Welcome To The Hacker Club 4U

On This Blog Now You can get knowledge about how to to do hacking and also Know how to prevent from hacking and know many tips And tricks of computer and internet


Click Here To Know Many Tricks and Tips Of HACKING facebook,twitter and other accounts and passwords

Hacking Safety And Security

Click Here to know how to protect your computer and inetrnet from hacking and know hacking safety and security tips and tricks

Facebook And Twitter

Click On Picture For TWITTER And Click On This Tittle For FACEBOOK .Hacking And Security Tips Of facebook and twitter.Know how to byepass facebook login and twitter login

Gmail And Yahoo

Click On Above Picture For GMAIL Hacking And Security Tips . And.Click On This Title For YAHOO Hacking and security tips

How to Save a web page as an image

While we wait for the option to save a web page as a PDF, due by Firefox 3 final release, there is another option for sharing and archiving web pages. Save As Image, is a simple yet useful Firefox extension developed by Rowan Lewis that adds an option to Save Page as Image to the File menu. When you select it you have the option to select a particular area of it and tweak it manually with dedicated text boxes provided. At least in theory. The selection overlay that should appear over the actual web page image, appears below it which makes it useless. I’ve contacted Rowan on this and hopefully he will take some time to either fix it or remove the selection features and make it a simpler save-whole-page extension.
With options to choose the image format (JPG/PNG) and image quality I find it extremely useful and, even with the image large size (specially when saving as PNG), still a better alternative to HTML versions that I would like to see available by default in Firefox as another option in the Save Page As… dialog. Being only 10KB (including the user interface) it shouldn’t be a big overhead. Options to save several tabs in a single animated PNG (which will be enormous) and a grayscale would be great to have as well.
Save Page as Image menu options
Save as Image options       Get it at Mozilla Add-ons.

How to hack a website

How To Find If Your Girlfriend/Boyfriend Is Cheating on You using a Mobile Phone GPS Hack

If you can't Find your GF/BF/BFF - Track her/him down with this state of the art website for hacking GPS. This Website will give you the GPS Co-ordinates and will Satellite you a Picture From a Google Earth satellite.

Satellite Tracking:
  • GSM mobile phone tracking system via the GPS-TRACK satellite network
  • Based on repeater triangulation, the system tracks mobile phones using GPS and GSM technology
Approximate margin of error:
  • 10 meters (max.) for mobile phones in Europe and the U.K.
  • 25 meters (max.) for mobile phones in the U.S.A., South America and Canada.
  • 50 meters (max.) for mobile phones elsewhere.
  • This system will not work in countries without GSM technology networks.

Use areas

You can see where a person is; such as your wife, husband or friend in real time anywhere in the world 24/7


How to Call from Any Number

Well this service was made for private detectives and people like that. It enables you to ring anyone form ANY number with the correct amount of numbers.

To try TeleSpoof, fill out the form for a FREE TeleSpoof call. Call anyone you want! Display any number on their caller ID!

TeleSpoof offers the ability to change what someone will see on their caller ID display when they receive a phone call. Simply dial the toll free number and then enter your PIN. You will be prompted to enter the destination number followed by the phone number you want to appear on caller ID. It's that easy!

Try TeleSpoof

How To Access Remote Computers from Your Mobile Phone

Here i am giving you a cracked version of TeamViewer Pro for iPhone and iPod Touch that allow you to access remote computers from everywhere. It allows you to give spontaneous support as well as having permanent access to unattended computers. You can:
  • Support your clients and colleagues spontaneously.
  • Access your office desktop with all of its documents and installed applications.
  • Remotely administer unattended computers (e.g. servers).

  • Remotely access unattended computers
  • Conveniently control remote computers using the iPhone multi-touch gestures: left click, right click, drag & drop, scroll wheel, zoom, change monitor
  • Complete keyboard control incl. special keys such as Ctrl, Alt, Windows®
  • Remotely reboot the computer
  • Automatically adjust the screen resolution of the remote computer
  • Overview of computers that are online via the integrated Partner list
  • Effortlessly access computers behind firewalls and proxy servers
  • Meets highest security standards: 256 Bit AES Session Encoding, 1024 Bit RSA Key Exchange

Download TeamViewer Pro for iPhone, and iPod Touch

How to Hack E-Mail Account Password - Email Hacking Software

In this article i'll show you how to hack email account password using keyloggers and trojans. Here I am demonstrating using PRORAT trojan. You can use any trojan or keylogger as per your ease. The basic functionality of all backdoors are same. Pls make note that all these hacking tools and softwares are detected by antivirus. You have to uninstall or close you running antivirus first. Now we can start.

How to Hack Email Account Passwords Using ProRat?

1. First of all Download ProRat. Once it is downloaded right click on the folder and choose to extract it. A password prompt will come up. The password will be "pro".

2. Open up the program. You should see the following:

3. Next we will create the ProRat Trojan server. Click on the "Create" button in the bottom. Choose "Create ProRat Server".

4. Next put in your IP address so the server could connect to you. If you don’t know your IP address click on the little arrow to have it filled in for you automatically. Next put in your e-mail so that when and if a victim gets infected it will send you a message. We will not be using the rest of the options.

5. Now Open General settings. This tab is the most important tab. In the check boxes, we will choose the server port the program will connect through, the password you will be asked to enter when the victim is infected and you wish to connect with them, and the victim name. As you can see ProRat has the ability to disable the windows firewall and hide itself from being displayed in the task manager.

Here is a quick overview of what they mean and which should be checked:

6. Click on the Bind with File button to continue. Here you will have the option to bind the trojan server file with another file. Remember a trojan can only be executed if a human runs it. So by binding it with a legitimate file like a text document or a game, the chances of someone clicking it go up. Check the bind option and select a file to bind it to. A good suggestion is a picture or an ordinary text document because that is a small file and its easier to send to the people you need.

7. Click on the Server Extensions button to continue. Here you choose what kind of server file to generate. I prefer using .exe files, because it is cryptable and has icon support, but exe’s looks suspicious so it would be smart to change it.

8. Click on Server Icon to continue. Here you will choose an icon for your server file to have. The icons help mask what the file actually is. For my example I will choose the regular text document icon since my file is a text document.

9. After this, press Create server, your server will be in the same folder as ProRat. A new file with name "binded_server" will be created. Rename this file to something describing the picture. A hacker could also put it up as a torrent pretending it is something else, like the latest game that just came out so he could get people to download it.

Very important: Do not open the "binded_server" file on your system.

10. You can send this trojan server via email, pendrive or if you have physical access to the system, go and run the file. You can not send this file via email as "server.exe", because it will be detected as trojan or virus. Password protect this file with ZIP and then email it. Once your victim download this ZIP file, ask him to unlock it using ZIP password. When the victim will double click on the file, he will be in your control.

11. Now, I will show you what happens when a victim installs the server onto his computer and what the hacker could do next.

Once the victim runs the server on his computer, the trojan will be installed onto his computer in the background. The hacker would then get a message telling him that the victim was infected. He would then connect to his computer by typing in his IP address, port and clicking Connect. He will be asked for the password that he made when he created the server. Once he types it in, he will be connected to the victims computer and have full control over it.

12. Now the hacker has a lot of options to choose from as you can see on the right. He has access to all victim's computer files, he can shut down his pc, get all the saved passwords off his computer, send a message to his computer, format his whole hard drive, take a screen shot of his computer, and so much more. Below I’ll show you a few examples.

13. The image below shows the message that the victim would get on his screen if the hacker chose to message him.

14. Below is an image of the victims task bar after the hacker clicks on Hide Start Button.

15. Below is an image of what the hacker would see if he chose to take a screen shot of the victims screen.

As you saw in the above example, a hacker can do a lot of silly things or a lot of damage to the victim. ProRat is a very well known trojan so if the victim has an anti-virus program installed he most likely won’t get infected. Many skilled hackers can program their own viruses and Trojans that can easily bypass anti-virus programs.

How to Hack and Spy on a Webcam

I get a lot of emails where my readers are asking for help to find out if his/her partner is cheating on them, chatting to someone she/he shouldn't be, etc. So here i decided to answer this question, and to get it clear once for all.
Today there are softwares called RATs (Remote Administrator Tools) that are mostly used for malicious purposes, such as controlling PC’s, stealing victims data, deleting or editing some files. You can only infect someone by sending him file called Server and they need to click it. With a RAT, you can make the party download files, view their desktop/webcam, and more.

Except the advantages of using a RAT, there are also few disadvantages that you should know about:

1. The RATs are detected by the most anti-virus software.
2. You can get infected by using a RAT.
3. You can get traced when you rat somebody.

In this article i am going to share A step by step guide that allows you to remotely access anybody's webcam, microphone, files and desktop from anywhere in the world, without to worry about the things i mention above.

You can install this on any PC and monitor who ever uses that PC, or even someone passing by. There are no system requirements and this works 99.9% of the time.

This also includes the ability to:

  • Access almost any computer anywhere without knowing the computer password or IP Address.
  • Record and watch any webcam at the same time.
  • Record desktop action and watch at the same time.
  • Dig deep into files, download then and upload new ones.
  • Watch a webcam from any PC in the world.
  • Monitor activities whenever that PC or laptop is online.
  • Save all recordings in a number of file types.
This software costs $14.99, but I think the price totally worth for a software like this one.

I have tested this from every single angle possible and have had the BEST success rate with it.

The Best Operating System for Hackers

There are a couple of things that are essential to any hacker’s walk of life. To name a few, there’s the ubiquitous flash drive for data transfer. You have the crossover cable for even faster data transfer. There’s the Wi-Fi antenna for high gain and strong amplification. Possibly, you might find a video capture card in the computer. Of course, there’s the ubiquitous laptop and desktop computer. But what software is on these computers? Undoubtedly, you will find at least two operating systems, most often Windows and Linux. But with Linux, there are several different distributions. Is there a specific one? With hackers and crackers, there is only one Linux distro out there. It is called Backtrack.

BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking.

Regardless if you’re making BackTrack your primary operating system, booting from a Live DVD, or using your favourite thumb drive, BackTrack has been customized down to every package, kernel configuration, script and patch solely for the purpose of the penetration tester.

BackTrack is intended for all audiences from the most savvy security professionals to early newcomers to the information security field. BackTrack promotes a quick and easy way to find and update the largest database of security tool collection to-date.

Back Track is quite possibly the most comprehensive Linux distribution of security tools. Both hackers and crackers can appreciate the features of this distribution. For black-hatters, it is an easy access to software that facilitates exploitations of secure system. For white-hatters, it is a penetration tester that finds holes in a security scheme. See, everybody wins!

Major Features

BackTrack features the latest in security penetration software. The current Linux kernel is patched so that special driver installation is unnecessary for attacks. For example, an Atheros-based wireless networking adapter will no enter monitor mode or inject packets without the MadWiFi driver patch. With BackTrack, you don’t need to worry about that. It’s just plug-and-play ready-to-go!

What’s great is that this Linux distribution comes Live-on-CD. So, no installation is needed. However, what you experience BackTrack, you will realize that it is a must to download this operating system and install it on your Laptop. At the very least, download the VMWare Virtual Appliance for Backtrack. Make sure you also install the VMWare Tools for Linux as well. Many features will still work in VMWare mode.
  • Based on: Debian, Ubuntu
  • Origin: Switzerland
  • Architecture: i386
  • Desktop: Fluxbox, KDE
  • Category: Forensics, Rescue, Live Medium
  • Cost: Free


BackTrack provides users with easy access to a comprehensive and large collection of security-related tools ranging from port scanners to password crackers. Support for Live CD and Live USB functionality allows users to boot BackTrack directly from portable media without requiring installation, though permanent installation to hard disk is also an option.

BackTrack includes many well known security tools including:
  • Metasploit integration
  • RFMON Injection capable wireless drivers
  • Kismet
  • Nmap
  • Ettercap
  • Wireshark (formerly known as Ethereal)
  • BeEF (Browser Exploitation Framework)

A large collection of exploits as well as more common place software such as browsers. BackTrack arranges tools into 11 categories:
  • Information Gathering
  • Network Mapping
  • Vulnerability Identification
  • Web Application Analysis
  • Radio Network Analysis (802.11, Bluetooth, Rfid)
  • Penetration (Exploit & Social Engineering Toolkit)
  • Privilege Escalation
  • Maintaining Access
  • Digital Forensics
  • Reverse Engineering
  • Voice Over IP

Download and Documents:

Home Page
User Forums
Download Mirrors

How to Make a Trojan Undetectable by Antivirus Software

Here i am going to show you how to make your trojan, keylogger, or RAT almost FUD (Fully Undetectable) by any anti-virus software.

We gonna need a Privacy Protection Software. This kind of software is used by program creators to protect their creation from cracking and reverse engineering. We gonna do the same to a trojan and you are going to see the result.

1. First of all you need to download the program: PC Guard for Win32

2. Open the program, and in the "Application filename" browse your server's location.

2. Click on the "General" tab, and check the options like on the image below.

3. Now do the same with the "Security & Encryption" tab. Look at the image below to see what options to check.

4. At the end choose "Protection Methods", and select the following options:

We are done!

The Scan Results:

Poison Ivy server:

Bifrost server:

Get Web Scanner for Hackers Worth 3195$ for Free

Acunetix - The webmasters best friend, or worst enemy?

As many as 70% of web sites have vulnerabilities that could lead to the theft of sensitive corporate data such as credit card information and customer lists.

Hackers are concentrating their efforts on web-based applications - shopping carts, forms, login pages, dynamic content, etc. Accessible 24/7 from anywhere in the world, insecure web applications provide easy access to backend corporate databases.

Firewalls, SSL and locked-down servers are futile against web application hacking!

Web application attacks, launched on port 80/443, go straight through the firewall, past operating system and network level security, and right in to the heart of your application and corporate data. Tailor-made web applications are often insufficiently tested, have undiscovered vulnerabilities and are therefore easy prey for hackers.

Acunetix - a world-wide leader in web application security

Acunetix has pioneered the web application security scanning technology: Its engineers have focused on web security as early as 1997 and developed an engineering lead in web site analysis and vulnerability detection.

Acunetix Web Vulnerability Scanner includes many innovative features:
  • AcuSensor Technology
  • An automatic client script analyzer allowing for security testing of Ajax and Web 2.0 applications
  • Industries' most advanced and in-depth SQL injection and Cross site scripting testing
  • Advanced penetration testing tools, such as the HTTP Editor and the HTTP Fuzzer
  • Visual macro recorder makes testing web forms and password protected areas easy
  • Extensive reporting facilities including VISA PCI compliance reports
  • Multi-threaded and lightning fast scanner crawls hundreds of thousands of pages with ease
  • Intelligent crawler detects web server type and application language
  • Acunetix crawls and analyzes websites including flash content, SOAP and AJAX
  • Port scans a web server and runs security checks against network services running on the server

Acunetix can be used to fully determine if a website is vulnerable in any way, and it rates the security risk level. It can scan for all the attacks mentioned above to see what its vulnerable, or find allot of useful info about the site as given.

This tool can be used by both white hats and black hats. It worths 3195$ for 1 year!!! I am giving it for free and unlimited time. That's a hell a lot of money.

Install Notes:
  1. Install acunetix 6.5.
  2. Replace original files with crack folder content.
  3. Start wvs.exe and your done.
Download Acunetix (Clean copy, tested by me)

Hacking and Security Books

Most of us are very curious to learn Hacking and want to become a Hacker, but don’t know where to start. If you are in the same situation, then this is the right place for you.

Everyone can become a Hacker provided they learn it from the basics. So if you wanna become a hacker, then all you need is a good source that will teach you hacking from the basics. There exists tons of books on the market that teach you Hacking but unfortunately, it requires a set of pre-established skills and knowledge to understand the concepts explained in the book. Also these books are not meant the for beginners who doesn’t know anything about hacking. As a solution to this problem we have found two excellent books for the beginners to start their journey as a Hacker.

The good thing about these two books is, any one can understand the concepts presented in the book without the need for any prior knowledge.

"Computer Hacking" recommends the following books for the beginners

1. The Hacker's Underground Handbook

This book is designed for the absolute beginners who are willing to learn Hacking from the basics. This book does not demand any prior knowledge about Hacking. So if you are a newbie to the concept of hacking and want to master it from the basics, then this book is for you.

The information given in this underground handbook will put you into a hacker’s mindset and teach you all of the hacker’s secret.

The following skills are uncovered in this book

1. You will learn all the hackers underground tricks and learn to apply them in the real world situations.

2. You will be put into a hackers mindset and learn to think like one.

3. By Learning how a hacker thinks and acts, you will be able to protect yourself from future hack attacks.

4. You will acquire knowledge nonexistant to 99.9% of the people in the world!

5. This Underground handbook may get you interested in pursuing a career as an Ethical Hacker.

For more information on this book and download details visit the following link

The Hackers Underground Handbook

2. A Beginners Guide to Ethical Hacking
You might have heard about some paid password hacking softwares which claim to hack a password on entering the email account. But in reality all those softwares are fake. If you believe what they say then you are just wasting your time and money. These all softwares are fake. If there exists such a software, will there be any security on web. And all expert engineers at Google, Yahoo and other services are not mad. They are all engaged in ensuring security of their customers ie email account owners. So, no such software exists.
So stop wasting your time and money on these foolish softwares and services and learn real Ethical Hacking methods which hackers use to access email accounts.

How will the information in the book affect me?

1. You will learn All Ethical hacking techniques and also you will learn to apply them in real world situation

2. You will start to think like hackers

3. Secure your computer from trojans, worms, Adwares etc

4. Amaze your friends with your newly learned tricks

5. You will be able to protect your self from future hack attacks

And Much more...

For more information on this book and download details visit the following link

Search Engine for Hackers

A new search engine has been introduced called "SHODAN" that lets you find specific computers (routers, servers, etc.) using a variety of filters. Some have also described it as a public port scan directory or a search engine of banners.

Web search engines, such as Google and Bing, are great for finding websites. But what if you're interested in finding computers running a certain piece of software (such as Apache)? Or if you want to know which version of Microsoft IIS is the most popular? Or you want to see how many anonymous FTP servers there are? Maybe a new vulnerability came out and you want to see how many hosts it could infect? Traditional web search engines don't let you answer those questions.

Following things could be searched for:
  • country: 2-letter country code
  • hostname: full or partial host name
  • net: IP range using CIDR notation (ex: )
  • port: 21, 22, 23 or 80

As we [some of us] can understand, it is very easy to find vulnerable host just by looking at all the banner responses shown by SHODAN. It could turn out to be a huge threat as many skiddies could be scanning hosts anonymously round the clock for particular exploit or something that they understand well.

Click here to go to SHODAN

How to Hack a Credit Card

Hi there. This is my first serious "black hat hacking" post of credit cards hacking. Here will be explained all methods used to hack credit cards and bank accounts with lots of $$ it. Now I'm sure most of you think that this is fake or scam, but i want to just tell u this is real and the only working method (in my opinion) to hack a credit card and make your wish come true (lol, hope it doesn't sound like a commercial).
This tutorial is divided in two parts.
  1. Introduction into Credit Cards
  2. Credit card Hacking

Note: Hacking credit cards is an illegal act, this is only informational post and I am not responsible for any actions done by you after reading this tutorial. This post is for educational purposes only.

Lets start with some easy terms.

What is credit card ?

Credit cards are of two types:
  • Debit Card
  • Credit Card
1. Debit means u have a sum of amount in it and u can use them.
2. Credit means u have a credit line limit like of $10000 and u can use them and by the end of month pay it to bank.

To use a credit card on internet u just not need cc number and expiry but u need many info like :
  • First name
  • Last name
  • Address
  • City
  • State
  • Zip
  • Country
  • Phone
  • CC number
  • Expiry
  • CVV2 ( this is 3digit security code on backside after signature panel )
If you get that info you can use that to buy any thing on internet, like software license, porn site membership, proxy membership, or any thing (online services usually, like webhosting, domains).

If u want to make money $ through hacking then you need to be very lucky... you need to have a exact bank and bin to cash that credit card through ATM machines.

Let me explain how ?

First study some simple terms.

BINS = first 6 digit of every credit card is called " BIN " (for example cc number is : 4121638430101157 then its bin is " 412163 "), i hope this is easy to understand.

Now the question is how to make money through credit cards. Its strange..., well you cant do that, but there is specific persons in world who can do that. They call them selves " cashiers ". You can take some time to find a reliable cashiers.

Now the question is every bank credit cards are cashable and every bin is cashable? Like citibank, bank of america , mbna .. are all banks are cashables ? Well answer is " NO ". If u know some thing, a little thing about banking system, have u ever heard what is ATM machines? Where u withdraw ur cash by putting ur card in.
Every bank don't have ATM, every bank don't support ATM machines cashout. Only few banks support with their few bins (as u know bin is first 6 digit of any credit / debit card number), for suppose bank of america. That bank not have only 1 bin, that bank is assigned like, 412345 412370 are ur bins u can make credit cards on them. So bank divide the country citi location wise, like from 412345 - 412360 is for americans, after that for outsiders and like this. I hope u understand. So all bins of the same bank are even not cashable, like for suppose they support ATM in New York and not in California, so like the bins of California of same bank will be uncashable. So always make sure that the bins and banks are 100% cashable in market by many cashiers.

Be sure cashiers are legit, because many cashiers r there which take your credit card and rip u off and don't send your 50% share back.
You can also find some cashiers on mIRC *( /server irc.unixirc.net:6667 ) channel : #cashout, #ccpower

Well, check the website where u have list of bins and banks mostly 101% cashable. If u get the credit card of the same bank with same bin, then u can cashout otherwise not . Remember for using credit card on internet u don't need PIN ( 4 words password which u enter in ATM Machine ), but for cashout u need. You can get pins only by 2nd method of hacking which i still not post but i will. First method of sql injection and shopadmin hacking don't provide with pins, it only give cc numb cvv2 and other info which usually need for shopping not for cashing.

Credit Card Hacking

CC (Credit Cards) can be hacked by two ways:
  • Credit Card Scams ( usually used for earning money , some times for shopping )
  • Credit Card Shopadmin Hacking ( just for fun, knowledge, shopping on internet )
1. Shopadmin Hacking

This method is used for testing the knowledge or for getting the credit card for shopping on internet, or for fun, or any way but not for cashing ( because this method don't give PIN - 4 digit passcode ) only gives cc numb , cvv2 and other basic info.

Shopadmins are of different companies, like: VP-ASP , X CART, etc. This tutorial is for hacking VP-ASP SHOP.

I hope u seen whenever u try to buy some thing on internet with cc, they show u a well programmed form, very secure. They are carts, like vp-asp xcarts. Specific sites are not hacked, but carts are hacked.

Below I'm posting tutorial to hack VP ASP cart. Now every site which use that cart can be hacked, and through their *mdb file u can get their clients 'credit card details', and also login name and password of their admin area, and all other info of clients and comapny secrets.

Lets start:

Type: VP-ASP Shopping Cart
Version: 5.00

How to find VP-ASP 5.00 sites?

Finding VP-ASP 5.00 sites is so simple...

1. Go to google.com and type: VP-ASP Shopping Cart 5.00
2. You will find many websites with VP-ASP 5.00 cart software installed

Now let's go to the exploit..

The page will be like this: ****://***.victim.com/shop/shopdisplaycategories.asp
The exploit is: diag_dbtest.asp
Now you need to do this: ****://***.victim.com/shop/diag_dbtest.asp

A page will appear contain those:
  • xDatabase
  • shopping140
  • xDblocation
  • resx
  • xdatabasetypexEmailxEmail NamexEmailSubjectxEmailSy stemxEmailTypexOrdernumbe r

The most important thing here is xDatabase
xDatabase: shopping140

Ok, now the URL will be like this: ****://***.victim.com/shop/shopping140.mdb

If you didn't download the Database, try this while there is dblocation:
the url will be: ****://***.victim.com/shop/resx/shopping140.mdb

If u see the error message you have to try this :

Download the mdb file and you should be able to open it with any mdb file viewer, you should be able to find one at download.com, or use MS Office Access.
Inside you should be able to find credit card information, and you should even be able to find the admin username and password for the website.

The admin login page is usually located here: ****://***.victim.com/shop/shopadmin.asp

If you cannot find the admin username and password in the mdb file or you can but it is incorrect, or you cannot find the mdb file at all, then try to find the admin login page and enter the default passwords which are:
Username: admin
password: admin
Username: vpasp
password: vpasp

2. Hacking Through Scams

This method is usually used to hack for earning money. What happens in this method is you create a clone page.

Target: its basically eBay.com or paypal.com for general credit cards, or if u want to target any specific cashable bank like regionbank.com then u have to create a clone page for that bank.

What is eBay.com?

Its a shopping site world wide which is used by many of billion people which use their credit cards on ebay. What you do make a similar page same as eBay and upload it on some hosting which don't have any law restrictions, try to find hosting in Europe they will make your scam up for long time, and email the users of eBay.

How to get the emails of their users?

Go to google.com and type "Email Harvestor" or any Email Spider and search for eBay Buyers and eBay Sellers and u will get long list. That list is not accurate but out of 1000 atleast 1 email would be valid. Atleast you will get some time.

Well u create a clone page of ebay, and mail the list u create from spider with message, like "Your account has been hacked" or any reason that looks professional, and ask them to visit the link below and enter your info billing, and the scam page have programming when they enter their info it comes directly to your email.
In the form page u have PIN required so u also get the PIN number through which u can cash through ATM ..

Now if u run ebay scam or paypal scam, its up to your luck who's your victim. A client of bank of america or of citibank or of region, its about luck, maybe u get cashable, may be u don't its just luck, nothing else.

Search on google to download a scam site and study it !

After you create your scam site, just find some email harvestor or spider from internet (download good one at Bulk Email Software Superstore - Email Marketing Internet Advertising) and create a good email list.

And you need to find a mailer (mass sending mailer) which send mass - emails to all emails with the message of updating their account on ur scam page ). In from to, use email eBay@reply3.ebay.com and in subject use : eBay - Update Your eBay Account and in Name use eBay

Some Instructions:

1. Make sure your hosting remains up or the link in the email u will send, and when your victim emails visit it, it will show page cannot be displayed, and your plan will be failed.
2. Hardest point is to find hosting which remains up in scam. even i don't find it easily, its very very hard part.
3. Maybe u have contacts with someone who own hosting company and co locations or dedicated he can hide your scam in some of dedicated without restrictions.
4. Finding a good email list (good means = actually users)
5. Your mass mailing software land the emails in inbox of users.

That's all folks. Hope you will find this tutorial useful. And remember, hacking credit cards is an illegal act, this is only informational post and I am not responsible for any actions done by you after reading this tutorial.

How To Cash Out From Stolen Credit Cards

Here i will show you how to make money with Credit Cards from EVERYWHERE!!! Now before we continue, make sure you check your equipment:
  • Online game
  • Proxy
  • Credit card
1. Online game- Your Tool to Cash out

At first you have to register on an online game site, like site where you can play poker or backgammon. It is only important that you can play with real money.

For example online games like: http://www.pokerstars.com

You need 2 accounts. One of them must be your own, and the second have to be like the Credit card user. You can make account in most online games for free.

2. Proxy

After you are done with your accounts, join your Proxy. It is nice if you use the same Proxy like your credit card comes from. (e.g. German credit card, and German proxy).

3. Credit Card

Now when you connect to the Proxy, join your faked account to play online. Then purchase Real money from the hacked or stolen Credit card. Don't use your own Credit Card, it wouldn't have any effect.

How to Cashout

Join the game with your Accounts (your faked and your real) to play. You have to click on the "Play with Real Money" Button. To play you need more then 2 players on the Table. You can make more accounts to sit with all your accounts on the table, but i use to play with some friends which know what I'm doing. Then Play.

IMPORTANT: Your real account needs some real money too, 5-10$ is enough.

Then your friends have to give up the round, so that only you and your faked account is in, like 1 on 1. Now press the "All-In" Button with your Faked Account, and with your Real Account too.

The effect: Your faked account will set all the money from the hacked/stolen Credit card, and your real account will set 5-10$. Then your faked account have to lose, like give up. Now you will take all the money and logout from the Game. Press "Cashout" to cash out your Money to your real Credit card.

How To Hack Your School Network

Because of the frequency this question has been asked on this blog, i have decided to create a document for this question. This tutorial is for those newbies out there, wanting to "hack" their school. I'm gonna start by saying, if your going to hack the school, theres a high probability your get caught, and don't do anything dumb like deleting the network. Its lame, and you will get flamed for doing it. This hack will allow you to take control of the PC's at school. Lets start:

How to take control of the PC's at school:

Here are the steps;
  1. Preparing The Virus
  2. Setting Up The Virus
  3. Controlling The PC

Obviously, if you gonna take control over your school PC you need a virus. You have 2 methods:
  1. The virus I made which is harmless and you won't even notice it was executed.
  2. Dropping a Trojan on the school PC.
Method 1

What you need:
  • Pen Drive (You can buy one, or you just use yours)
  • Brain (You can't buy this)

Now, open notepad and copy/paste this code: the code

Save the file as something.bat (you can change something to whatever you want). In "Save as type:" choose "All Files".

I strongly recommend you not to change the rdport and tnport configuration. The rdport will open the remote desktop default port, and the tnport will open the telnet's client default port.

You can change the username, password and the rport (randomn port you choose to be opened)

At ipconfig /all >> C:\attach.txt you must change C:/ by your pen drive letter.

Save it and remove your pen drive.

Take your pen drive to school and run the bat file. Don't forget the pc you runned it in cause you might need it.

When you get home go to your pc and try to telnet them or remote desktop the PC.

Method 2:

In this method we will use a Trojan to control the school PC.

Here is a tutorial about how to create a Trojan: ProRat Trojan

Now just create a server (there is an explanation in the tutorial above), bind it and put it into your pen drive. Make sure you leave your PC turned on.

Then go to your school and drop the trojan.

Other way to do this is to give your trojan to a friend and tell him to stay in school. When you arrive home, send him a SMS and tell him to drop the trojan. This way you could even see if it worked.

After this you can probably do whatever you want with the PC.

How to Track Your Stolen Laptop

My friend recently bought a Toshiba laptop, but it was stolen within a couple days. The good thing is that i had installed a tracing software on his laptop the very same day he bought it, and he had no troubles finding it. This can happen to anyone which is using laptop, so having a tracing software installed on your laptop is not a bad idea.

Here i am showing you a free laptop tracing software called Prey.

Prey lets you keep track of your phone or laptop at all times, and will help you find it if it ever gets lost or stolen. It's lightweight, open source software, and free for anyone to use. And it just works.

How it Works?

Basically you install a tiny agent in your PC or phone, which silently waits for a remote signal to wake up and work its magic.

This signal is sent either from the Internet or through an SMS message, and allows you to gather information regarding the device's location, hardware and network status, and optionally trigger specific actions on it.

Notice: This file is Trojan as detected by some antivirus, but the thing is every such files are called trojan, as the process is to Track your system and view your systems reports. But be secure, this file is not harmful for your system or for your personal information. This software is made By PRey Project Company, and they take responsibility of it.

How to Download and Install Prey?

1. First of all download Prey project file from here.

2. After Downloading, Install the File and than

- They will ask for either standalone and +control panel.
- Go for +control panel, and than Click For New User.
- Give Your Name, Your Email and select Password to login the site.

E.g, Name :- John Smith
Password:-123456 (any Password that you choose) for Entering the site, and than press ok.

- You will get Email from prey project, just activate your account there, and click your device and do the following settings:

Click on the images to see the full size

If you "on" any of the above settings than be sure to remember password of "lock pass". It will show as the tym you make it on. Just below the lock it will be written pass, and when alert is on the message will display whenever you login, "this laptop is stolen ...."-lol

So these were all steps now you can install and get secure. Now if its get stolen than you can track back

This still has demerit E.g, If theif formats your system completly than its no way possible to get back than to ask for police, and they don't track laptop normally, until the stolen system is related with some serious case.

Password Stealer Tool To Hack E-Mail Account Passwords

E-Mail / Windows Live MSN Messenger Password Hacker Tool

I'm writting this article to show you an eMail / Windows Live Password Stealer Tool - Ref Stealer. I have already explained about Keylogging to hack email account passwords, where you have to send your keylogged file to victim. In the same way, Ref Stealer can be used to hack email account password and find passwords of various emails.

Ref Stealer - E-Mail Password Stealer / Hacker Tool

This E-Mail Password Stealer is used to steal all stored passwords on victim computer. When victim opens our sent E-Mail Password stealer on his computer, the password stealer searches for all saved passwords on victims computer and then simply sends those saved passwords along with user ids to you via email. Thus, you are now equipped with victim email, ids and passwords and can easily hack his email accounts.

This password stealer works for all available email accounts.

How to Use Ref Stealer?

1. First of all download Ref Stealer from here.

2. Run "Ref Stealer.exe" file to get something like this:

3. Now, fill in your Gmail Username and password. Assign name to the server as you want. Hit On "Gmail Check" to check whether you've entered Gmail id and password correctly. If you receive an email, you've done it right and now hit on "Build" to get server.exe ie password stealer server created in current directory.

4. You can bind this password stealer server to any file using Binder software and send this file to the victim. Read my post "Learn What is Binder and How to Use It for Hacking" for more info and to download a free Binder tool.

5. Once the victim runs our sent binded file on his computer, windows live password stealer will search for all stored passwords and send you email containing all user-ids and passwords like this:

6. Now you have all victim email passwords in your inbox and you can now hack victim email accounts easily.

This password stealer server is detected as virus during runtime. But, its 100% FUD (Fully Undetectable) during scantime. So, you can use Crypter / Binder to get rid of antivirus detection.

How to Hack Hotmail Password using Hotmail Hacking Software

Hacking Hotmail Account Password: Hotmail Keylogging for Hacking Hotmail Account Password

I've been posting a lot about Keylogging on this blog. This tutorial is about hotmail hacker - a program that can hotmail accounts. All u just need is a lil bit of social engineering and convincing power. This Hotmail Hacker is 100% working way to hack Hotmail password. So far, this way of using Hotmail hacker to hack Hotmail password is simplest available way to hack Hotmail account password. If u have this, u will surely hit into the bull's eye. So here's the tutorial:

How to Hack Hotmail Password using Hotmail Hacker?

1. First of all, Download Hotmail Hacker (It may be detected as virus, but it is actually safe to use…so disable your antivirus)

2. Extract the downloaded RAR archive in a separate folder. There will be 2 files in the folder like this:

3. Run the Hotmail Hacker Builder.exe and enter the email ID, password and subject of email in which u wanna receive the password of victim. It is recommended that you just create a new email ID (any but not hotmail). This email will contain the pass of victim u wanna hack. Now, select the smtp server. The default (587) is of gmail but u can find others here. Also, write a fake error message to fool ur victim.

How to Hack Rapidshare Premium Account Password

Learn how to hack Rapidshare premium account password. Rapidshare Tips, Tricks and Hacks.

Usually I download softwares from Rapidshare and sometimes from MegaUpload. But unfortunately most of these file sharing sites have a premium area and the services from the free area are not good and investing for the premium account for these sites are not really possible for us. So, I am posting this article on rapishare premium hacking to inform you ways to hack Rapidshare premium account.

Hack Rapidshare Premium Account Password:

I will show you 5 methods to hack rapidshare premium account and download/upload as many files as you want from their server.

1. RapidShare Phishing

Now, this is most useful method to hack Rapidshare premium password. The only thing you have to do is simply create a Rapidshare Phisher (fake page) and then send this Rapidshare Phisher to victim and make him to login to his Rapidshare premium account using our sent fake login page. Once he logins to his Rapidshare premium account using our sent phisher, his Login and Password are sent to your email address and you are able to hack Rapidshare premium account password. Here's how to do that:

1. First of all download Rapidshare Phisher here.

2. The downloaded file contains:
  • index.html
  • login.php
  • password.txt
3. Upload all of the files to any free webhost site like:
4. Once you have uploaded the files in the directory, send this phisher link (index.html) to your victim and make him login to his Rapidshare account using your sent Phisher. You can change the name of index.html however you like.

5. Once he logs in to his RapidShare account using Phisher, all his typed Rapidshare id and password is stored in "login.txt".

6. Now, open login.txt to get hacked Rapidshare id and password as shown.

Very simple. Now you have your victim's Rapidshare id and password hacked.

2. Keylogging

This is one of the most easiest method to hack Rapidshare premium account password. Here, you have software named by which you can record all keystrokes typed on victim computer. These recorded keystrokes are sent to your email inbox. Since, you have typed Rapidshare premium password, you can easily hack Rapidshare premium account. Read more about how to hack Rapidshare premium password using keylogging here.

3. Hacking Primary email address

Every Rapidshare premium account has a primary email address. So, simple logic is to hack Primary email address and then click on "Request Forgotten password" link on Rapidshare login page. Then rapidshare will send password to primary email inbox which is hacked by you. Thus, you've obtained new Rapidshare premium account password and now able to hack Rapidshare premium account. I found a great tutorial how to hack a hotmail account on Hackforums.net.

4. Remote Desktop Spy

Remote Desktop Spy is a powerful computer surveillance program which can be used in the home, school or office to monitor and record every detail of PC and Internet activity. The program contains several integrated tools which work together at the same time to record all programs used, keystrokes typed, web sites visited, files created or changed, and a screenshot logger which can take hundreds of snapshots every hour.

  • Logs the title, time and duration of every program that is used.
  • Records a keystroke log of what the user typed into each program.
  • Saves regular screenshot images of the users desktop.
  • Records the title and URL of every web page visited.
  • View the logs in real-time from another PC.
  • Open and close programs, web sites or documents remotely.
  • Watch a live image of the users desktop without them knowing.
  • Take control of the keyboard and mouse remotely.
  • Download and manage files remotely.
  • Log off, restart or shutdown the PC remotely.
  • Operates in total stealth - no visual windows, icons or processes.
  • Runs as a Windows service - impossible for users to disarm.
Download Remote Desktop Spy

Social Engineering
Well, working of this hacking method depends on your intellegence and convincing power. Here, you have to ask victim about his password or security question of primary email. You have to be cautious while using this method to avoid any doubt of victim. Any clue about security answer can enable you to hack Rapidshare premium account password.

* Rapidshare Time Resetter

This isn't a method to hack a premium account password, but using this trick you can download/upload files UNLIMITED. Rapidshare traces the users IP address to limit each user to a certain amount of downloading per day. To get around this, you need to show the rapidshare server, a different IP address. Its very easy to fool Rapid Share server if your IP address is assigned by your ISP. Just follow these simple steps:

1. Clean up IE or Netscape or Firefox cookie ( In this case the one that belong to rapidshare website)

2. On Command prompt (open MS-DOS) *Click Start ->Run ->In the run box type cmd.exe and click OK.
  • type: ipconfig /flushdns and click Enter
  • type: ipconfig /release and click Enter
  • type: ipconfig /renew -> Enter
  • type: exit -> Enter

Or save these commands in a bat file and run it everytime you need to fool Rapidshare server. Remember to clean up rapidshare cookie in your temp Internet files folder.

Now you should be ready to download/upload as many files as you want from their server.

Another way, get proxies from the internet and apply to the browser.
some of proxies might not work though...

  • If you are on a LAN and behind a router (using NAT, for example)---this will not work.
  • If you use a fixed proxy--- this will not work.
  • If you have a fixed IP address from your ISP or college or employer or whatever -- this will not work.
  • If you happen to get the same IP address from your DHCP server because it's assigned to you -- this will not work
NO waiting
THIS "cheat" for RAPIDSHARE DOWNLOADS eliminates the "WAITING" for the file. No more COUNTDOWNS. So heres what you do:

1. First, Find a rapidshare download.

2. Hit the FREE BUTTON, like always.

3. While your waiting for it to countdown, change the URL in the bar to:


and hit ENTER or the GO button over and over. Eachtime you do so, it decreases 10-20 seconds. Few times and the link appears.
or you can simply do the code below ONCE


* Free premium acount for all

Here is an encrypted message. If you decode that message you get a link to register premium acount on rapidshare, but i dont have a decomipler for PKCS7. Help me decode this message and we have all free premium acounts XD


So friends, these are some of the popular methods used to hack Rapidshare premium account password. I hope, you'll be able to use these methods to hack Rapidshare premium password.

How to Hack Twitter Account Password

Hacking Twitter Account Password: Twitter Phishing for Hacking Twitter

Previously i've posted How to Hack Facebook Password, How to Hack Rapidshare Premium Account Password, How To Hack eBay User ID and Password, How To Hack Gmail Account Password and How to Hack Any Email Password. In this article i'm going to show you how to hack a Twitter Username and Password using phishing.

Now i know most of you already know what is phishing and how can it be used, but for those who don't know here is a short explanation.
It's simply like this... Phishing site is a exactly same page of the normal twitter login page. But when you enter your email and the password on login field, phishing sites save those login details, then the owner of the phishing site can login to your twitter account with your details later! The only way to recognize a phishing site is reading the address bar of the browser. It should be the normal twitter login URL. If you see something like "www.newtwitter.com/login.php", "www.twitterbeta.com/login.php", etc.

Now before we start Please Note: Phishing is legally offensive. I am not responsible for any action done by you.

How to Hack Twitter Account Password?

1. First of all download Twitter Phisher from here.

2. The downloaded file contains:
  • twitter.html
  • twitter.php
  • password.txt
3. Upload all of the files to any free webhost site like:
4. Once you have uploaded the files in the directory, send this phisher link (twitter.html) to your victim and make him login to his Twitter account using your sent Phisher.

5. Once he logs in to his Twitter account using Phisher, all his typed Twitter id and password is stored in "password.txt".

6. Now, open password.txt to get hacked Twitter id and password as shown.

That's all. Simple, but effectively... Cheers

Learn How to Hack Facebook Password

Hacking Facebook Account Password: Facebook Phishing for Hacking Facebook

Facebook has evolved into one of the hottest social networking website in the world. Here is a simple tutorial that you can use to hack your friend's facebook password. Here i'm writting on hacking Facebbok password using Facebook Phisher.
In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public.[Read more about phishing on Wikipedia]

Facebook Phisher

Please Note: Phishing is legally offensive. I am not responsible for any action done by you.

Hacking Facebook password:

Phishing is the most commonly used method to hack Facebook. The most widely used technique in phishing is the use of Fake Login Pages, also known as spoofed pages. These fake login pages resemble the original login pages of sites likeYahoo , Gmail, MySpace etc. The victim is fooled to believe the fake facebook page to be the real one and enter his/her password. But once the user attempts to login through these pages, his/her facebook login details are stolen away. I recommend the use of Phishing to hack facebook account since it is the easiest one.

1. First of all download Facebook Phisher

2. The downloaded file contains:
  • Index.html
  • write.php
3. Upload both files to any of these free webhost sites:
4. Now, send this phisher link (index.html link) to your victim and make him login to his Facebook account using your sent Phisher.

5. Once he logs in to his Facebook account using Phisher, all his typed Facebook id and password is stored in "passes.txt". This file is created in your webhost control panel as shown.

If you dont get passes.txt, try refreshing your page.Once you get passes.txt, you get Facebook password and can easily use it for hacking Facebook account.

6. Now, open passes.txt to get hacked Facebook id and password as shown.

Hope this tutorial was useful for you.

Recommend us on Google!


Twitter Delicious Facebook Digg Stumbleupon Favorites More