Showing posts with label Hacking Softwares. Show all posts
Showing posts with label Hacking Softwares. Show all posts

Sunday, 29 June 2014

Prevent V1.0.


Prevent cut, paste, copy, delete, re-naming of files & folders using this cool application Prevent v1.0
Prevent v1.0 is a freeware application which runs on all Windows Operating System. The installer in downloading package when run will only places the Prevent 1.0 folder in the system Program Files folder.
Sometimes you don't want that anyone won't cut,copy,past,delete or rename your files or folder's in your computer,for this Prevent v1.0 is a perfect freeware application as no one will ever know what wrong with your computer while they try to cut,copy,past,delete or rename your files or folder's on your computer.
If you don't want anyone deleting or renaming or messing around with you data, then Prevent may be able to help you alot.

The downloading package contains following files:

  1. Prevent Setup.
  2. Read Me file.
  3. Uninstall.
To install the program, click on Prevent.exe.Once,accept the term's and conditions and wait till it gets installed.Once installation is completed,open Prevent and then Set your Hotkey to and click on activate to start the Prevent operation.Remember your saved hotkey as to stop Prevent.exe you will need to press that hotkey. You may set hotkey as Ctrl+P if you wish. The default hotkey are Win+F8 to kill Pre_1 and Win+F9 to kill Pre_2. But the single hotkey set by you will kill both processes at the same time.

Prevent can perform the  following operations :

1. Stops Cut.
2. Stops Paste.
3. Stops Copy.
4. Stops Delete.
5. Stops Copy To.
6. Stops Move to.
7. Stops Send To.
8. Prevents renaming.
9. Disables Task Manager-End Process button. Also it doesn't allow you to right click on process name and click on end process.It also grays out the context menu item or stops the process.

NOTE:To uninstall or remove Prevent, use the Uninstaller situated in the Prevent folder or simply delete its Program folder.



FOR MORE INFORMATION,JOIN OUR NERD PROGRAMMER FACEBOOK GROUP.

    PLEASE DON'T FORGET TO SHARE THIS INFORMATION AND APPLICATION WITH YOUR FRIENDS.

    NOTE:ABOVE INFORMATION IS FOR EDUCATION AND SECURITY PURPOSE ONLY.IF YOU MISUSE OR MISTREAT THE ABOVE INFORMATION,THEN IT CAN BRING UNLAWFUL CHARGES BY THE PERSON ON WHOse system YOU USED THIS TRICK.THE AUTHOR WILL NOT BE RESPONSIBLE IN THE EVENT ANY UNLAWFUL CHARGES ARE BROUGHT TO YOU BY ANY INDIVIDUALS BY MISUSING THE ABOVE INFORMATION.WE WON'T TAKE RESPONSIBILITY FOR ANY OF YOUR ACTION RELATED TO ABOVE INFORMATION.

Protected by Copyscape DMCA Takedown Notice Checker

Friday, 30 May 2014

The Rats Crew-AIO.


What is Rats Crew AIO?

The Rats Crew-AIO is a software which helps you to increase the size of any file,change the icon of any file and also spoof the extension of any file format.
This software is a multipurpose tool which help the hacker's in many aspects to hide their malicious coded file by changing their extension or changing the icon or increasing the size of file..

Features of The Rats Crew-AIO:

  1. File Pumper(Increase the size of any file).
  2. Extension Changer(Change the extension of any file).
  3. Icon Changer(Change the icon of any file).

FOR MORE INFORMATION,JOIN OUR NERD PROGRAMMER FACEBOOK GROUP.

    PLEASE DON'T FORGET TO SHARE THIS INFORMATION AND APPLICATION WITH YOUR FRIENDS.

    NOTE:ABOVE INFORMATION IS FOR EDUCATION AND SECURITY PURPOSE ONLY.IF YOU MISUSE OR MISTREAT THE ABOVE INFORMATION,THEN IT CAN BRING UNLAWFUL CHARGES BY THE PERSON ON WHOM YOU USED THIS TRICK.THE AUTHOR WILL NOT BE RESPONSIBLE IN THE EVENT ANY UNLAWFUL CHARGES ARE BROUGHT TO YOU BY ANY INDIVIDUALS BY MISUSING THE ABOVE INFORMATION.WE WON'T TAKE RESPONSIBILITY FOR ANY OF YOUR ACTION RELATED TO ABOVE INFORMATION.


    Protected by Copyscape DMCA Takedown Notice Checker

Wednesday, 7 May 2014

Make Your Own KeyLogger.

AIRBORNE TEXT

What is KeyLogger?

A KeyLogger is a computer device or a program that records the real time activity of a computer user including the keyboard keys they press.You can not detect the presence of KeyLogger on your computer since it runs in background(Stealth mode) and also it is not listed in task manager or control panel or privacy purpose. It can be used by parents to keep eye on their children, company owners to spy on their employees or by hackers to steal account and information from the victim's computer.
Make your own undetectable KeyLogger within 10 minutes.Yes,all you need is visual studio and the source code of the KeyLogger which you can download from the link given below.

Steps for making your own KeyLogger :

  1. Download and install visual studio from here.
  2. Download the source code from here or from the download button given below.
  3. Watch the video tutorial given below about how to make your own KeyLogger within 10 minutes.


Click To Download KeyLogger By Nerd Programmer.

Alternate Downloading Link To KeyLogger.

Click To Download Source Code Of KeyLogger By Nerd Programmer.

Alternate Downloading Link To Source Code.

NOTE:The KeyLogger made by me and which is available for download is just a simple basic KeyLogger which will record all the keystrokes and store it in text file and you can find that text file at this path "C:\record.txt".
For security purpose,the KeyLogger.rar file is password protected.To get password contact us through contact form or email us at nerdprogrammergm@gmail.com



IF YOU STILL FACE ANY PROBLEM RELATED TO ABOVE INFORMATION,FEEL FREE TO CONTACT US AND WE WILL HELP YOU OUT AS SOON AS POSSIBLE :) .


FOR MORE INFORMATION,JOIN OUR NERD PROGRAMMER FACEBOOK GROUP.

PLEASE DON'T FORGET TO SHARE THIS INFORMATION WITH YOUR FRIENDS.

    NOTE:ABOVE INFORMATION IS FOR EDUCATION AND SECURITY PURPOSE ONLY.IF YOU MISUSE OR MISTREAT THE ABOVE INFORMATION,THEN IT CAN BRING UNLAWFUL CHARGES BY THE PERSON ON WHOM YOU USED THIS TRICK.THE AUTHOR WILL NOT BE RESPONSIBLE IN THE EVENT ANY UNLAWFUL CHARGES ARE BROUGHT TO YOU BY ANY INDIVIDUALS BY MISUSING THE ABOVE INFORMATION.WE WON'T TAKE RESPONSIBILITY FOR ANY OF YOUR ACTION RELATED TO ABOVE INFORMATION.

Protected by Copyscape DMCA Takedown Notice Checker

Thursday, 24 April 2014

KON-BOOT.

Kon-Boot is a only application which will silently bypass all the Admin/User login authentications of Windows based operating system without changing the default password.This is the only tool which will help you to login in any windows based operating system of which you are not knowing the password.It is easy to use and very fast application.
Kon-Boot is mainly created for Ubuntu,but now it supports more Linux distributions.
Kon-Boot can also crack an array of Windows and Linux operating system ranging from Windows XP to Windows 8.1,which makes it one of the first tools to break Windows 7 passwords.On the Linux from it supports Gentoo,Ubuntu,Debian and Fedora flavors.
By using this application you can bypass login authentication of the above mentioned operation system.

Download the Kon-Boot from the download button given below.

Steps for using Kon-Boot:

  1. Download the Kon-Boot from download button given below.
  2. Open the Kon-Boot folder,you will find a .exe file with name "KonBootInstaller",open it.
  3. If you get a warning about detaching all usb devices,etc,just ignore it and click on "ok",a new window will open with three installation methods first one will be install to CD(no EFI support),second one will be Install to CD(v2.1,no EFI support) and third install to USB disk(with EFI support).I have used the third option as pendrives are much faster then CD's.
  4. Once installation completes,just remove your device safely.Sometimes the installer stops not responding,just chill and wait for few minutes,when installation gets over,you will see a message about installation has been completed.If installer is not responding and have take more than 5 minutes,then you need to end the process and restart it as the application might get crashed.
  5. Your kit is now ready after the installation has completes,so next step is to insert your respective device(CD/Pendrive) in which you have installed the Kon-Boot.
  6. Start the Computer/System.
  7. Boot from the device in which you have installed the Kon-Boot.
  8. Hit enter to continue at the splash screen.
  9. When you are asked for password to login,hit enter.Thats all,no files are written to the disk by this utility.None are modified either.If you are getting error message then type anything in password field and you will be logged in.
  10. After your work is finished,reboot without the CD/Pendrive in which you installed Kon-Boot and you are back to the original password of Computer/System.
If you want to change the password of the system permanently,for windows,after login in the account,open cmd as administrator and type the following command "net user".This command will list the user account of the computer.Then type "net user Your_Admin_LoggenIn_User_Name password" where password will be the password which you want to keep and Your_Admin_LoggenIn_User_Name is the name of the user account you logged in.The password will be permanently changed by executing this command.


Note:The file is password protected for security reasons.If you are really interested in using this application,please contact us through contact form or by emailing us for getting password.We will give you the password of the file within 24 hours.


FOR MORE INFORMATION,JOIN OUR NERD PROGRAMMER FACEBOOK GROUP.

PLEASE DON'T FORGET TO SHARE THIS INFORMATION WITH YOUR FRIENDS.

    NOTE:ABOVE INFORMATION IS FOR EDUCATION AND SECURITY PURPOSE ONLY.IF YOU MISUSE OR MISTREAT THE ABOVE INFORMATION,THEN IT CAN BRING UNLAWFUL CHARGES BY THE PERSON ON WHOM YOU USED THIS TRICK.THE AUTHOR WILL NOT BE RESPONSIBLE IN THE EVENT ANY UNLAWFUL CHARGES ARE BROUGHT TO YOU BY ANY INDIVIDUALS BY MISUSING THE ABOVE INFORMATION.WE WON'T TAKE RESPONSIBILITY FOR ANY OF YOUR ACTION RELATED TO ABOVE INFORMATION.

Protected by Copyscape DMCA Takedown Notice Checker

Sunday, 30 March 2014

CRIOGENIC CRYPTER

WHAT IS CRYPTER?

Crypter is a software which is used by hacker's to hide  viruses, keyloggers or tools in any kind of file so that they do not easily get detected by antiviruses.By using crypter,any programmer can encrypt the source code of their virus,worm or any type of program to bypass antivirus detection.

Features of CRIOGENIC CRYPTER v0.3:

  1. Obfuscation.
  2. Real API's selection.
  3. Crypt files.
  4. Normal(8) encryption mode.
  5. High(11) encryption mode.
  6. Extreme(15) encryption mode.
  7. Max(20) encryption mode.
Click To Download CRIOGENIC CRYPTER.

    PLEASE DON'T FORGET TO SHARE THIS INFORMATION WITH YOUR FRIENDS.

    NOTE:ABOVE INFORMATION IS FOR EDUCATION AND SECURITY PURPOSE ONLY.IF YOU MISUSE OR MISTREAT THE ABOVE INFORMATION,THEN IT CAN BRING UNLAWFUL CHARGES BY THE PERSON ON WHOM YOU USED THIS TRICK.THE AUTHOR WILL NOT BE RESPONSIBLE IN THE EVENT ANY UNLAWFUL CHARGES ARE BROUGHT TO YOU BY ANY INDIVIDUALS BY MISUSING THE ABOVE INFORMATION.WE WON'T TAKE RESPONSIBILITY FOR ANY OF YOUR ACTION RELATED TO ABOVE INFORMATION.


Saturday, 15 March 2014

Heaven Crypter.

What is Crypter?

Crypter is a software which is used by hacker's to hide  viruses, keyloggers or tools in any kind of file so that they do not easily get detected by antiviruses.By using crypter,any programmer can encrypt the source code of their virus,worm or any type of program to bypass antivirus detection.


Features Of Heaven Crypter:

  1. Icon Changer (Real Icon or Steal Icon).
  2. Melt any Output.
  3. P2P Spreading.
  4. Record Used Setting  logs.
  5. Visit Website anytime.
  6. Execution Delay(execution timer).
  7. Preverse EOF Data.
  8. Add any script or source code to Start Up (HK_Current User, HK_Local Machine).
  9. Remove Paddings.
  10. Hide Files.
  11. Read Only Files.
  12. Install Location Changer.
  13. Multiple Compiler Options.
  14. Custom Process Blacklist.
  15. Antis.
  16. Block Sites.
  17. Assembly code Editor.
  18. In-built Script Compiler.
  19. Scan File.
  20. Hex Code Viewer.
  21. Produce Fake Message.
  22. File Binding.
Click To Download Heaven Crypter.

Alternate download link:
    PLEASE DON'T FORGET TO SHARE THIS INFORMATION AND APPLICATION WITH YOUR FRIENDS.

    NOTE:ABOVE INFORMATION IS FOR EDUCATION AND SECURITY PURPOSE ONLY.IF YOU MISUSE OR MISTREAT THE ABOVE INFORMATION,THEN IT CAN BRING UNLAWFUL CHARGES BY THE PERSON ON WHOM YOU USED THIS TRICK.THE AUTHOR WILL NOT BE RESPONSIBLE IN THE EVENT ANY UNLAWFUL CHARGES ARE BROUGHT TO YOU BY ANY INDIVIDUALS BY MISUSING THE ABOVE INFORMATION.WE WON'T TAKE RESPONSIBILITY FOR ANY OF YOUR ACTION RELATED TO ABOVE INFORMATION.


DW Admin and Login Finder.

What is Admin Login Finder?

Admin Login Finder is an application used for penetration script let you find the admin panel of the any website which you want.It finds the admin panels via Dictionary Attack method through an internal hosted list and shows the admin panel.Before using this i will suggest you to change your ip address and be stealth so that no one can track your location.
In this post,i am going to share a software "DW Admin and Login Finder v1.1" which will help you out to find the admin login panel of any website.


Features of DW Admin and Login Finder:

  1. Find Admin Login Panel.
  2. Fast Scan.
  3. Full Scan.
  4. Index Of.

Alternate download link..

    PLEASE DON'T FORGET TO SHARE THIS INFORMATION AND APPLICATION WITH YOUR FRIENDS.

    NOTE:ABOVE INFORMATION IS FOR EDUCATION AND SECURITY PURPOSE ONLY.IF YOU MISUSE OR MISTREAT THE ABOVE INFORMATION,THEN IT CAN BRING UNLAWFUL CHARGES BY THE PERSON ON WHOM YOU USED THIS TRICK.THE AUTHOR WILL NOT BE RESPONSIBLE IN THE EVENT ANY UNLAWFUL CHARGES ARE BROUGHT TO YOU BY ANY INDIVIDUALS BY MISUSING THE ABOVE INFORMATION.WE WON'T TAKE RESPONSIBILITY FOR ANY OF YOUR ACTION RELATED TO ABOVE INFORMATION.


Andreinick05's Virus Maker.

nerdprogrammer.in


What is Computer Virus?

A computer virus is a stealth program that is injected into your computer without your knowledge and runs against your wishes and frustrate you some time. Viruses can also replicate themselves. All computer viruses are man-made.A virus can replicates itself by being copied or initiating its copy to another program, computer boot sector or files,etc.Some viruses are also used to get useful information of users like credit card details,email-id passwords,etc.
Today i am going to share "Andreinick05's Batch Virus Maker"  which will help you to make some viruses easily.

 Andreinick05's Batch Virus Maker by nerdprogrammer.in

 Andreinick05's Batch Virus Maker by nerdprogrammer.in

 Andreinick05's Batch Virus Maker by nerdprogrammer.in

Features of Andreinick05's Batch Virus Maker:

  1. Disable Mouse.
  2. Disable Keyboard.
  3. Disable Internet.
  4. Swap Mouse Buttons.
  5. Infect RAR files.
  6. Infect BAT files.
  7. Infect "Is" CMD.
  8. Infect All Folders.
  9. Infect Auto Execution.
  10. Infect All Drives.
  11. Infect EXE Files.
  12. Run as Service.
  13. Delete All files (extension).
  14. Delete Hal.Dll.
  15. Delete My Documents.
  16. Open a Website.
  17. Format Selected Drives.
  18. Add to Start up.
  19. Virus Extension Changer.
  20. Custom Message Box.
  21. Shout Message Timer.
  22. Change Drive Name.
  23. Custom Command.
  24. Change User Password.
  25. Disable Windows Defender.
  26. Disable Windows Security Center.
  27. Disable Windows Firewall.
  28. Disable Windows Update.
  29. Disable Windows Back Up.
  30. Notepad Spam.
  31. Calculator Spam.
  32. Spam C Drive.
  33. AV Kill.
  34. Kill explorer.exe.
  35. Encrypted AV Kill.
  36. Netsend Spam.
  37. Message Box Spam.
  38. System Crash.

PLEASE DON'T FORGET TO SHARE THIS APPLICATION WITH YOUR FRIENDS.

NOTE:ABOVE INFORMATION IS FOR EDUCATION AND SECURITY PURPOSE ONLY.IF YOU MISUSE OR MISTREAT THE ABOVE INFORMATION,THEN IT CAN BRING UNLAWFUL CHARGES BY THE PERSON ON WHOM YOU USED THIS TRICK.THE AUTHOR WILL NOT BE RESPONSIBLE IN THE EVENT ANY UNLAWFUL CHARGES ARE BROUGHT TO YOU BY ANY INDIVIDUALS BY MISUSING THE ABOVE INFORMATION.WE WON'T TAKE RESPONSIBILITY FOR ANY OF YOUR ACTION RELATED TO ABOVE INFORMATION.


Sunday, 9 March 2014

Sonic Virus Creator.


What is Computer Virus?

A computer virus is a stealth program that is injected into your computer without your knowledge and runs against your wishes and frustrate you some time. Viruses can also replicate themselves. All computer viruses are man-made.A virus can replicates itself by being copied or initiating its copy to another program, computer boot sector or files,etc.Some viruses are also used to get useful information of users like credit card details,email-id passwords,etc.
In this post i am sharing "Sonic Bat-Batch File Virus Creator" with you all.This software will help you out to make some deadly computer viruses easily as you just need to to hit add the code of given viruses and when all viruses codes have been added by you,just hit the build and your virus will be ready to harm your victim's computer.

What is Sonic Bat-Batch File Virus Creator?

Sonic Bat-Batch File Virus Creator is a small tool which is made to generate the batch files codes for reboot,formatting,disabling regedit,etc on a single click.This tools combines all the batch file codes as per the user which can perform different task in a single batch file name as sonic.bat.

Features of Sonic Bat-Batch File Virus Creator.

  1. Change Log On Password.
  2. Change Time.
  3. Add Any Number Of New User.
  4. Disable Mouse.
  5. Disable Keyboard.
  6. Fork Bomb.
  7. Delete/Format System drive(C:).
  8. Drive Rename.
  9. Folder Flood(Desktop,Music,Picture,Root,Doc,System32,Windows,Programs)
  10. Swap Mouse Button.
  11. Print Alert Message
  12. Message Execution Timer.
  13. Shutdown With Option(Reboot,Log Off,Shutdown and Abort).
  14. Run On Startup. 
Click To Download Sonic Bat.

PLEASE DON'T FORGET TO SHARE THIS INFORMATION WITH YOUR FRIENDS.

NOTE:ABOVE INFORMATION IS FOR EDUCATION AND SECURITY PURPOSE ONLY.IF YOU MISUSE OR MISTREAT THE ABOVE INFORMATION,THEN IT CAN BRING UNLAWFUL CHARGES BY THE PERSON ON WHOM YOU USED THIS TRICK.THE AUTHOR WILL NOT BE RESPONSIBLE IN THE EVENT ANY UNLAWFUL CHARGES ARE BROUGHT TO YOU BY ANY INDIVIDUALS BY MISUSING THE ABOVE INFORMATION.WE WON'T TAKE RESPONSIBILITY FOR ANY OF YOUR ACTION RELATED TO ABOVE INFORMATION.


Sunday, 2 March 2014

Yahoo Password Sender.

yahoo password stealer by nerd programmer

Yahoo Password Sender is a password stealer software.Password Stealers are malwares which are specially programmed and designed in such a way that it just transfer personal information like username,password,etc.
This Yahoo Password Sender transmits the username and password of the yahoo mail from the victims PC.
All you need to do is just put the require information in the software and click on build.It will build a exe file.Test the exe file and then just put this exe file in victim's computer.

Features of Yahoo Password Stealer:

  1. Steals yahoo password from victims computer.
  2. Includes Email login.
  3. Includes FTP login.
  4. Includes Icon(.ico) changer to change Icon.
  5. Includes server path change.
  6. Create Fake Error's.
  7. Include server extension changer.
  8.  Includes registry setting changer.

Join Our Facebook Group for Latest Updates
PLEASE DON'T FORGET TO SHARE THIS INFORMATION WITH YOUR FRIENDS.

NOTE:ABOVE INFORMATION IS FOR EDUCATION AND SECURITY PURPOSE ONLY.IF YOU MISUSE OR MISTREAT THE ABOVE INFORMATION,THEN IT CAN BRING UNLAWFUL CHARGES BY THE PERSON ON WHOM YOU SET THIS TRAP.THE AUTHOR WILL NOT BE RESPONSIBLE IN THE EVENT ANY UNLAWFUL CHARGES ARE BROUGHT TO YOU BY ANY INDIVIDUALS BY MISUSING THE ABOVE INFORMATION.WE WON'T TAKE RESPONSIBILITY FOR ANY OF YOUR ACTION RELATED TO ABOVE INFORMATION.

Sunday, 23 February 2014

Admin Login Finder.

What is Admin Login Finder?
Admin Login Finder is an application used for penetration script let you find the admin panel of the any website which you want.It finds the admin panels via Dictionary Attack method through an internal hosted list and shows the admin panel.Before using this i will suggest you to change your ip address and be stealth so that no one can track your location.



Features of Admin Login Finder
  1. It uses keywords that are of10 different languages.
  2. Choice to response time.
  3. Choice to user angent.
  4. Choice to page sourse code.
  5. Mix list by including php and asp paths.
  6. Shows the user ip address.
  7. Shows the site ip address.
  8. Shows the reverse dns.
  9. Redirect to online ip reverser.
  10. Shows sites which are hosted on  same ip address.
  11. Shows the robots.txt if it can be read.
  12. Shows the results found items.
  13. Shows Result not found items.
    PLEASE DON'T FORGET TO SHARE THIS INFORMATION WITH YOUR FRIENDS.

    NOTE:ABOVE INFORMATION IS FOR EDUCATION AND SECURITY PURPOSE ONLY.IF YOU MISUSE OR MISTREAT THE ABOVE INFORMATION,THEN IT CAN BRING UNLAWFUL CHARGES BY THE PERSON ON WHOM YOU USED THIS TRICK.THE AUTHOR WILL NOT BE RESPONSIBLE IN THE EVENT ANY UNLAWFUL CHARGES ARE BROUGHT TO YOU BY ANY INDIVIDUALS BY MISUSING THE ABOVE INFORMATION.WE WON'T TAKE RESPONSIBILITY FOR ANY OF YOUR ACTION RELATED TO ABOVE INFORMATION.

Friday, 21 February 2014

AIO Crypter


What is Crypter?

Crypter is a software which is used by hacker's to hide  viruses, keyloggers or tools in any kind of file so that they do not easily get detected by antiviruses.By using crypter,any programmer can encrypt the source code of their virus,worm or any type of program to bypass antivirus detection.
NOTE:Some antivirus will detect this software as a virus as this application is blacklisted because it is mostly used by hacker's.

Features:

  1. Crypter.
  2. Binder.
  3. Bitcoin Miner.
  4. Extension Spoofer.
  5. Obfuscator.
  6. Icon Changer.
  7. Downloader.
    Click To Download AIO Crypter.

    Alternate Downloading link.
    PLEASE DON'T FORGET TO SHARE THIS INFORMATION WITH YOUR FRIENDS.

    NOTE:ABOVE INFORMATION IS FOR EDUCATION AND SECURITY PURPOSE ONLY.IF YOU MISUSE OR MISTREAT THE ABOVE INFORMATION,THEN IT CAN BRING UNLAWFUL CHARGES BY THE PERSON ON WHOM YOU USED THIS TRICK.THE AUTHOR WILL NOT BE RESPONSIBLE IN THE EVENT ANY UNLAWFUL CHARGES ARE BROUGHT TO YOU BY ANY INDIVIDUALS BY MISUSING THE ABOVE INFORMATION.WE WON'T TAKE RESPONSIBILITY FOR ANY OF YOUR ACTION RELATED TO ABOVE INFORMATION.

Wednesday, 19 February 2014

Deadly Virus Maker.


What is Computer Virus?
A computer virus is a stealth program that is injected into your computer without your knowledge and runs against your wishes and frustrate you some time. Viruses can also replicate themselves. All computer viruses are man-made.A virus can replicates itself by being copied or initiating its copying to another program, computer boot sector or files,etc.Some viruses are also used to get useful information of users like credit card details,email-id passwords,etc.
In this post i am sharing "Deadlines Virus Maker" with you all.This software will help you out to make some computer viruses easily.



Features Deadlines Virus Maker:




  1. Show message box at Windows Start-up.
  2. Can be added to Start-up.
  3. Close Widows Live Messenger.
  4. Close Skype.
  5. Close Yahoo Messenger.
  6. Random things happens to computer.
  7. Infinite Beeping.
  8. Infinite Message Boxes.
  9. Disconnect from the Internet.
  10. Disable Firewall.
  11. Disable Browser(Chrome,Firefox & IE).
  12. Open Random files.
  13. Force Shutdown.
  14. Disable Task Manager.
  15. Disable Command Prompt.
  16. Disable Reg-edit.
  17. Disable Windows Explorer.
  18. Randomly Move Mouse.
  19. Press Keyboard keys Randomly.
  20. Slow Computer.
  21. Force Restart.
  22. Crazy CD Drive.
  23. Disable Mouse.
  24. Delete Clipboard Text.
  25. Kill every process.
  26. Disable Calculator.
  27. Disable Notepad.
  28. File Pumper.
  29. File Binder.
  30. Extension Spoofer.
  31. Visit random URL at random time.



    PLEASE DON'T FORGET TO SHARE THIS INFORMATION WITH YOUR FRIENDS.

    NOTE:ABOVE INFORMATION IS FOR EDUCATION AND SECURITY PURPOSE ONLY.IF YOU MISUSE OR MISTREAT THE ABOVE INFORMATION,THEN IT CAN BRING UNLAWFUL CHARGES BY THE PERSON ON WHOM YOU USED THIS TRICK.THE AUTHOR WILL NOT BE RESPONSIBLE IN THE EVENT ANY UNLAWFUL CHARGES ARE BROUGHT TO YOU BY ANY INDIVIDUALS BY MISUSING THE ABOVE INFORMATION.WE WON'T TAKE RESPONSIBILITY FOR ANY OF YOUR ACTION RELATED TO ABOVE INFORMATION.

    StRaXxXD Binder v1.0.


    What is File Binder?
    File binders are applications that allow a user to "bind" multiple files together resulting in a single executable. They are useful for hackers to insert other applications such as trojan horse executables into other harmless files, making them more difficult to detect. Malware builders (such as keyloggers or stealers) often include a binder by default.
    In this post i am sharing a software "StRaXxXD Binder v1.0" which is a very powerfull binding tool.As this software is black-listed,your antivirus may detect it as virus.So i suggest you to disable your antivirus and use this software.




    PLEASE DON'T FORGET TO SHARE THIS INFORMATION WITH YOUR FRIENDS.

    NOTE:ABOVE INFORMATION AND APPLICATION IS FOR EDUCATION AND SECURITY PURPOSE ONLY.IF YOU MISUSE OR MISTREAT THE ABOVE INFORMATION,THEN IT CAN BRING UNLAWFUL CHARGES BY THE PERSON ON WHOM YOU USED THIS TRICK.THE AUTHOR WILL NOT BE RESPONSIBLE IN THE EVENT ANY UNLAWFUL CHARGES ARE BROUGHT TO YOU BY ANY INDIVIDUALS BY MISUSING THE ABOVE INFORMATION.WE WON'T TAKE RESPONSIBILITY FOR ANY OF YOUR ACTION RELATED TO ABOVE INFORMATION.



    Tuesday, 18 February 2014

    OurScerets.


    What is Steganography?

    Steganography is a way or lets say technique of encoding hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message.
    In this post,I have presented the software name Our Secret, which hide your private data in the other file.


    Data transmissions are vital,important and have became a necessity nowadays. Whether you share your private messages with your close friends, or business/commercial secrets with your partners, you must protect your confidential information from hackers,from various social networking sites like facebook.com,google.com,twitter.com,gmail.com,hotmail.com,etc, your boss, or your competitors. But,we are living in an insecure world where unwanted persons can access our personal information (like e-mails or personal documents) and often use it against us.
    OurSecret is a special software which enables you to hide and encrypt files within other files (called carrier files) such as pictures or sound files.This allows you to encrypt sensitive information,while at the same time hiding it in a file that will not look suspicious,so no-one ever knows that there is any encrypted information.The carrier files are fully functional and identical to the original files (except for the size), so if the message was hidden in a picture file,the picture can still be viewed normally.The program gives you options to hide a text message,or any files that you want.You can specify a password to extract the hidden files.

    Steps To Hide Data:

    1. Download and install the OurScerets-Steganography Tool.
    2. Open the OurScerets-Steganography Tool and click on folder image right next to select the carrier file below the HIDE section.
    3. A new small window will open,browse to your carrier file and select it and click on ok.
    4. Then click on "ADD",a new window will open asking you whether you want to hide text message or any other file,select the desired option .
    5. Once you have selected the data you want to hide,next step is to password protect it so no one can access it,enter  password in the password field and click on "HIDE" button.
    6. Voila,your data is hided.

    Steps to un-hide data:

    1. Open the OurScerets-Steganography Tool and click on folder image right next to select carrier file in UNHIDE section.
    2. A new window will open,browse and locate your carrier file in which your data is present.
    3. Enter the password which was used during the  encryption of data and then click on "UNHIDE" button.
    4. Voila,your data will be unhided wihtout any loss.


    PLEASE DON'T FORGET TO SHARE THIS INFORMATION WITH YOUR FRIENDS.

    NOTE:ABOVE INFORMATION IS FOR EDUCATION AND SECURITY PURPOSE ONLY.IF YOU MISUSE OR MISTREAT THE ABOVE INFORMATION,THEN IT CAN BRING UNLAWFUL CHARGES BY THE PERSON ON WHOM YOU USED THIS TRICK.THE AUTHOR WILL NOT BE RESPONSIBLE IN THE EVENT ANY UNLAWFUL CHARGES ARE BROUGHT TO YOU BY ANY INDIVIDUALS BY MISUSING THE ABOVE INFORMATION.WE WON'T TAKE RESPONSIBILITY FOR ANY OF YOUR ACTION RELATED TO ABOVE INFORMATION.

    Best Hacking Tools.

    Hacking and security by nerd programmer


    Wireless Hacking: There are tools that help you hack into wireless networks. Wireless hacking tools though useful, do not make you a complete hacker. In order to achieve that, you must learn the different ways in which a secure network can be accessed. Also, you should work on making your own network as secure as possible.Here below are some tools used for wireless hacking.
    1. Aircrack-ng
    2. Kismet
    3. inSSIDer
    4. KisMAC
    Intrusion Detection Systems: Intrusion detection tools are one of the most important part of any security arrangement. They allow you to detect those threats that are potentially dangerous for your system.

    Encryption Tools: In an age where more and more governments are being found spying on their own citizens, encryption is the word of the day. These tools allow you to encrypt your data so that even if someone does get through, they can’t get to the data easily.
    1. TrueCrypt
    2. OpenSSH
    3. Putty
    4. OpenSSL
    5. Tor
    6. OpenVPN
    7. Stunnel
    8. KeePass
    Password Crackers: The name is pretty self explanatory in this case. These tools help you recover passwords from the data that a computer system is storing or transmitting over a network.
    1. Ophcrack
    2. Medusa
    3. RainbowCrack
    4. Wfuzz
    5. Brutus
    6. L0phtCrack
    7. fgdump
    8. THC Hydra
    9. John The Ripper
    10. Aircrack - Aircrack is 802.11 WEP and WPA-PSK keys cracking program.
    11. Cain and Abel
    Packet Crafting:Packet crafting is the technique through which an attacker finds vulnerabilities or entry points within your firewall. These tools help you achieve that more easily.
    1. Hping
    2. Scapy
    3. Netcat
    4. Yersinia
    5. Nemesis
    6. Socat
    Traffic Monitoring: These are tools that let you monitor what websites your employees or children are monitoring. 
    1. Splunk
    2. Nagios
    3. P0f
    4. Ngrep
    Packet Sniffers: These are tools that can allow you to capture and visualise the traffic that is coming on your website.
    1. Wireshark
    2. Tcpdump
    3. Ettercap
    4. dsniff
    5. EtherApe
    Vulnerability Exploitation: These are the tools that you would use in order to gain access to various places.
    1. Metasploit
    2. sqlmap
    3. sqlninja
    4. Social Engineer Toolkit
    5. NetSparker
    6. BeEF
    7. Dradis
    Vulnerability Scanners: These are programs that have been designed to asses a computer or network’s vulnerability to attacks. The functionality of these tools varies from one to the other, but they all present a detailed analysis of how vulnerable your system is.
    1. Nessus
    2. OpenVAS
    3. Nipper
    4. Secunia PSI
    5. Retina
    6. QualysGuard
    7. Nexpose
    Web Vulnerability Scanners:While vulnerability scanners are meant for your system, web vulnerability scanners assess the vulnerability of web applications. The identify the security vulnerabilities that your app may have through various tests.

    1. Burp Suite
    2. WebScarab
    3. Websecurify
    4. Nikto
    5. w3af
    Web Proxies: Proxies were originally created in order to add encapsulation to distributed systems. The client contacts a proxy server in order to request an item that exists on your server.

    1. Paros
    2. Fiddler
    3. Ratproxy
    4. sslstrip
    Rootkit Detectors:This tool is a file and directory integrity checker. It verifies if a file is trustworthy and informs the user if found otherwise.
    AIDE (Advanced Intrusion Detection Environment)

    Firewalls:
    You obviously know what a Firewall is. These monitor and control the traffic in your network, whether incoming or outgoing. They are essential security tools that are used by the most novice to the most advanced users.

    1. Netfilter
    2. PF: OpenBSD Packet Filter
    Fuzzers: The concept of fuzzing is usually put to use in order to test the security vulnerabilities of computer systems or in the software that runs on them.

    1. skipfish
    2. Wfuzz
    3. Wapiti
    4. W3af
    Forensics: This refers to tools that are used for computer forensic. They are used in order to find evidence that is existing in computer systems.

    1. Sleuth Kit
    2. Helix
    3. Malteg0
    4. Encase
    Debuggers: These are tools that are used in order to write exploits, reverse engineer binary files and to analyse malware.
    1. GDB
    2. Immunity Debugger

    Hacking Operating Systems: These are operating systems that have been designed specifically for hackers. These distros are preloaded with tools that a hacker needs etc.
    1. Backtrack 5r3
    2. Kali Linux
    3. SELinux
    4. Knoppix
    5. BackBox Linux
    6. Pentoo
    7. Matriux Krypton
    8. NodeZero
    9. Blackbuntu
    10. Samurai Web Testing Framework
    11. WEAKERTH4N
    12. CAINE (Computer Aided Investigative Environment)
    13. Bugtraq
    14. DEFT
    15. Helix
    Other Hacking Tools: There are also other miscellaneous hacking tools that are often used by hackers. They can’t be put into a particular category, but they are still quite useful.
    1. Netcat
    2. Traceroute
    3. Ping.eu
    4. Dig
    5. CURL

    Here is a list of the best hacking tools available online.

    NMAP
    This easy to use and widely useful hacking tool is considered by many to be the best ever. NMAP brings options like fingerprinting, pink scanning, port scanning, OS detection, alive hosts detection etc.

    SUPERSCAN 
    Many Windows users swear by this hacking tool. It is a very powerful protocol port scanner, resolver and pinger. Some say it’s the NMAP alternative for Windows.

    CAIN AND ABEL
     While we’re talking about Windows, Cain & Abel is a powerful recovery tools for the Microsoft OS. It brings to the table options like cracking encrypted passwords, sniffing the network, Brute-Force, recording VoIP conversations and cryptology attacks etc.

    JOHN THE RIPPER
    The collective efforts of the open source community brought about this tool. You can use it as a quick password cracker and it is available for multiple platforms. The software is primarily meant to monitor weak operating systems.

    NESSUS SECURITY SCANNER
    This is a very functional and simple tool for network administrators and hackers. The vulnerability scanner has wide implementation and boasts high-speed discovery, quality identification, configuration auditing and sensitive information discovery for one’s security infrastructure.

    WIRESHARK
    This is a network protocol analyser, which can be used in order to capture and interactively browse through the content of a network frame. Wireshark is meant to be a quality analyser for Unix but it works pretty well on Windows too.

    LIVE BULK MAILER:
    As the name suggests, this is a bulk mailer that can beat the spam filters put in place by Gmail, Hotmail and Yahoo. If sending bulk mails is what you’re looking at, then this is a tool for you.

    WEBSITE DIGGER:
    The name is pretty self explanatory for this one. You can dig into a website and gain access to their content.


    PLEASE DON'T FORGET TO SHARE THIS INFORMATION WITH YOUR FRIENDS.

     

    Subscribe to our Newsletter

    Contact our Support

    Email us: nerdprogrammergm@gmail.com

    Our Team Memebers