Wednesday 4 July 2012


CLICK HERE FOR MORE INFO


Saturday 30 June 2012

Hack Gmail,Myspace,Facebook accounts Using Rinlogger



 Keylogging is one of the Easiest ways that you can use to Hack Gmail, My space,Face book accounts .If your new to the concept of key logging I would suggest you read my previous article  What are key logger  before reading this one



Hack Gmail /Myspace /Facebook accounts Using Rinlogger


Concept :-
For Rinlogger(keylogger) to work, the victim has to install a server file on his computer. This server file keeps on recording and sending all typed keystrokes from victim computer. No doubt, these keystrokes contain the victim’s Gmail password. All such keystrokes are sent by server in your mailbox and thus, you can easily hack Gmail account of your friends using this method.

Working :-

1. First a fall  download Rinlogger from Here & to get the password Click Here

2. After downloading, Open Rinlogger and click "create new " as shown

3. Now enter the following information

Email - your email address (gmail recommented)
Account password - Your email password
Keylogger Recipients - Enter your email address

finally click next as shown



 4. Now enter the duration (time in minutes)  to receive email Key logs (recommended 5 min ), after that hit "verify now " If you get a message saying verified, your good to go, click next



5. Now change Install keylogger to “Enabled”. Name the file anything you want and select Installation path as “Startup”,Finally click next

6. Now change enable downloader to Enabled” & check once only (requires install) ,finally click next 3 three times
 7. Now change enable file binder to Enabled” , and select any application or file document to bind by clicking File binder setup as shown , Then click next and change Steal passwords to "enabled ",finally click next two times





 8. Hit on “?” button besides every textbox to generate random product information. and finally click Next



9. Now, hit on “Save As” and select the path where you want to save your keylogger server file. Click on “Compile”.


voilà ,You have successfully created a keylogger server file. Now, simply send this file to your victim via email , Once the victim runs our keylogger, we will get key logs every  5min via email as shown


AV Scan Result 


Note :-
AV scan result shows this key logger is currently 100% FUD , but since its a free /public key logger it will be detected by anti viruses very soon .So my advice is use this key logger as long as it is FUD and make the most out of it .We also recommend you to use –winspy keylogger or Sniperspy which are FUD for life time (Fully Undetectable).

Tuesday 26 June 2012

Spy Bot for Nimbuzz


Hi there Nimbuzzers, it's been a quite while i'm posting here. One of our Nimbuzzer has made a cool Bot for us. Introducing the "Spy Bot", a bot that can steal Nimbuzz avatars, personal messages and more.

if you like to grab the avatar image of some one eles, you might need a avatar grabber software or type the url on your browser,but if you are a mobile user,Spy Bot will help you to steal the others avatar with just few commands.check some more features of the bot.



BOT FEATURES
Retrieve the display name(Nick Name) of any nimbuzz user.
Retrieve the personal message of any nimbuzz user.
Retrieve the link to see avatar image of any nimbuzz user
Retrieve the list of users in a chatroom without entering.


How to Setup the Bot
               Note that,this bot is not available in the N-World,where you add Bots to your list.all you have to do is add the bot id manually using your nimbuzz.add the following ID to get the bot


                                      ..spybot..@nimbuzz.com


once you add the bot,it will be online in your list. start a chat session with the bot and type "Commands",so you will get the instructions,how to use the bot.i have demonstrated the commands in use by the images below.


Retrieving Avatar link
              type a<space>Nimbuzz ID you want
              example : a jumbo3220(it doesn't matter, whether ''a'' is capital or simple letter and you dont need to type @nimbuzz.com at the end of the ID)










Retrieving Display Name and Personal Message
                             type p<space>Nimbuzz ID





Retrieving a List of Users in a Chat Room
                          type u<space>Chat Room Name
  example : u pinoy_cute (No need to type @conference.nimbuzz.com at the end)



Cool right? no need of xml scripts anymore to see the users in a chat room.well if you find any issue with the bot ,simply contact  amit986@nimbuzz.com

Monday 25 June 2012

East Way To Crack fake Id

step 1: 1st of all you make a room.

step 2: Put a ban bot mafia bot here or chatting warrior bot here

step 3: not take fake symbols

ऽ ा ि ॊ ो ौ ् ी ु ू ृ ॄ ॅ ॆ े ै ॉ ॐ ॑ ॒ ॓ ॔ ॠ ॡ ॢ ॣ । ॥ ॰ ¡ ¿ ¦ † ‡ ← → ↑ ↓ ↖ ↗ ↘ ↙ ↔ ⇐ ⇑ ⇒ ⇓ ⇔ … · • ¶ ½ ⅓ ⅔¼ ¾ ⅛ ⅜ ⅝ ⅞ ฿ ¢ $ € ₭ £ ₦ ¥ ₩₪ ✓ ✗ ♀ ♂ ± −− × ÷ ⋅ √ ≠ ≤ ≥ ≡ ∼ ≈ ∞ ∅ § © ® ™ Á á Ć ć É é Í í Ó ó Ś ś Ú ú Ý ý Ǿ ǿ À à È è Ì ìì Ò ò ò Ù ù  â Ĉ ĉ ĉ Ê ê Ĝ ĝ Ĥ Ĥ ĥ Î î Ĵ ĵ Ô ô ŝ Ŝ Û û Ä ä Ë ë Ï ï Ö ö Ü ü ÿ à ã Ñ ñ Õ õ Å Å å Ç çç Č č Š š ŭ Ł ł Ő ő Ű ű Ø ø Ā ā Ēē Ī ī Ō ō Ū ū ß Æ æ Œ œ Ð ð Þ þ| Ά Γ Δ Έ Ή Θ Ι Ί Λ Ξ Ό Π Σ Ύ Φ Ψ Ω Ψ Ώ α ά β γ δ ε έ ζ η ή θ ι ίκ λ μ ν ξ ο ό π ρ σ ς τ υ ύ φ χ ψω ώ ±½¼¾©®ª°º¹²³₪´¯`¦ζλαČΦΨΩ«»єΞ¶ ■●○▲Δ▪▫İ•¿™¥¢¤¬◊∑≤≥⅞₪∩† ₫ ‰‹ ›‼‾ⁿ₣ ₤℅ℓ℮⅛⅜⅝⅞←↑→↓↔↕↨∂∆∑− ∕∙√∞∟∩∫≈≠≡≥⌂⌐⌠⌡─│┐└┘┘ ├┤┬┴┼═║╒╓╔╕╖╗╘╚╛╛ ╝╞╟╠╡╢╣╤╥╦╦╨╩╪╫▐░ ▒▓■□▬►▼◄◊◘◙◦☼♀♂ ♠♣♥♦♪♫―‘’ ‘ ’ “ ”„ ‚°×π‰≈– —‡☺☹ Russian : Аа Ии Сс Ъъ Бб Йй Тт Ыы Вв Кк Уу Ьь Гг Лл Фф Ээ Дд дэ Мм эм Хх Юю Ее Нн Цц Яя Ёё Оо Чч Жж Пп Шш Зз Рр Щщ ;̣̉;̣̉̃́̀ ]̲̲̅̅ H̲̲̅̅3̲̲̅̅H̲̲̅̅H̲̅§҉¨¨¨¨¨¨ˉ҆҅o̲̲̲̿̅̿®© м̲̅Д̳̿Χ҉♥♣●ऋळखऔईछऊईळ ΞФ๛€ईӁ ∫Ξ∫ωईछ°° ฆỜỜๅ ש๏φ๑ॐʒ«Ӂ̶̲̅Ʒऊई _‗ـ −ΞΞـ‗_‗__‗҉ـ−ˉ‾‾ˉ−ــ ™♥-ــ-ـ-ـ ळखऔॐ»ฆ¥̲̅ळ₪¶̳̳̿͋͌͊̿ 3͠b͠o͠͠o͠d͠ʒ͡Ξ҈−҉ ôΞô♪♪♪๛ ש ωƷʒ̶̶Ʒ M̶S̶A̶E̶E̶R̶м²<͡ô ˛¸¸˛.̶.̶.̶.̶җ ¨.¸¸.¨°™██ ζζ∫∫∫∫♂♂ ﮧֻﮧֻﮧֻﮧֻﮧֻﮧ ำำใใใใ๗๗ ◊◊≈҉≈≈҉≈‗‗‗‗‗‗‗‗¦∕ˉ¦∕ˉ ฆฆ░░∫∫|ୃୃୃ|ୃୃୃ|ୃୃୃıı̉†‡†‡ΩΩ ↑→↓↔↕↨∂∆├┤├┤◘ ◙◦♥☺☼☼♀♂♠♣♥♦♪♫~ ∞~∞♫♫¶¶ ╛ ══╩ª┼┴÷ ± ¸ µ ÷ þ †½ ¼ ¾ ﻻﺇﻟﻪ ﺇﻻﺍﻟﻠﻪ ﻣﺤﻤﺪﺭﺳﻮﻝ ﺍﻟﻠﻪ¤ﺃﺷﻬﺪﺃﻻﺇﻟﻪ ﺇﻻﺍﻟﻠﻪ ،ﻭﺃﺷﻬﺪﺃﻥ ﻣﺤﻤﺪﺭﺳﻮﺍﻟﻠﻪﺻﻠﻰ ﺍﻟﻠﻪ ﻋﻠﻴﻪ ﻭﺳﻠﻢ .arabic letters ﺍ ﺏ ﺕ ﺙ ﺝ ﺡ ﺥ ﺩ ﺫ ﺭ ﺯ ﺱ ﺵ ﺹ ﻁﻅ ﻉ ﻍ ﻑ ﻕ ﻙ ﻝ ﻡ ﻥ ﻩ ﺃ ﻱ хъжэбюзщшгнекуцйфы?Ш»«₪ΔΛΞΩΨ¦¶ø↑↓? ↲◊®©™½¼¾÷×¹²³°ºªώ±• ۰¿@ £þ€$$¥¤ώλ βανψφðΘιŁŊ¡И׃ֶׁ ַאבג σ דהוזחטיךכלםמןנя סעףפץצקרשתװױײ׳״ ،؛؟ ﺀﺁﺃﺃﺅﺇﺋﺎﺑﺔﺗﺠﺤﺨﺪﺫﺭﺯﺳﺸﺼﻂ ﻇﻌﻐـﻒ ﻗﻜﻠﻤﻨﻬﻮﻯﻲًٌٍَُِّْٓٔ ٠١٢٣٤٥٦٧٨٩ ؟ðя Ł ٤٢؟ ₧Ŧ←→↑↓↖↘『|̲̅|̲̅|̲̅ ①②③④⑤⑥⑦⑧⑨⑨⑩父VⅣ ΦΧΨΩΪΫάέήίΰαβγδεζηθι κλμνξοπρςστυφχψωϊϋόύώЁЂ ЃЄЅІЇЈЉЊЋЌ ЎЏАБВГДЕЖЗИЙКЛМНОПРТУФ

step 5 :  now make id and ban it by ban bot if id get banded it mean it is on nimbuzz server try the different combination n ban.

step 6 : now open cracker n start cracking ban ids lol  download from cracker here.




enjoyyyyyyyyyyyyyyyy the trick ;)

Saturday 23 June 2012

FUD Crypter Free Download - Bypass Antivirus Detection



What Is Crypter?





Crypter is a  software used to hide our viruses, keyloggers or tools from antiviruses so that they are not detected by anti viruses. Thus, a crypter is a program that allow users to crypt the source code of their program to Bypass antivirus detection  

What Does UD And FUD Mean?
UD means undetected, so only a few antivirus programs detect it. FUD means fully undetected, so no antivirus detects it


FUD Crypter Free Download - Bypass Antivirus Detection

1. Download Free FUD Crypter from Here & Download the Password From Here

2. Open the FUD Crypter select server file as your Keylogger file or RAT file , Then go to Appearance tab check custom icon and select your icon ( i have included a icon pack also )



3. Finally click " Crypt " , Now you will get a Crypted file  which is totaly undetectable by antiviruses.




AV Scan Results :- 
As an example I used this crypter to crypt my ardamax keylogger and found out that this crypter is 100 % FUD

Ardamax keylogger Before crypting  

Ardamax keylogger After crypting 

You can use this crypter to crypt  ardmex logger , rinlogger

Note: This a public crypter and Hence it will remain FUD for only few weeks , So use this crypter at the earliest.we also recommend you to use winspy keylogger or sniper keylogger Which are FUD for life time

What are KeyLoggers ?


A keylogger sometimes called a spying software is a small program which is used to monitor a local or a Remote PC, Keyloggers now a days are so easy to use that a person with even a basic knowledge of computers can use keylogger.Once a keylogger is installed in your computer it can monitor each and every keystroke typed on your computer, thus key logger  can be used for many purposes such as monitoring your children , employees and many more

There are Two main types of keyloggers that you should be aware of




Hardware Keyloggers 


This type of keylogger is a piece of equipment that is physically attached to ones computer, typically between the keyboard and the machine itself. While this type is the most powerful and readily available (try a Google search for ‘keylogger’ and you’ll be shocked), it also requires direct access to a machine to be installed.


Software Keyloggers 


This is the form of keylogging that you should be most aware of. In this case, the keylogger is attached via Malware, typically through a trojan horse. Thus, you’ll download an unsuspicious file (the trojan horse) that contains the keylogging software (malware). Once installed, the controller has full access to all of your keystrokes and passwords.




Why Do I need A keylogger ?




For Partners: Do you Suspect that your Spouse is cheating on you AND you do not have hard evidence to prove it? Consider Installing SniperSpy, it not only gives you the Complete activity of your Spouse but also provides enough Screen shots and Chat history that can serve as the clear evidence against your Cheating Spouse




For Hackers: Are you looking for any easy way to hack into someones facebook or Myspace accounts ? or wanna control someones facebook account? Key loggers  can expose you all the Keystrokes entered by your victim including Usernames and Passwords for any websites.


For Parents: Does your child spends most of their time before their computers? If your children spend time chatting or playing computer games, they can be approached by the strangers. In other words they are exposed to potentially Dangerous things like PORN, Gambling, Dating Strangers, etc. In this Case Keyloggers is the best solution to Monitor and control the Online Activity of your child.


For Employers: Do all your employees use their computer resources and Internet connection solely for your business? Do they work as hard as you? OR Do you suspect your employee’s productivity is lacking? You should consider installing Key logger Software that can serve as the best Employee Monitoring Software for Small business.




Which Keylogger to choose ?
There are plenty of Key loggers in the market some are free and some are costly , With my experience of more than 3 years in the field of  Hacking and security I suggest only two key loggers which I think are best and have a comparatively low antivirus detection rate , 


1. Sniperspy
2. Realtime spy