USB SPY - Hack any USB Drive and Steal all the data.


USB SPY is a tool to copy all the Flash USB contents On Your Computer when the user attached it to the machine.
Suppose You want to copy all the contents of your Friends USB on your PC without His Permission or he is not allowing to copy you all Then This spy tool is perfect and Also very handy and easy to use.

How to Use :-

1) Download The Tool and Extract it.

     DOWNLOAD


2) Open It , You will see window Like this Below




3) Now go to Options Tab and Set The Victim Like this Below....
 
 
 

>> In Spy Mode Settings Select as I Selected.

>> In the Directory Target .....Select the drive where you want to save all the data which you Hacked from Victims Drive...


>> Then Select Hidden to System .

>> Then Set the Hotkey to open USB SPY To make any Changes.


>> If you want to put any Password you can Put.

Thats It.

Enjoy and Share.







DriverPacks for Windows (2000/XP/2003/Vista/7) (X86/X64)



DriverPacks for Windows (2000/XP/2003/Vista/7)

Driver Packs for Windows 2000/XP/2003/Vista/7 is a collection Driver Pack.

Last updated drivers - 09 October 2012.

Not necessarily those driver pack integrate into the distribution Windows, you can also put the driver manually after installing Windows.

Extras. Information:

1) in the properties of the device you want to install the driver in the line "device instance ID" search text DEV_ **** (instead of 4 stars - 4 digits or letters).

2) looking for (eg searching in total commander) contents drayverpakov files *. Inf text DEV_ **** (instead of 4 stars - your 4 numbers or letters).

3) The search result will show you which folder / folders likely to lie right driver for this device.
If the line "device instance ID" no text DEV_ ****, you can search on what else the text of this row.
if not, you can intuitively poperebirat several putatively necessary folders, folder names that begin with the same letter, which begins the name of the device manufacturer.
information about the devices may for example give the program hwinfo32.

windows 2000-xp-2003 (x86) driverpacks
dp bluetooth wnt5 x86-32 910
dp chipset wnt5 x86-32 1209
dp cpu wnt5 x86-32 1005
dp graphics a wnt5 x86-32 1206
dp graphics b wnt5 x86-32 1206
dp graphics c wnt5 x86-32 1206
dp graphics languages wnt5 x86-32 1206
dp graphics physx wnt5 x86-32 1206
dp hid wnt5 x86-32 1209
dp lan wnt5 x86-32 1205
dp lan-ris wnt5 x86-32 1011
dp massstorage wnt5 x86-32 1209
dp misc wnt5 x86-32 1201
dp modem wnt5 x86-32 1205
dp monitor wnt5 x86-32 1005
dp runtimes wnt5 x86-32 1206
dp sound a wnt5 x86-32 1111
dp sound b wnt5 x86-32 1111
dp tv wnt5 x86-32 1005
dp webcam wnt5 x86-32 1107
dp wlan wnt5 x86-32 1202

windows vista-7 (x86) driverpacks
dp amdfilter wnt6-x86 1110
dp audio wnt6-x86 1111
dp cablemodem wnt6-x86 1001
dp cardreaders wnt6-x86 11041
dp chipset wnt6-x86 1212
dp gaming wnt6-x86 1001
dp graphics a wnt6-x86 1203
dp graphics b wnt6-x86 1203
dp graphics mobile wnt6-x86 1203
dp lan wnt6-x86 1208
dp massstorage wnt6-x86 12121
dp misc wnt6-x86 1202
dp modem wnt6-x86 1001
dp monitors wnt6-x86 1001
dp touchpad mouse wnt6-x86 1203
dp tvcard wnt6-x86 1001
dp webcam wnt6-x86 1103
dp wlan wnt6-x86 1203

windows vista-7 (x64) driverpacks
dp amdfilter wnt6-x64 1110
dp audio wnt6-x64 1111
dp cardreaders wnt6-x64 11041
dp chipset wnt6-x64 1212
dp graphics a wnt6-x64 1203
dp graphics b wnt6-x64 1203
dp graphics mobile wnt6-x64 1203
dp lan wnt6-x64 1208
dp massstorage wnt6-x64 12121
dp misc wnt6-x64 1202
dp touchpad mouse wnt6-x64 1203
dp webcam wnt6-x64 1103
dp wlan wnt6-x64 1203
gaming x64 812
monitors x64 911
 

TrustPort Anti Collection 2013

TrustPort Anti Collection 2013 + Keys



 


--->>>TrustPort Total Protection 2013 13.0.6.5088

--->>>TrustPort Internet Security 2013 13.0.6.5088

--->>>TrustPort Antivirus 2013 13.0.6.5088

--->>>TrustPort USB Antivirus 2013 13.0.6.5088

 
TrustPort Total Protection 2013 - all-round protection for your computer against malicious programs, Internet threats and the loss of confidential information. 
TrustPort Total Protection 2013 protects your computer from viruses and spyware at all access points. 
All e-mail and content of sites checked for malicious code. 
Provides reliable protection of sensitive data through encryption and the ability to permanently delete data.

TrustPort Internet Security 2013 - comprehensive protection for your computer and information from malware and Internet threats. 
TrustPort Internet Security 2013 stops viruses and spyware at all points of access and prevents access to your computer from hackers.

TrustPort Antivirus 2013 - is a universal dvuskanernym anti-virus solution that can withstand millions of spreading worldwide network of Internet threats - viruses, worms, spyware and Trojans. 
By regularly updating antivirus databases and universal technology of heuristic analysis, TrustPort Antivirus 2013 has stopped suschestvuyushie malware, and those that will be created.

TrustPort USB Antivirus 2013 - Protection of the portable storage media against all harmful codes. 
The software can be deployed to a USB flash drive is used in the company, thus achieving a significant improvement in data security in the company and beyond.
================
[INSTALL NOTES]
================

Step 1: unpack rar archive
Step 2: run the setup
Step 3: Use the given key to activate
Step 4: Enjoy 



Visit TrustPort Official Site For More Details

Facebook Account Hacking

1) GO TO GOOGLE

2) COPY THIS DORK AND PASTE IT ON GOOGLE AND SEARCH

     Click Here To Get The Dork

3) THEN SELECT ANY SITE FROM RESULT

4) SMILE  :D :D

This dork help you to find phishing passwords which collected by other "hacker".

Download torrents without clients

Remember such conditions?? when you want to download a torrent file and you find that the torrent client is missing mostly happens when you are using some ones else system or most probably you are in Cyber Cafe :P . And now who the hell gonna download a torrent client >_< just to download one torrent :P . So here we go

First Go HERE




Now just Browse your torrent there :) from “Browse” button , and Click Start Downloading.

Now the website will generate an exe file for you . Download that…  and then run .

Now you will see the your torrent getting downloaded :)

Enjoyyyy…..



A+(Hardware) and CCNA 5th Edition (Networking) Full Course By HackersZone {Limited Offer valid Till 31 Dec 2012}

Hii friends ...1 month ago i hacked the NIIT (NIIT THE BIGGEST INSTITUTE OF IT {Information Technology} IN INDIA)Database Systems and leaked the A+ and CCNA Course and  i told you that i will Share you the full course of Hardware and Networking with all my Hackers zone Lovers..Because of all you only We reach to this position ,and i always try to give things to you which in not for free on internet or which is Highly Demanded... So Finally Today i am Sharing this course....

Well your all thinking that why i shared this course So much late.....there are three Reason behind this :-
1) Because of my Exams are going ON...
2) my Parents Removed My Internet Connection...
3) Course Troubleshooting and Removing Restrictions from Course

These are the three main reasons for uploading this course For late , Then afterwards i got My new Internet Connection and then i uploaded Immediately. .


Okk Friends...Before Learning this course you have to do these things for Compulsory,otherwise you cant view this course...

1) Adobe Reader 6.0 

 It is compulsory Required this version of Adobe Reader Because The course is locked with it .
You can't view This Course On Latest ver of Adobe Reader or any ver after 6.0 .
Adobe Reader is given in Course iso file ,You can Install it After Mounting those ISO's

2) Daemon Tools 
 Daemon tools to Mount ISO Image....Or any WHich you Like to USE Easily. 


                                      CLICK HERE TO DOWNLOAD FULL COURSE

 

Okk FINE.....

Now Download The course ...and execute it. (I Compressed the course iso's with 7'z Software)

(NOTE :- After Executing you will get some dll file errors,Dont worry for that just press ok ok.
This error is because of Removing Restrictions)

After executing ,Wait for two to three min For executing the file..Because The File is Highly Compressed. After Than you will get a small display ,Browse for the Location where you want to save The Course  ISO file.

After that you will Get 2 ISO files ( one for A+ Complete and other for CCNA)

Okk, then Mount those ISO's with Daemon Tools or any other ISO Mounting Software.

After Mounting You will GET Course Display ,
Accept that Agreement ,then Install Adobe reader 6.0 first,Then Install ELECTRONIC BOOK, This Contains the full Course.
(NOTE:- Electronic Book Will not run If you using any other ver or latest ver of Adobe reader ,only ver 6.0 will run this Electronic Book ,Because it is locked with it and iso.)

 Thats SIT.Start Learning ,and  
BE A CERTIFIED HARDWARE AND NETWORK ENGINEER.

Join HACKERS ZONE  on Facebook and Post any Problems you are facing

Click Here to Join 


                 

Hack Remote Ethernet ADSL Router - Free Your ADSL Internet

IntroDuction :-

An ADSL router is also known as a DSL modem
The router is used to connect the computer to the DSL phone line for using the ADSL service. 
BSNL and MTNL rolled out many ADSL router cum modem during the peak days of rising internet customers in India.



These ADSL routers have a serious vulnerability in them, which most of you are not aware off .
In this post I will show you how to exploit this common vulnerability that lies in most ADSL routers so as to gain complete access to the router settings and ISP login details.



Hacking Remote ADSL Routers ( DSL modems ):-

Every DSL modem (router) comes with a user name and password using which it is possible to gain access to the router settings and configure the device.

The vulnerability actually lies in the Default user name and password that comes with the factory settings.

Usually the routers come preconfigured from the Internet Service provider and hence the users do not bother to change the password.

This makes it possible for the attackers to gain unauthorized access and modify the router settings using a common set of default user names and passwords



Things Required :-

1. IP Scanner - To scan IPs
2. X-Pass
3. If you don't have Java installed , Download and Install Java , Click Here
4. Internet Explorer


Beginning with Scanning

1. Go HERE ,and note your IP address.

2. Open Angry IP scanner it will look like this:




3. Here you will see an option called IP Range, Now you will need an IP Range. Which is a range or a list of IP's you will have the IP scanner to scan.

4. So lets say your IP is 117.192.195.101 and you want to look for a vulnerable router in your area, you would set the range as 117.192.194.0 to 117.192.200.255 and that will give you a solid list of 100+ IPs in your area or generally close to your area.

5. Now Go to Tools->Preferences



6. Then under the under the ports tab under Port Selection type 80 'cos we will be interested in hosts with port 80 opened:



7. And on the display tab choose "Hosts with open ports only":



8. Then click OK to save the preferences and click start.

9. After a few minutes the scanner will show a list of  Ips with port 80 open.



10. Now just select one of the IP addresses and open it with INTERNET EXPLORER!!!



11. A webpage will open asking for a username and password, this is the login to their router

12. Now the trick is to abuse the fact that most people are too stupid to change their routers default factory setting router login details. 
So when it asks for a password and username try the most common router default logins which are: 

   UN          PwD
--------------------
admin -  admin  
admin -  password 
admin -  Leave the password blank.

13. Just enter the username-password as specified above and hit enter ,

If you are lucky you should gain access to the router settings page where you can modify any of the router settings. 
The settings page can vary from router to router. 
Here is the screenshot of one of the hacked router with default password settings.




14. If you do not succeed to gain access, select another IP from the list and repeat the step-13. At least 1 out of 5 IPs will have a default password and hence you will surely be able to gain access.

Exploitation 

Now for most of the routers you can find username in plain text and password covered with *'s when setting up a new connection, so just look for something that says connection wizard or connection setup, and follow the steps till you find the username and password as mentioned.


So why did we use Internet Explorer for this??

Because XPass works only with IE, we couldn't figure the pass out if we used Firefox or Chrome or Opera.

And now when we have the page where username and pass. are just open XPass click on the X sign and drag it over the *'s and you will have this:





Bingo, You Found The Username and Password 
password in this case is: 854179 

Finally You Steal an Internet Connection ,Now You can copy the ISP login details and close (logout)the Router Settings Page.

Now Login with The victims username and password and get unlimited download and Browsing.


Counter Measures:-


Most of the home routers are left out in default configuration state & can be hacked easily. The password vulnerability can easily exploited which later can result in havoc for a user. A little bit of user awareness is required to keep themselves safe.

1. If you are using an ADSL router to connect to the Internet, it is highly recommended that you immediately change your password to prevent any such attacks in the future. 
Since the configuration varies from router to router, you need to contact your ISP for details on how to change the password for your model.


2. Keep strong passwords rather than plain one's that can be easily guessed or brute forced.

3. Keep monitoring your routers logs.

4. Some new routers have option to disable remote access. It is recommended to disable any such remote access doors.

That's all. Stay safe and Be secure !


Warning!
All the information provided in this post are for educational purposes only. Please do not use this information for illegal purposes.







Hack(OWN) a Computer Using Cyber Gate Rat (Final/Closed)

In this article, I am gonna post the most useful way on how to hack Computers ,email account passwords. 
This hacking software used to hack Computers ,All account passwords or we can say OWN the Computer is Cybergate RAT. 
RAT, as we all know, is Remote Administration Tool, used to hack computer remotely. 
Cybergate RAT is very efficient and simple to use to hack Systems Fully.




I will provide you with the cybergate paid version and it is cracked for you

IMPORTANT ---------
It is of course going to set off your antivirus.
As is it in fact a Trojan Virus and backdoor program.
The AV Detection Is False Positives, Dont Worry.
So i suggest turning your A/V off as it will delete the file automatically.
--------------------------


This is a straight forward RAT and is easy to use, with many different functions.

Ok,so lets get started:


Requirements:
-------------------->                 No-Ip.
-------------------->      CyberGate v1.07.5
-------------------->       Port Forwarding


Part 1 :- 
Setting Up The No-IP & Client 

1.Start Off By Going To; No-IP.com And Register. If You Have An Account There Already, Then Just Log In.

2. Once You've Logged In, Press "Add Host"




3. Now It's Time To Choose Your Host Name!






Hostname: Your Host Name (anyname you want), 

Host Type: DNS Host (Check On DNS Host)
Dont Care About The Rest, Once You've Choosen Your Host Name,rest leav as default.Press "Create Host" In The Lower Right Bottom.

4. The Host Is Now Finished! Lets Move On To The No-IP Client.

The No-IP Client You Downloaded In The Beginning, Extract It To Your Desktop & Install It.

Now When You've Installed It, Open It Up & Log In With Your No-ip Username & Password.

When You're Logged In Press "Select Hosts" And Then Check That Little Box With Your Hostname.




Note: Always Have No-IP Open When You Have Cybergate Open!

5. Your No-IP Host & Your No-IP Duc Is Now Sat Up! End Of Part 1.


PART 2 :-  Setting Up Cybergate 1.07.5

1.Cybergate File You Downloaded In The Beginning To Your Desktop!
Once Extracted, Open It & Wait 20 Seconds For The Agreement To Pass! :)

2. When It's Open, Press: Control Center -> Start.


3. Press: Control Center -> Options -> Select Listening Ports.



4. Once You've Pressed The "Select Listening Ports" This Window Should Appear:




Firstly, Write "100" In That Little Box And Press The Blue Arrow. Then It Should Appear Under "Active Ports"

Active Ports: The Port You Will Forward Later!

Connections Limit: The Max Amount Of Victims You Can Have.

Connection PW: The Connection Password. Use "123456"

[V] Show Password: (Shows Password)

Once This Is Done, Press "Save"!

5. Now We'll Go To The: Control Center -> Build -> Create Server.




User: First, Press "New" And Name It To: "Plutonium". Once Done, Press "OK"

Now Just Double Click On "Plutonium" Or Press "Plutonium" And Then Press "Forward"

6. Now We're In The "Connection" Tab.




First, Press "127.0.0.1 - 999" And Then Press Delete.

Now Press "Add" And Write Your Hostname In It + :100.

Like This: YourHostName.No-ip.biz:100

Change The Identification To: Cyber

Change The PW To: 123456

**Note, If You Want To Try The Server On Yourself, Then Delete Both:
- 127.0.0.1:999
-YourHostName.No-ip.biz

And Replace Them With; 127.0.0.1:100 Since 127.0.0.1 Means "Local Computer & LAN Internet"

7. Once You're Done With Theese, You'll Move On To The "Installation" Tab




 Have The Same Settings As I Do, And Follow The Instructions In The Image!

--//--//--//--//--//--//

Install Directory: Where The Server Installs,


%System%
%Windows%
%Root%
%Program Files%
%Other%

Use The "System"! :).

Boot: This Is The "Startup" Option. Have Everything Checked & Press "Random" 5 Times And It Will Startup On Your slave Everytime They Start Their Computer!

Directory: Where The Virus Folder Installs

File Name: What The File Will Be Inside The Folder.

Inject Into. What Process It Injects into, Use Default Browser!

[V] Persistance: Keeps Trying To Inject Until Succed.
[V] Hide File: Hides The File, (Not FUD Though!)
[V] CCD: Changes The Creation Date From 16th July To 4 September 2005.

Mutex: Mutex Of The Server, Just Press Random A Couple Of Times!

There We Go, You've Now Completed The "Installation" Tab!

--/ Skip The Message & Keylogger Since They Are Pre-Set Already!

8. You Should Now Have Trumbled Into The "Antis" Tab, Have Everything Checked! (Except SANDBOXIE If You Are Gonna TRY IT ON YOURSELF!)



9. 
Ok, The Final Tab.. "Creation Of The Server". Have Every Setting As Me!








[V] Use Icon: Yes

[V] Delayed Execution: (How Many Seconds It Takes Until Your Server Injects And They Pop Up In Your RAT)

[V] Google Chrome PW: Yes, Steals Their GC Passwords :)
[X] Bind Files: No, Get An Real Binder Instead! (Have Your Server Crypted Though First!)
[X] Compress With UPX: Makes The Server Smaller But More AV's Detects It!

10. There! Your RAT Is Now Fully Sat Up.


Part 3 :- Port Forwarding

1. Go To; Start > Run > CMD. And In The Command Box. Type: Ipconfig,

2. Now Look For Something Named: Default Gateway Or Standard Gateway. (Usually 192.168.1.0).. There Should Be like.. 10 Numbers, Remember Thoose.

3. Go To Your Internet Browser And Type Thoose Numbers In.

4. You Have Now Come To Your Router Page.

5. Lookup The "Virtual Server" Or "Port Forwarding" Page And Port Forward The Port:100

6. As Internet Protocols, Use BOTH Tcp And Udp For The RAT To Work.

7. Press "Save" Or "Apply"!

8. Go To: HERE

9. Write In Port: 100 And press Check!

10 If It Says: 
Success: I can see your service on ***.***.**.*** on port (100) Your ISP is not blocking port 100
Then You Have Succedfully Port Forwarded And Can Start Spreading Your RAT Virus! 

10. But If It Says:


Error: I could not see your service on ***.***.**.*** on port (82) Reason: Connection timed out
Then You Have NOT Port Forwarded Correctly, Just Try Until You Get It Forwarded !

For Further Help With Port Forwarding..  Visit HERE.


                                                                             OR


1. first download the program from HERE

2. after installed, run it and you will have somethin like this.

3.then choose your router ( usually the program detects it by itself )


4.to port forward,simply click " which ports you need to forward ".



5.choose " Add custom " 


6.  Enter a name ( anything ) and the ports you wanna forward for example 80~100



7.click Add.

8.In the main page,Click "update router"



THATS ALL!



Now, some FAQs ;

Q: What is CyberGate?
A: CyberGate is a remote administrative tool or trojan for Windows operating systems. You can use CyberGate to manage computers, monitoring your child etc.

Q: Where can I get CyberGate?
A: There is an website for CyberGate, but you can easily download it from my thread.

Q: What operating systems are supported by CyberGate?
A: Windows 95/95B
Windows 98/98SE
Windows ME
Windows NT 4.0
Windows 2000
Windows XP
Windows Vista
Windows 7

Q: Will CyberGate slow my computer?
A: No. CyberGate won't slow your computer, it is a small program and works in background and has been optimized to minimize resource use.

Q: When I downloaded CyberGate, I can't extract it, a problem occurs. What should I do?
A: That's because of your anti virus, they detect it as unwanted applications so your anti virus could prevent downloading. Disable your anti virus and try again.

Q: When I have downloaded CyberGate, my antivirus detect it as virus. What should I do?
A: Well, since RATs are hacktools, and all the hack tools are detected as viruses, Turkojan is detected as virus also. To download and install CyberGate you will need to turn off your anti-virus.

Q: Why should I use no-ip?
A: If you don't have a static IP, you're IP will change each time your Internet reconnects so the server won't be able to reach you. To prevent loosing victims because of your dynamic IP, you will need no-ip host.

Q: What should I do after I install my server?
A: After you install your server, you should spread it. 

Q: I've created a server, but I don't see it in the directory. Why?
A: That's caused by your antivirus. The server is detected, and it won't let it. I suggest you to remove or just simply de-activate your antivirus if you are going to use RATs.

Q: I've send my server to a friend on MSN, but he doesn't connect.
A: That's because he has an antivirus or firewall and it won't let him to connect in your RAT. To make it FUD, (Fully Undetectable), you should use a crypter.

Q: Is CyberGate illegal?
A: No. CyberGate is a legal RAT. The author of CyberGate created his program for legitimate purposes. For example, there are many legal activities. Parents can use keyloggers to protect their children from online abuse etc. Some people use it for stealing passwords, credit cards and more but it's not a software which breaks the law, but the person who uses it.

Q: Can CyberGate be used for legitimate purposes?
A: Yes. You can monitor your children online activity.. to make sure they don't visit pornographic websites. You can find out if someone uses your computer while you are away, ensure no one is accessing your personal files while you are away and more.



Quick Troubleshooting If Your RAT Doesent Work:

Non-Connecting RATs

Make Sure That....

1. ..You are properly port-forwarded if using a router.
2. ..You have the No-IP Client installed and running.
3. ..Your DNS entries are correctly spelled when building your server.
4. ..The password in Listening Ports and the password your server uses are identical.
5. ..You are Listening on the correct ports.
6. ..Your Firewall is letting connections through on the port you're listening on.
7. ..Your server is added to excluded files in your Antivirus and Firewall.

''//'' If You Have ANY Troubles With This, Feel Free To PM Me & I'll Reply As Fast As I Can.


Thank YOU :)













Hack The Hacker Using BinText

What Is BinText :- 

BinText is a very fast and powerful text extractor  software used to extract text from application or any file.
It can extract email ID and password from applications like Hotmail Hacker, Gmail Hacker, Facebook Hacker or any Keyloggers and Stealers.

Step by Step usage :-

1) First of all Download The BinText .

Click Here To Download BinText Latest Version

2) Unzip the downloaded Bin Text software and open it.

NOTE - Some Anti-virus packages may falsely report this product as a Virus application.
Of course it will not ever be infected by any kind ofviruses/malwares/spywares.
It is simply a false positive detection because antivirus software does not to consider the possibility that a piece of software is able to perform such actions and should to be not detected


3) After Opening You Will Get The Main Screen Like This.



4) Now browse for the location where you have kept the Keylogger ,Stealer or any Facebook hacker file that the hacker has sent you to hack your PC.

5) Now Hit GO.

6) Bin Text will scan the whole file and display all the extracted text from that file which the hacker has sended you like this below.



7) Now scroll down till you find email address and password as I have shown in the screen shot.



8) We Got The User Name and Password of that file which the hacker sended us..



       Now Its Time to HACK THE HACKER.Go In his account and Fuck Him.