Thứ Ba, 25 tháng 12, 2012

M-CybEr Tools v1.0.0 - New Release


 M-CybEr Tools v1.0.0


* Feature M-CybEr Tools :
  • Whois Domain Tool
 









  • DNS Lookup Tool :
  •  Hash Tools :
 
  •  PING IP Tool :
 
  • IP Scanner Tool :
 
 * Details :
  • Name : M-CybEr Tools
  • Version : 1.0.0
  • Coder : Midz
  • Work Good On XP OS - Support Windows 7  
* Download Details :

Thứ Bảy, 22 tháng 12, 2012

M-ENCODE v1.0.0 - Encode - Decode !

M-ENCODE v1.0.0 - Midz's Blog




 * Feature :
  1. Encode / Decode MD5 Hash
  2. Encode SHA1
  3. Encode SHA2
  4. Encode SHA3
  5. Encode SHA5
  6. Encode / Decode Base64
 VIDEO : Upding....



* Download : HERE
- Details :
  • File Size :  1392911 bytes 
  • Hash MD5 : 73d9080abcc26630921109f9fc48be0c 
  • Hash SHA-1 : af14bcdefc8bdef516a45fcd8cc6ceb0e3228625

Thứ Ba, 18 tháng 12, 2012

Tutorial Simple (#3) : Get Password Facebook with Tamper Data ( Addon Firefox )


Video Tutorial


* Detail : 
- Addon FireFox ( Tamper Data ) : Download 
 

Thứ Bảy, 15 tháng 12, 2012

How to Make Injector Dll ! Tutorial Simple





Some people required me and ask "How to make injector dll" . I think maybe i will write 1 posts about Coding :D 

The following is Video !

* Download Source :
DownloadPassword
Hereblog-midz.net

Tutorial : Crack Acutonix 8 - Gift ChristMas 2012 !



Hello , my name is Midz . I think write some posts about Cracking maybe good . And now i will guide Crack Acutonix 8 with Ollydbg !

Need Tools : 

  1. Ollydbg 1.10 ( Download )
  2. Acunetix web vulnerability scanner 8 ( Download )

 Video Tutorial :

 


24
[+] How to Crack Simple Keygen with Ollydbg ( Part 1 )
 
 
Download Simple Application : HERE


I will update some Tutorial about Crack at Here





Thứ Năm, 13 tháng 12, 2012

Detecting keyloggers and All malicious softwares


This tutorial mainly Focusing on how to detect if your Operating System is infected with any Virus, keylogger or RAT.

For this we should First understand the Functionality and meaning of all of them.


Virus : A malicious Software which Replicates itself and takes over the system and do anything for which it is programmed without user permission or will. These kind of programs are usually programmed by programmers/coders to infect a system.



Keylogger: This is a program which save all the keys pressed from the keyboard and send them to the attacker/programmer/coder/owner whom se ever it is built by. These programs focus on getting the users keylogs and to survive in the system they also includes some capablities like Virus so that they can also stealth and replicate themselve to get some more targets. A keylogger may have many capablities like a Virus. They can be of many type which includes FTP Keyloggers, Email Keyloggers, PHP keyloggers etc



RAT (Remote Admin Tool): This one is the most Advanced program in these malicious softwares because once it enters the system it will give complete control of that system to the attacker/programmer/coder/owner whom se ever it is built by. This kind of program mainly focus on waiting for the Masters Order and when ever he do any order they just have to do the same. But again in order to do such things it need to survive into the system without getting detected by the user or the admin. Such Programs include different capabilities like keylogging, Backdooring, Getting Remote Access, Web Cam Hack, Files Theft etc.


As by now we know the functionalities of all these we can move on how to detect them running in your system.


Following are some of the common symptoms if having your computer Infected:


1. Usually pc gets Slow/Hang while working.

2. Hang Up event takes place again and again after particular time gaps.
3. Getting Error message when running TaskManger/Registry/CMD/Msconfig.
4. TaskManger/Registry/CMD/Msconfig gets killed as they run.
5. List Processes in running under Current user using cmd - tasklist /fi "username eq %username%".
6. Use HTTP debugger and check your traffic to trace out its activity.
7. Use cport to track the applications that are connecting to a port and remote computer.
8. Use "Process Explorer" to track hidden processes.
9. Use "Reg From App" & "Process Activity View" to track Registry and files changes bieng made by any program.
10.Detecting By the Process name is also a easy task but it needs some experience to identify the malicious process from the taskmanager processes tab.

Thứ Hai, 10 tháng 12, 2012

Get All Config On Server ! Symlink !




Hello ! Some posts read about Symlink maybe good for the newbie ! . I decided post some posts related to Hacking :)


 


* Detail :
  • Symlink Files by SH
  • Video by Libero

Thứ Năm, 6 tháng 12, 2012

Recruit members Blog Midz [ Phase 1 ]




- Hello ! Blog Midz need recruit some member to support post thread about Information Technology , Hacking , Exploit , Tool , Software !

- If you want join in job ! Please contact me : midzprodn@gmail.com with Sample Form

  1. Name :
  2. Old :
  3. Gmail : 
  4. Facebook ( if you have ) :

 * Start : 6/12/2012 => 25/12/2012
- I expect from you :) . 

Thứ Tư, 5 tháng 12, 2012

vBulletin 4x - 4.1.2 Exploit






- Detail :

Thứ Hai, 3 tháng 12, 2012

Deface Page Creator v1.3 - Update 2012



* New :


+ Update some background

+ Update some Logo



 * Feature :

+ Creat fast a index deface !



* Link download : 



  * Video Tutorial :

 


Bài đăng mới hơn Trang chủ