SOCIAL ENGINEERING NINJA V0.4 - LATEST RELEASE DOWNLOAD

Written By TAC Team on Sunday 17 March 2013 | 10:41


S-E Ninja is a Social Engineering tool, with 20-25 popular sites fake pages and anonymous mailer via mail() function in PHP. It is a Phishing Web Application Written in PHP,XHTML,CSS,JS.”


This is the official change log:


  • Edited tables names
  • Added XSS stealer module
  • Now you got control of ip_capture module auto re-direction. Check out config.php.
  • New module_lib functions
  • Fixed install.php bug
  • New logo banner
  • Added new phishing page facebook.login.php
  • Added search module to search in the database
  • More security stuff
  • Added php.ini
  • Edited install.php file
  • Fixed some securityholes in database_connect.php
  • Fixed xp_sp3_all.php bug
  • New style for exploit module
  • Added new public browsers exploits
  • More iframes
  • New phishing pages hotfile, xboxlive
  • Added country table for ip_capture_module and phishing_module
So you see that this version has added support for HotFile and XBOXLive web sites and the new XSS stealer module! Enjoy phishing!

Download Social-Engineering Ninja V0.4 Here

DOWNLOAD KALI LINUX, FROM THE CREATORS OF BACKTRACK


Great news for Hackers and Backtrack Linux fans! The most awaited penetration testing Linux distribution has been released called 'Kali Linux' or 'Backrack 6', from the creators of BackTrack itself. From last 7 years we have seen five awesome versions of Backtrack Linux. But this time to achieve some higher goals, team decided to leave the 4 years old development architecture and 'Kali Linux' born today.

Kali Linux is based upon Debian Linux, instead of Ubuntu and new streamlined repositories synchronize with the Debian repositories 4 times a day, constantly providing users with the latest package updates and security fixes available.

Another great feature introduced is that, because of Debian compliant system, it is now able to Bootstrap a Kali Installation/ISO directly from Kali repositories. This allow any user to easily build their own customization of Kali, as well as perform enterprise network installs from a local or remote repository.

The Kali Linux ARM Architecture images work like charm on Samsung ARM Chromebook, Raspberry Pi, ODROID U2 / X2 and SainSmart SS808.
With more than 300 penetration testing tools, completely free, Open source, Vast wireless device support, GPG signed packages and repos, Multi-language, Completely customizable make this distribution one of the best available masterpiece of hacking community.

Once again, default root password is same “toor“, you can download Kali Linux here.


HACKING FACEBOOK PASSWORD LIKE CHANGING YOUR OWN PASSWORD

Hacker found a way to hack and change your password like, just he used to change his own password. Confused ? Recently Facebook fix a very critical vulnerability on the tip of 'Sow Ching Shiong', an independent vulnerability researcher. Flaw allows anyone to reset the password of any Facebook user without knowing his last password.

At Facebook, there is an option for compromised accounts at "https://www.facebook.com/hacked" , where Facebook ask one to change his password for further protection. This compromised account recovery page, will redirect you to another page at "https://www.facebook.com/checkpoint/checkpointme?f=[userid]&r=web_hacked" .


Researcher notice that the URL of the page having a parameter called "f" which represents your user ID and replacing the user ID with victim's user ID allow him to get into next page where attacker can reset the password of victim without knowing his last password.
The Vulnerability was very simple to execute, but now patched by Facebook Security Team.
via HackerNews

HOW TO DELETE FACEBOOK TIMELINE?

Chrome Users - Remove Timeline Profile By Using These Steps - Timeline Remove
Description - Time Line Remove extension disable the new facebook timeline! This extension disables only the display of the new facebook timeline.This does not mean that your friends will not see your timeline. You can disable the new profile for all and go back.It is recommended to all your friends! Remove Timeline..




1. Open your chrome browser & Click on wrench option.

2. Now go to Tools - Extension - Get More Extensions

3. In the search option write "TimelineRemove" or Click here.

4. After install the extension restart your browser.

5. Its done, you will see your old Facebook profile look.



If you need any type of help regarding this extension, you can contact me via comments. Enjoy ....:)

TEMPLE RUN FOR PC FREE DOWNLOAD

Written By TAC Team on Sunday 10 March 2013 | 03:24


Temple-Run for Pc
Temple Run is an endless action video game and daily growing the number of players, who play this game via mobile phones using iOS systems, android on smart phones. And our team bring this available and for Computer or random Pc.


Download it from here:
Click Here

Download password from here:
Click Here

Procedure:
1)Install this application: Click Here


2) When you have installed the tool, go to the extracted file from "Temple Run For Pc.zip" archive, and Run it.


3) Finally start playing Temple Run.

Don't Forgot to Put Your Comments...... 
Enjoy..:)

WAppEx v2.0 : WEB APPLICATION EXPLOITATION TOOL

Written By TAC Team on Saturday 9 March 2013 | 04:06


WAppEx is an integrated Web Application security assessment and exploitation platform designed with the whole spectrum of security professionals to web application hobbyists in mind. It suggests a security assessment model which revolves around an extensible exploit database. Further, it complements the power with various tools required to perform all stages of a web application attack.

Updates in 2.0
  • Auto-detect feature deleted from exploits
  • Browser tool deleted
  • Exploits and payloads view changed
  • Exploit Database with the following features added:
    • New script syntax and structure
    • Searching, selecting, and executing of exploits.
    • Add/remove database entries (exploits or payloads)
    • Add exploits or payloads to the database using either the Exploit Wizard or the script file
    • Batch testing of multiple targets against multiple exploits
    • Execute multiple instances of one or more payloads (for every running exploit) simultaneously.
  • Following tools added:
    • Manual Request
    • Dork Finder
    • Exploit Editor
    • Hidden File Checker
    • Neighbor Site Finder
  • Local File Inclusion analyzer script updated
  • 24 new payloads for LFI, RFI, and PHP Code Execution vulnerabilities added:
    • Directory Explorer
    • CodeExec Bind
    • 3 connect-back shells
    • Code Execution
    • MySQL Dump
    • ServerInfo
    • 4 command execution payloads
  • Bug-fixes:
    • Find Login Page crashed on start
    • Problem with software registration
    • Stop button did not work when retrieving data from SQL server
    • Problem with saving SQL results
    • Crashed when closing Find Login Page
    • Status icons were not displayed properly in exploit tabs


The full list features is as below:
  • An exploit database covering a wide range of vulnerabilities.
  • A set of tools useful for penetration testing:
    • Manual Request
    • Dork Finder
    • Exploit Editor
    • Hidden File Checker
    • Neighbor Site Finder
    • Find Login Page
    • Online Hash Cracker
    • Encoder/Decoder
  • Execute multiple instances of one or more exploits simultaneously.
  • Execute multiple instances of one or more payloads (for every running exploit) simultaneously.
  • Test a list of target URL’s against a number of selected exploits.
  • Allows you to create your own exploits and payloads and share them online.
  • A number of featured exploits (6) and payloads (39) bundled within the software exploit database:
    • Testing and exploiting of Local File Inclusion vulnerabilities
    • Testing and exploiting of Local File Disclosure vulnerabilities
    • Testing and exploiting of Remote File Inclusion vulnerabilities
    • Testing and exploiting of SQL Injection vulnerabilities
    • Testing and exploiting of Remote Command Execution Inclusion vulnerabilities
    • Testing and exploiting of Server-side Code Injection vulnerabilities


SNORT 2.9.4.1 - NETWORK INTRUSION DETECTION SYSTEM


Snort is a free and open source network intrusion prevention system (NIPS) and network intrusion detection system (NIDS) . Snort having the ability to perform real-time traffic analysis and packet logging on Internet Protocol (IP) networks. Snort performs protocol analysis, content searching, and content matching.

Snort 2.9.4.1   Network intrusion detection system

The program can also be used to detect probes or attacks, including, but not limited to, operating system fingerprinting attempts, common gateway interface, buffer overflows, server message block probes, and stealth port scans. Snort can be configured in three main modes: sniffer, packet logger, and network intrusion detection.

Improvements in Snort 2.9.4.1
  • Updated File processing for partial HTTP content and MIME attachments.
  • Addition of new config option max_attribute_services_per_host and improve memory usage within attribute table.
  • Handle excessive overlaps in frag3.
  • Stream API updates to return session key for a session.
  • Reduce false positives for TCP window slam events.
  • Updates to provide better encoding for TCP packets generated for respond and react.
  • Disable non-Ethernet decoders by default for performance reasons. If needed, use --enable-non-ether-decoders with configure.


SAMSUNG GALAXY NOTE II LOCK SCREEN BYPASS VULNERABILITY


iOS was in the news lately for a series of security mishaps, but this time android back in scene. A security flaw discovered by Terence Eden on the Galaxy Note II with Android 4.1.2 that allows hackers to briefly bypass the phone's lock screen without needing a password.By hitting "emergency call" then "emergency contacts" then holding the home button, the main home screen becomes visible for around a second just enough time to load an app, before reverting back to the lock screen.
Not all apps will open in this manner, a demo video shows that Google Play does not respond. Reportedly, Eden contacted Samsung roughly five days ago but has yet to hear back. He said that he has not tested any other Samsung devices to see if they are also affected.

The flaw appears to be similar to a screen lock vulnerability in newer Apple devices, including the iPhone 5.
Steps to follow: 
1.) Lock the device with a "secure" pattern, PIN, or password.
2.) Activate the screen.
3.) Press "Emergency Call".
4.) Press the "ICE" button on the bottom left.
5.) Hold down the physical home key for a few seconds and then release.
6.) The phone's home screen will be displayed - briefly.
7.) While the home screen is displayed, click on an app or a widget.
8.) The app or widget will launch.
9.) If the widget is "direct dial" the phone will start ringing.

Using this method it could also be possible to load up email or SMS apps for long enough to get an overview of sensitive messages.


PASSWORD CRACKER TOOL HASHKILL VERSION 0.3.1 RELEASED


Hashkill is an opensource hash cracker for Linux that uses OpenSSL. Currently it supports 4 attack methods (dictionary, bruteforce, hybrid).
Password Cracker Tool Hashkill version 0.3.1 released

Hashkill has 35 plugins for different types of passwords (ranging from simple hashes like MD5 and SHA1 to passworded ZIP files and private SSL key passphrases).

Multi-hash support (you may load hashlists of length up to 1 million) and very fast GPU support on Nvidia (compute capability 2.1 cards also supported) and ATI (4xxx, 5xxx and 6xxx).

The latest update includes 9 new plugins: bfunix, drupal7, django256, sha256unix, mssql-2012, o5logon, msoffice-old, msoffice, luks. Of them msoffice-old is currently supported on CPU only, the rest are GPU-accelerated. Improved bitmaps handling in non-salted kernels addded, so that huge hashlists would be cracked at faster speeds. Now Thermal monitoring can now be disabled using -T 0 command-line argument.

Download Hashkill 0.3.1


AUTO HIDE IP 5.3.0.6 FREE WITH CRACK DOWNLOAD

Written By TAC Team on Friday 1 March 2013 | 03:34

Auto Hide IP 5.3.0.6 Free Full-Version Download | Size:- 4.76 MB

<-- DOWNLOAD -->
zip password - click here



About:-Auto Hide IP 5.3.0.6 Full allows you to surf anonymously, change your IP address, and guard against hacker intrusions. Your IP address - your identity and can be used by hackers to break into your computer, stealpersonal information, or commit other crimes against you. Auto Hide IP 5.3.0.6 Full + Patch allows you to surf anonymously, change your IP address, prevent identity theft, and guard against hacker intrusions, all with the click of a button.

Software Features Auto Hide IP:
- Ability to change and hide ip
- Send an anonymous email.
- You want to change the IP selection
- Ability to change the IP system with one click
- Prevents hackers from infiltrating into the system
- Protect Your Identity
- Having good speed in loading web pages
- Change IP automatically without user intervention
- IP checking software used by the Web Site
- Anonymity on the Internet and surf secretly
- Ability to change ip at different time intervals
- Ability to pass a ban on Internet
- A compact and easy to use
- A beautiful and friendly environment.
- Ability to run at start-up
- Compatible with different versions of Windows


MS OFFICE PRO PLUS 2013 INCL CRACKER FREE DOWNLOAD

Microsoft Office Professional Plus 2013 Incl Cracker Free Download | Size:- 720 MB


password is - www.downloadha.com

Popular Posts