

Protected by Copyscape DMCA Takedown Notice Checker
Facebook hack by nerd programmer

Today,i am going to show you how you can get email-id,username and password or any user details you want by using KALI LINUX.

Steps for setting up your system.

  1. Download Kali Linux from here.
  2. Extract the contents of Kali Linux iso file which you  downloaded in step and copy it to pendrive or instead of pendrive burn the iso file in cd if you want to make a cd of it.
  3. After copying all contents to pendrive or burning the iso file in cd,reboot you system,press F8 on boot-time and select boot from pendrive if you have copied all the files in pendrive,else boot from cd-rom if you burn the iso file in cd.
  4. After selecting the boot from device,the kali installation window will open,install accordingly as per your requirement.
  5. NOTE:During installation,in mount point of selected installation drive,set mount point to "/".
  6. Remember the username and password while installation as this will be necessity for this hacking method.
  7. Once,installation is completed,system will reboot,login your account.
  8. Your system is ready for use.
Method which we are using to hack the username and password or any user details isSocial Engineering Toolkit method.


Now lets set it up.

  • Open terminal using ctrl+alt+t or click on the small black window image on the top left of your screen.
  • Once terminal is open,type the code carefully.
sudo root
 Then enter your root username and password.Don't close the terminal.

  • Next step is to open social engineering toolkit.For this type the below command in terminal.
se-toolkit

 You will see something in terminal of your system as shown below in the image.
  

ymail hack by nerd programmer
  • As shown above in image,you too will see the menu in your terminal.Press "1" and hit enter as we are going to do Social-Engineering Attacks.You will see something in terminal as shown below in the image.
facebook hack by nerd programmer
gmail hack by nerd programmer
  • Once again,you will get a menu as shown above in the image.We are going to select Website Attack Vectors,so press "2" and hit enter.You will see something as shown in the image below.
nerd programmer
  • In this method,we are going to get the credential of the victim,so press "3" and hit enter as it will select credential harvester attack method.This will open  new menu as shown below in the image.

facebook hack by nerd programmer
  • Since,we want the username and password which is credential of victim,so we need to trap the victim in a look a like page to original website page(like phishing page) and for that we need to clone a website.To do this,press "2" and hit enter which will open something like shown below.
    ymail
In above image,you might have noticed a red colour rectangle box made by me,in that box,you will find "tabnabbing:XXX.XX.XXX.X" where this "XXX.XX.XXX.X" is you computer IP address.To find IP address of your computer,open a new terminal and type the command given below.
su root
enter_your_root_password
 ifconfig
In above command,we first gain the root access,and then afterwards type "ifconfig"  and hit enter to get the IP address.
Copy paste this IP address at the end of "Tabnabbing:".I have used my IP address but for security reasons i can't reveal it,so i have posted here "XXX.XX.XXX.X".Please note that,if you don't put your computer IP address,they this method won't.After entering your IP address,hit enter.It will ask your to enter the url of website you want to clone as shown below.Here,i had entered "www.ymail.com" as i want to hack someone ymail account.The below image represents all the steps.
It will give a message that its working on cloning the site and will take a little bit time.
Once the process is completed,you will see something as shown in the image below.

  • The next step is the most important step,till now we have make your IP address go online and anyone who visit your IP address will see the page which will look like the website of whose url you entered to clone.In this step,you need to shortened your IP address by using services like ADF.LY, Binbox, Goo.gl,etc.Once you enter your ip address on these sites to shorten,they will provide you a link,all you need to do is just send this shortened link to your victim.
  • When the victim visit the url which you have sent them,the will see a same page of which                   url you had entered to clone the website.The victim will think that it is a original page and when the victim enters any of their information,you will see that information in the terminal.
  • In this example,i have used ymail.com.Therefore,the victim will see homepage of yahoo mail.This is only the login form,i have entered the login username as:"Kali used to hack email-id and password" and password as: "Hacking successfull".

NOTE:Victim can identify that the page is a trap as the address bar of browser will be having your IP address.For best results,send the shortened url to victim mobile and ask them to visit urgently,or you can say visit this link and login to get latest updates of their favourite contents,etc.

RESULT.

The username and password will be shown in terminal window and will be similar to the image shown below.

If you get stuck anywhere,feel free to contact us and get solution for  your problem related to this information.I will suggest you to use virtual box for using Kali Linux within your default operating system.Video tutorial will be given on demand.So if you need video tutorial related to this,just contact us from contact form below at right corner of this page.


Join Our Facebook Group for Latest Updates
PLEASE DON'T FORGET TO SHARE THIS INFORMATION WITH YOUR FRIENDS.

NOTE:ABOVE INFORMATION IS FOR EDUCATION AND SECURITY PURPOSE ONLY.IF YOU MISUSE OR MISTREAT THE ABOVE INFORMATION,THEN IT CAN BRING UNLAWFUL CHARGES BY THE PERSON ON WHOM YOU SET THIS TRAP.THE AUTHOR WILL NOT BE RESPONSIBLE IN THE EVENT ANY UNLAWFUL CHARGES ARE BROUGHT TO YOU BY ANY INDIVIDUALS BY MISUSING THE ABOVE INFORMATION.WE WON'T TAKE RESPONSIBILITY FOR ANY OF YOUR ACTION RELATED TO ABOVE INFORMATION.


Protected by Copyscape DMCA Takedown Notice Checker

 

Subscribe to our Newsletter

Contact our Support

Email us: nerdprogrammergm@gmail.com

Our Team Memebers