Watch TV on Computer 600x600 (GIF)

Download TV Software. Its safe to install

Index of Hacking Tutorials :: Top Tutorials

Note: I am against the use of these tools, but this thread serves for navigational services. For more specific compilation threads, see one of the below:
Compilation of RATs
Compilation of IM Tools/Hacks
Compilation of White Hat Guides

Index of Hacking Tools

Use the shortcut Ctrl + F to find what you need, or you can scroll down through the categories and see. If you can't find what you need here, the Search button is your best friend.

How to remove CPALead surveys

In this tutorial I will show you how to remove CPALead surveys. Sometimes if you search on google for something, and you find it it may require to do a survey, but it may not be avaible. So here's a way to remove it and continue browsing.

Step 1:

Find a website which requires to do CPALead in order to browse the website.

Example: http://www.youserials.com/serial/adobephotoshopcs4/189664

[Image: ncfrd2.jpg]

Increase Your uTorrent Download Speed By 80%

Increase your Utorrent speed by 80%

Lets get started. If you dont have Utorrent, Download it from here http://www.utorrent.com/. Remember to increase torrent speed please disable firewall before you use it. Now Open it up and follow these screenshots tutorial:
[Image: utorrent1.jpg]

How to Install a IRC Server & Remove Connection Limit

This is a tutorial on how to install a IRC Server, as well as remove the hard connection limit to allow over 1024 connections at one time.

What you will need:
A VPS with linux and a root account
IRCD Software (im using Unkn0wn's modded Ircd.) Found HERE
Putty or some other SSH client, as well as a SSH FTP client. Im using FlashFXP Beta.

Ok now to start
Log into your vps with the root account with putty. If this is your first time logging into your server it will ask you to accept the SHA1 fingerprint. Just do it :)

Now that you are logged in, make sure that you have gcc, gcc-c++, and kernel-devel installed. Use your install command based on the OS you are using. I am using CentOS 5 so my install command is "yum install".
[Image: 2-2.png]
I would also install nano if it isnt already, its an easy text editor to use, also make sure the package "make" is installed too.

It will ask if you want to install, type Y and it will install.

How to hack with a ip address

So say somehow somewhere we ended up choosing a target to start wreaking havoc upon. All we need is an IP Address. Theres plenty of papers out there that go into how to obtain an IP Address from the preferred mark of your choice. So I'm not going to go into that subject. Alright so say we got the targets IP Address finally. What do we do with this IP Address. Well first ping the IP Address to make sure that its alive. In otherwords online. Now at the bottom of this document ill include some links where you can obtain some key tools that may help on your journey through the electronic jungle. So we need to find places to get inside of the computer so we can start trying to find a way to "hack" the box. Port Scanners are used to identify the open ports on a machine thats running on a network, whether its a router, or a desktop computer, they will all have ports. Protocols use these ports to communicate with other services and resources on the network.

1) Blues Port Scanner - This program will scan the IP address that you chose and identify open ports that are on the target box.

protect yourself against phishing


How to protect yourself against phishing

1. What is phishing?
  • Phishing is the method of stealing login info(usernames and passwords) by directing the slave to a clone(fake) login page, that logs the login info without the knowledge of the slave.
  • Such clone website is known as a phisher.
2. How to protect yourself against phishing?
  • Use your login info in the correct places only.
    Don't ever put your login info anywhere else than the page you registered to, unless it's a trusted service you know(such as youtube or blogger asking for your google account's info).

how to mass add friends on Facebook + 20k+ mail list

Well, I got some PM's asking me how to.. so heres a thread..
no need to flame if u already know this method

Goto ur FB account

[Image: account.jpg]

Tracing Unauthorized Login Attempts With Pictures

Hello guys , this is my first tutorial in the hacking ground/section .!
In this tutorial i will teach you , how u can trace the Unauthorized Login Attempts in Windows Xp.

Tracing Unauthorized Login Attempts
In Windows XP


First go the the my computer >right click > click on Manage
and then go System tools > Event viewer > Security

READ this FIRST if you are infected before creating a new thread

NOTE: Do not reply to threads after an HJT log has been requested by a helper and it has been posted. Doing so will result in a warning.

If you are infected, please follow these guidelines:

1. Run a full system scan with your antivirus. Make sure it is up to date.

A few links that may be helpful:
2. Download and install either/all of the following:

Spybot Search and Destroy
Ad-Aware
Malwarebytes' AntiMalware

Run a full scan with either/all. Let them remove anything they find.