Wednesday, 28 August 2013


ANONYMOUS-OS

Anonymous Hackers released their own Operating System with name "Anonymous-OS", is Live is an ubuntu-based distribution and created under Ubuntu 11.10 and uses Mate desktop. You can create the LiveUSB with Unetbootin.





DOWNLOAD ANONYMOUS-OS




Pre-installed apps on Anonymous-OS ?
- ParolaPass Password Generator

- Find Host IP

- Anonymous HOIC

- Ddosim

- Pyloris

- Slowloris

- TorsHammer

- Sqlmap

- Havij

- Sql Poison

- Admin Finder

- John the Ripper

- Hash Identifier

 - Tor

- XChat IRC

- Pidgin

- Vidalia

- Polipo

- JonDo

- i2p

- Wireshark

- Zenmap

…and more
Download Anonomous-OS

Like Us On Facebook To Download

Warning : It is not developed by any Genuine Source, can be backdoored OS by any Law enforcement Company or Hacker. Use at your own Risk.
Update: Another Live OS for anonymity available called "Tails". Which is a live CD or live USB that aims at preserving your privacy and anonymity.It helps you to use the Internet anonymously almost 
anywhere you go and on any computer:all connections to the Internet are forced to go through the Tor network or to leave no trace on the computer you're using unless you ask it explicitly, or use state-of-the-art cryptographic tools to encrypt your files, email and instant messaging.

Note: This tutorial is only for Educational Purposes, I  DO NOT take any responsibility of any misuse, you will be solely responsible for any misuse that you do. Hacking email accounts is criminal activity and is punishable under cyber crime and you may get upto 40 years of imprisonment, if got caught in doing so. 
 HAVE A HAPPY HACKING.......

Download ANONYMOUS-OS

at 08:09  |  No comments


ANONYMOUS-OS

Anonymous Hackers released their own Operating System with name "Anonymous-OS", is Live is an ubuntu-based distribution and created under Ubuntu 11.10 and uses Mate desktop. You can create the LiveUSB with Unetbootin.





DOWNLOAD ANONYMOUS-OS




Pre-installed apps on Anonymous-OS ?
- ParolaPass Password Generator

- Find Host IP

- Anonymous HOIC

- Ddosim

- Pyloris

- Slowloris

- TorsHammer

- Sqlmap

- Havij

- Sql Poison

- Admin Finder

- John the Ripper

- Hash Identifier

 - Tor

- XChat IRC

- Pidgin

- Vidalia

- Polipo

- JonDo

- i2p

- Wireshark

- Zenmap

…and more
Download Anonomous-OS

Like Us On Facebook To Download

Warning : It is not developed by any Genuine Source, can be backdoored OS by any Law enforcement Company or Hacker. Use at your own Risk.
Update: Another Live OS for anonymity available called "Tails". Which is a live CD or live USB that aims at preserving your privacy and anonymity.It helps you to use the Internet anonymously almost 
anywhere you go and on any computer:all connections to the Internet are forced to go through the Tor network or to leave no trace on the computer you're using unless you ask it explicitly, or use state-of-the-art cryptographic tools to encrypt your files, email and instant messaging.

Note: This tutorial is only for Educational Purposes, I  DO NOT take any responsibility of any misuse, you will be solely responsible for any misuse that you do. Hacking email accounts is criminal activity and is punishable under cyber crime and you may get upto 40 years of imprisonment, if got caught in doing so. 
 HAVE A HAPPY HACKING.......

Read More

0 comments:

Tuesday, 20 August 2013

Original Facebook Profiles Of Top 15 Bollywood Celebrities

Hello Readers have you ever came across the Facebook fan pages of  Bollywood celebrities ? Well you may be visited the  fan pages but did you ever seen their original Facebook  pages ? Many of you will say no.But here we are providing the original Facebook pages of some top Bollywood celebrities.Below we are provided the names and likes of their pages.They are ranked according to the number of likes.





A.R.Rahman[10,31,37,320+ Likes]


Salman Khan [75,88,472+ Likes]


Shreya Ghosal [70,55,638+ Likes]


Aamir Khan[65,00,536+Likes]


Atif Aslam[45,82,526+Likes]


Amitabh Bhachchan [36,77,010+Likes]


Priyanka Chopra [36,01,375+Likes]


Hrithik Roshan [35,51,205+Likes]


Akshay Kumar[34,10,118+Likes]


Shahrukh Khan [34,28,038+Likes]


Sunidhi Chauhan [20,95,254+Likes]


Ali Zafar[15,93,562+Likes]


Sonam Kapoor [15,24,946+Likes]


Shankar Mahadevan [11,84,544+Likes]


Mohit Chauhan [10,13,878]

Original Facebook Profiles Of Top 15 Bollywood Celebrities

at 08:27  |  No comments

Original Facebook Profiles Of Top 15 Bollywood Celebrities

Hello Readers have you ever came across the Facebook fan pages of  Bollywood celebrities ? Well you may be visited the  fan pages but did you ever seen their original Facebook  pages ? Many of you will say no.But here we are providing the original Facebook pages of some top Bollywood celebrities.Below we are provided the names and likes of their pages.They are ranked according to the number of likes.





A.R.Rahman[10,31,37,320+ Likes]


Salman Khan [75,88,472+ Likes]


Shreya Ghosal [70,55,638+ Likes]


Aamir Khan[65,00,536+Likes]


Atif Aslam[45,82,526+Likes]


Amitabh Bhachchan [36,77,010+Likes]


Priyanka Chopra [36,01,375+Likes]


Hrithik Roshan [35,51,205+Likes]


Akshay Kumar[34,10,118+Likes]


Shahrukh Khan [34,28,038+Likes]


Sunidhi Chauhan [20,95,254+Likes]


Ali Zafar[15,93,562+Likes]


Sonam Kapoor [15,24,946+Likes]


Shankar Mahadevan [11,84,544+Likes]


Mohit Chauhan [10,13,878]

Read More

0 comments:

Wednesday, 14 August 2013


Today, I am talking about how to download paid android applications for free. We know android apps store is very popular apps store and adding daily latest applications. Many applications developers earning by it, for this they providing applications in paid version. In Android Phone, We all use Google Play Store to download various applications like whatsapp, but some applications is in paid version, you need to paid some dollars to download these applications. Today, I  find a trick to download paid android applications for free. Blackmart Alpha is the application for android to download all paid applications for free.

   
How to Download Android Apps for Free :

  • Download Blackmart Alpha Application From Below
  • Install it in your Android Phone.
  • Open Google Play Store and search any paid application.
  • Pick Name of any paid application which you want to download.
  • Now Open Blackmart Alpha Application.
  • Search the name of application (paid in google play store).
  • After find any application (paid in google play store) and click to download.
  • Install in your phone.

To Download Blackmart Alpha Apps. Like Us On Facebook

Done ! In this way you download paid android applications for free.

How to Download Paid Android Apps and Games for Free

at 03:41  |  No comments


Today, I am talking about how to download paid android applications for free. We know android apps store is very popular apps store and adding daily latest applications. Many applications developers earning by it, for this they providing applications in paid version. In Android Phone, We all use Google Play Store to download various applications like whatsapp, but some applications is in paid version, you need to paid some dollars to download these applications. Today, I  find a trick to download paid android applications for free. Blackmart Alpha is the application for android to download all paid applications for free.

   
How to Download Android Apps for Free :

  • Download Blackmart Alpha Application From Below
  • Install it in your Android Phone.
  • Open Google Play Store and search any paid application.
  • Pick Name of any paid application which you want to download.
  • Now Open Blackmart Alpha Application.
  • Search the name of application (paid in google play store).
  • After find any application (paid in google play store) and click to download.
  • Install in your phone.

To Download Blackmart Alpha Apps. Like Us On Facebook

Done ! In this way you download paid android applications for free.

Read More

0 comments:

Today, I am gonna tell you about the top 5 android app for hacking or Download 5 Best Android Hacking Tools. Recently , i posted some posts about hacking must check out in Hacking section.As we all know hacking and pen testing is only can be done on computers. But now the world is changing now your mobile is small hacking toolkit using these apps. Must try all these apps.






Download 5 Best Android Hacking Tools:

1. The Android Network Toolkit:
In the last Defcon conference a new tool has been released by a security researcher and the tool is called “The Android network toolkit”. The has been developed for penetration tester and ethical hackers to test any network and vulnerabilities by using their mobile phones. This toolkit contain different apps that will help any hacker to find vulnerabilities and possibly exploit it. The company behind the app is an Israeli security firm called Zimperium.

2. Nmap for Android:

Nmap (network mapper) is one the best among different network scanner (port finder) tool, Nmap mainly developed for Unix OS but now it is available on Windows and Android as well. Nmap for android is a Nmap apps for your phone! Once your scan finishes you can e-mail the results. This application is not a official apps but it looks good.

3. FaceNiff 2.4 final- Session Hijacker for Android:

Your Facebook account is at risk, just like a Firesheep (for firefox hacking) there is a FaceNiff for hijacking the session of famous social networking websites includes facebook and twitter. FaceNiff is developed by Bartosz Ponurkiewicz who created Firesheep before but faceniff is for android OS.

4. AnDOSid- DOS Tool for Android:

DOS or denial of service attack is very dangerous attack because it takes down the server
(computer).AnDOSid allows security professionals to simulate a DOS attack (A http post flood attack to be exact) and of course a dDOS on a web server, from mobile phones.AnDOSid is designed for security professionals only!

5. SSHDroid- Android Secure Shell:

Secure shell or SSH is the best protocol that provides an extra layer of security while you are connecting with your remote machine.SSHDroid is a SSH server implementation for Android.
This application will let you to connect to your device from a PC and execute commands (like "terminal" and "adb shell").

Download 5 Best Android Hacking Tools

at 03:10  |  No comments

Today, I am gonna tell you about the top 5 android app for hacking or Download 5 Best Android Hacking Tools. Recently , i posted some posts about hacking must check out in Hacking section.As we all know hacking and pen testing is only can be done on computers. But now the world is changing now your mobile is small hacking toolkit using these apps. Must try all these apps.






Download 5 Best Android Hacking Tools:

1. The Android Network Toolkit:
In the last Defcon conference a new tool has been released by a security researcher and the tool is called “The Android network toolkit”. The has been developed for penetration tester and ethical hackers to test any network and vulnerabilities by using their mobile phones. This toolkit contain different apps that will help any hacker to find vulnerabilities and possibly exploit it. The company behind the app is an Israeli security firm called Zimperium.

2. Nmap for Android:

Nmap (network mapper) is one the best among different network scanner (port finder) tool, Nmap mainly developed for Unix OS but now it is available on Windows and Android as well. Nmap for android is a Nmap apps for your phone! Once your scan finishes you can e-mail the results. This application is not a official apps but it looks good.

3. FaceNiff 2.4 final- Session Hijacker for Android:

Your Facebook account is at risk, just like a Firesheep (for firefox hacking) there is a FaceNiff for hijacking the session of famous social networking websites includes facebook and twitter. FaceNiff is developed by Bartosz Ponurkiewicz who created Firesheep before but faceniff is for android OS.

4. AnDOSid- DOS Tool for Android:

DOS or denial of service attack is very dangerous attack because it takes down the server
(computer).AnDOSid allows security professionals to simulate a DOS attack (A http post flood attack to be exact) and of course a dDOS on a web server, from mobile phones.AnDOSid is designed for security professionals only!

5. SSHDroid- Android Secure Shell:

Secure shell or SSH is the best protocol that provides an extra layer of security while you are connecting with your remote machine.SSHDroid is a SSH server implementation for Android.
This application will let you to connect to your device from a PC and execute commands (like "terminal" and "adb shell").

Read More

0 comments:

Top 15 Hacking Tools and Softwares For Beginners.


A Hacking tool is nothing but a device or a piece of software used by any unauthorized user to gain access or to attack any information available on your computer. Hacking tools try to bypass the security systems of any computer in order to gain copy or even to destroy information from its host. Here is a list of what is believed to be among the best of the hacking tools by most hackers. These tools are used only for ethical hacking purposes and are not illegal.

1. Nmap

The tool Network Mapper has gained immense popularity in recent times as it is an open source and a free tool which is used to explore networks and also in security auditing. It is designed to scan networks rapidly. It also copes very well against a single host. Nmap uses IP packets to determine what type of hosts are present in the network along with information on the applications being used by them and also the operating systems that they are running along with their respective versions. In additional to these it also identifies the firewalls being used and many more other characteristics of any given host.


2. Nessus Remote Security Scanner


The Nessus Security Scanner was started by Renaud Deraison in the year 1988 to provide a free remote scanner to the internet community. But since the year 2005 the Nessus Remote Security Scanner has become closed source software although the engine that runs the software is still free of cost.
The Nessus Security Scanner has been the world’s most popular scanner being used by well over 75000 organizations world-wide. Many have befitted from this software and it is being used extensively in auditing critical enterprise devices.


3. John the Ripper

John the Ripper commonly known as JTR is a password cracker available for DOS, WIN32, UNIX, OpenVMS and BeOS. Its primary purpose is to detect weak passwords, but at the same time can be very handy to crack passwords also.


4. Nikto

Nikto web scanner as the name suggests is an Open Source web scanner which is capable of performing comprehensive tests on any web server for multiple items, including some of the most potentially dangerous files or CGIs, versions in about 625 servers and version specific problems in about 230 servers.


5. SuperScan

SuperScan is a powerful TCP port scanner, resolver and also pinger. It is a very highly popular port scanning tools made especially for windows users. If you are looking for a substitute to Nmap with a good user interface, then SuperScan is your best bet.


6. p0f

p0f is an extremely versatile passive OS fingerprinting tool. It can identify the operating systems on SYN mode, SYN+ACK mode and also RST+ mode. The p0f software is so versatile that it can fingerprint anything without even making a single active connection to the target system.


7. Wireshark

Wireshark which was formerly known as ethereal is network protocol analyzer or in common terms a sniffer. Wireshark lets you browse and capture the contents of network frames. It is compatible with both windows and linux and is very user-friendly.


8. Yersinia

Yersinia is a hacking tool which is designed to manipulate the weaknesses in different Layer 2 protocols. It pretends like a solid framework for testing and analyzing the systems and networks it is deployed into. Spanning Tree Protocol (STP), Dynamic Trunking Protocol (DTP), Cisco Discovery Protocol (CDP), Hot Standby Router Protocol (HSRP), Dynamic Host Configuration Protocol (DHCP), VLAN Trunking Protocol (VTP), IEEE 802.1q and Inter-Switch Link Protocol (ISL), are some of the protocols which can be implemented.


9. Eraser

Eraser is an advanced security tool for windows used to completely remove any trace whatsoever of any bit of information permanently from the hard drive. This is achieved by continuously overwriting the memory locations where the targeted information was previously available. It works well on all the windows versions till windows xp. Eraser is a free tool which is available under the GNU General Public license.


10. PuTTY

PuTTY is a free software used for implementation of Telnet and SSH for UNIX and WIN32. It is an absolute necessity for any h4x0r to Telnet or SSH without using MS command line clients.
These are the most popular of the hacking tools that are being used widely there are also several other alternatives to these tools so feel free to experiment with other varieties of tools out there. Along with the above a few other software, which are almost similar to the ones mentioned above like LCP, Cain and Abel, Kismet and NetStumbler are also good and handy.


A collection of all the above would give any user enough power to be a good hacker. It is also important to note that the information furnished here is not meant to be used for illegal purposes and also that hacking is a punishable offence in most countries. Use these powerful tools wisely.

Top 15 Hacking Tools and Softwares For Beginners.

at 00:42  |  No comments

Top 15 Hacking Tools and Softwares For Beginners.


A Hacking tool is nothing but a device or a piece of software used by any unauthorized user to gain access or to attack any information available on your computer. Hacking tools try to bypass the security systems of any computer in order to gain copy or even to destroy information from its host. Here is a list of what is believed to be among the best of the hacking tools by most hackers. These tools are used only for ethical hacking purposes and are not illegal.

1. Nmap

The tool Network Mapper has gained immense popularity in recent times as it is an open source and a free tool which is used to explore networks and also in security auditing. It is designed to scan networks rapidly. It also copes very well against a single host. Nmap uses IP packets to determine what type of hosts are present in the network along with information on the applications being used by them and also the operating systems that they are running along with their respective versions. In additional to these it also identifies the firewalls being used and many more other characteristics of any given host.


2. Nessus Remote Security Scanner


The Nessus Security Scanner was started by Renaud Deraison in the year 1988 to provide a free remote scanner to the internet community. But since the year 2005 the Nessus Remote Security Scanner has become closed source software although the engine that runs the software is still free of cost.
The Nessus Security Scanner has been the world’s most popular scanner being used by well over 75000 organizations world-wide. Many have befitted from this software and it is being used extensively in auditing critical enterprise devices.


3. John the Ripper

John the Ripper commonly known as JTR is a password cracker available for DOS, WIN32, UNIX, OpenVMS and BeOS. Its primary purpose is to detect weak passwords, but at the same time can be very handy to crack passwords also.


4. Nikto

Nikto web scanner as the name suggests is an Open Source web scanner which is capable of performing comprehensive tests on any web server for multiple items, including some of the most potentially dangerous files or CGIs, versions in about 625 servers and version specific problems in about 230 servers.


5. SuperScan

SuperScan is a powerful TCP port scanner, resolver and also pinger. It is a very highly popular port scanning tools made especially for windows users. If you are looking for a substitute to Nmap with a good user interface, then SuperScan is your best bet.


6. p0f

p0f is an extremely versatile passive OS fingerprinting tool. It can identify the operating systems on SYN mode, SYN+ACK mode and also RST+ mode. The p0f software is so versatile that it can fingerprint anything without even making a single active connection to the target system.


7. Wireshark

Wireshark which was formerly known as ethereal is network protocol analyzer or in common terms a sniffer. Wireshark lets you browse and capture the contents of network frames. It is compatible with both windows and linux and is very user-friendly.


8. Yersinia

Yersinia is a hacking tool which is designed to manipulate the weaknesses in different Layer 2 protocols. It pretends like a solid framework for testing and analyzing the systems and networks it is deployed into. Spanning Tree Protocol (STP), Dynamic Trunking Protocol (DTP), Cisco Discovery Protocol (CDP), Hot Standby Router Protocol (HSRP), Dynamic Host Configuration Protocol (DHCP), VLAN Trunking Protocol (VTP), IEEE 802.1q and Inter-Switch Link Protocol (ISL), are some of the protocols which can be implemented.


9. Eraser

Eraser is an advanced security tool for windows used to completely remove any trace whatsoever of any bit of information permanently from the hard drive. This is achieved by continuously overwriting the memory locations where the targeted information was previously available. It works well on all the windows versions till windows xp. Eraser is a free tool which is available under the GNU General Public license.


10. PuTTY

PuTTY is a free software used for implementation of Telnet and SSH for UNIX and WIN32. It is an absolute necessity for any h4x0r to Telnet or SSH without using MS command line clients.
These are the most popular of the hacking tools that are being used widely there are also several other alternatives to these tools so feel free to experiment with other varieties of tools out there. Along with the above a few other software, which are almost similar to the ones mentioned above like LCP, Cain and Abel, Kismet and NetStumbler are also good and handy.


A collection of all the above would give any user enough power to be a good hacker. It is also important to note that the information furnished here is not meant to be used for illegal purposes and also that hacking is a punishable offence in most countries. Use these powerful tools wisely.

Read More

0 comments:

Wednesday, 7 August 2013

Ten simple tips to improve online security:

1. Install and update your security software and set it to scan regularly

2. Turn on automatic updates on all your software, particularly your operating system and applications

3. Use strong passwords and different passwords for different uses.
4. Stop and think before you click on links and attachments

5. Take care when buying online - research the supplier and use a safe payment method
 
6. Only download "apps" from reputable publishers and read all permission requests
 
7. Regularly check your privacy settings on social networking sites
 
8. Stop and think before you post any photos or financial information online
 
9. Talk with your child about staying safe online, including on their smart phone or mobile device
 
10. Report or talk to someone if you feel uncomfortable or threatened online - download the Government's Cybersafety Help Button

Ten simple tips to improve online security

at 22:18  |  No comments

Ten simple tips to improve online security:

1. Install and update your security software and set it to scan regularly

2. Turn on automatic updates on all your software, particularly your operating system and applications

3. Use strong passwords and different passwords for different uses.
4. Stop and think before you click on links and attachments

5. Take care when buying online - research the supplier and use a safe payment method
 
6. Only download "apps" from reputable publishers and read all permission requests
 
7. Regularly check your privacy settings on social networking sites
 
8. Stop and think before you post any photos or financial information online
 
9. Talk with your child about staying safe online, including on their smart phone or mobile device
 
10. Report or talk to someone if you feel uncomfortable or threatened online - download the Government's Cybersafety Help Button

Read More

0 comments:



How to secure your system from Keyloggers:

1: Good AntiVirus


This is basic and best step to protect your system fromkeylogger. So buy a licensed and best antivirus which is currently in market.Don't forget to update regularly.
Note: Don't use trial or cracked pack ,it is worthless to use.

2: Good Spyware:

Since keyloggers are basically spywares, if you are a frequent user of Internet then you could be exposed to thousands of keyloggers and spywares. So you should use a good antispyware such as NoAdware.

3: Antilogger

Antiloggers are programs that detect the presence of keyloggers on a given computer. Zemana Antilogger is the best antilogger,

4: Keyscrambler

Keyscrambler is a small program which encrypts your typed keystrokes so even if the victim has installed a keylogger on your system, he or she will get encrypted keys.

5: Virtual KeyBoard

Use Virtual keyboard in Public Places Like internet cafe because its good way to protect your data from Hardware Keylogger,its good to keep a portable keyboard always with you.

Feel Free to ask any doubt....

How to secure your system from Keyloggers

at 22:05  |  No comments



How to secure your system from Keyloggers:

1: Good AntiVirus


This is basic and best step to protect your system fromkeylogger. So buy a licensed and best antivirus which is currently in market.Don't forget to update regularly.
Note: Don't use trial or cracked pack ,it is worthless to use.

2: Good Spyware:

Since keyloggers are basically spywares, if you are a frequent user of Internet then you could be exposed to thousands of keyloggers and spywares. So you should use a good antispyware such as NoAdware.

3: Antilogger

Antiloggers are programs that detect the presence of keyloggers on a given computer. Zemana Antilogger is the best antilogger,

4: Keyscrambler

Keyscrambler is a small program which encrypts your typed keystrokes so even if the victim has installed a keylogger on your system, he or she will get encrypted keys.

5: Virtual KeyBoard

Use Virtual keyboard in Public Places Like internet cafe because its good way to protect your data from Hardware Keylogger,its good to keep a portable keyboard always with you.

Feel Free to ask any doubt....

Read More

0 comments:

Saturday, 3 August 2013


Sometime its annoying when youtube ask you to sign in for your age verification to watch 18+ videos. So i will make it easy for you by showing you a simple youtube trick to watch adult or 18+ youtube videos without signing In. This trick is 100% working as of 2013. So lets get started.


 
How To Watch 18+ Youtube Videos Without Logging In ?

1. First get the Url of video you want to watch. As shown below.

http://www.youtube.com/watch?v=4Xkh6j7RMqk 

2. Then copy the Video Id. For above link video Id is 4Xkh6j7RMqk
 
3. Now paste the Video Id in the link given below.

http://www.youtube.com/v/VideoId?fs=1
  • Replace VideoId with the Id you copied in Step 2
4. Now the url will become as shown below.

http://www.youtube.com/v/4Xkh6j7RMqk?fs=1

5. Done.

Watch 18+ Videos On Youtube Without Signing In

at 21:00  |  No comments


Sometime its annoying when youtube ask you to sign in for your age verification to watch 18+ videos. So i will make it easy for you by showing you a simple youtube trick to watch adult or 18+ youtube videos without signing In. This trick is 100% working as of 2013. So lets get started.


 
How To Watch 18+ Youtube Videos Without Logging In ?

1. First get the Url of video you want to watch. As shown below.

http://www.youtube.com/watch?v=4Xkh6j7RMqk 

2. Then copy the Video Id. For above link video Id is 4Xkh6j7RMqk
 
3. Now paste the Video Id in the link given below.

http://www.youtube.com/v/VideoId?fs=1
  • Replace VideoId with the Id you copied in Step 2
4. Now the url will become as shown below.

http://www.youtube.com/v/4Xkh6j7RMqk?fs=1

5. Done.

Read More

0 comments:

Text Widget

Blogger templates. Proudly Powered by Blogger.