Friday, May 25, 2012

Malware Scanner


Hello

This Is a malware scanner where you can scan your files in VirusTotal & NovirusThanks.
I decided to give out the source For ISA MEMBERS

It's not much but please take it easy on me

I hope you like it

Here are some screenshots :


for more detail visit 

✷✷ Elite Recovery ✷ Webpanel/Email ✷ Instant Log Delivery ✷ Auto-Buy ✷✷

Penetration testing



1. BackTrack

The newest contender on the block of course is BackTrack, which we have spoken about previously. An innovative merge between WHax and Auditor (WHax formely WHoppix).

BackTrack is the result of the merging of two Innovative Penetration Testing live Linux distributions Whax and Auditor, combining the best features from both distributions, and paying special attention to small details, this is probably the best version of either distributions to ever come out.

Based on SLAX (Slackware), BackTrack provides user modularity. This means the distribution can be easily customised by the user to include personal scripts, additional tools, customised kernels, etc.

Get BackTrack Here.
http://www.backtrack-linux.org/downloads/


2. PHLAK

PHLAK or [P]rofessional [H]acker’s [L]inux [A]ssault [K]it is a modular live security Linux distribution (a.k.a LiveCD). PHLAK comes with two light gui’s (fluxbox and XFCE4), many security tools, and a spiral notebook full of security documentation. PHLAK is a derivative of Morphix, created by Alex de Landgraaf.

Mainly based around Penetration Testing, PHLAK is a must have for any pro hacker/pen-tester.

Get PHLAK Here http://www.phlak.org/modules/mydownloads/

3. Auditor

Auditor although now underway merging with WHax is still an excellent choice.

The Auditor security collection is a Live-System based on KNOPPIX. With no installation whatsoever, the analysis platform is started directly from the CD-Rom and is fully accessible within minutes. Independent of the hardware in use, the Auditor security collection offers a standardised working environment, so that the build-up of know-how and remote support is made easier.

Get Auditor Here

4. L.A.S Linux

L.A.S Linux or Local Area Security has been around quite some time aswell, although development has been a bit slow lately it’s still a useful CD to have. It has always aimed to fit on a MiniCD (180MB).

Local Area Security Linux is a ‘Live CD’ distribution with a strong emphasis on security tools and small footprint. We currently have 2 different versions of L.A.S. to fit two specific needs – MAIN and SECSERV. This project is released under the terms of GPL.

Get L.A.S Linux Here
http://localareasecurity.com/download

. Knoppix-STD

Horrible name I know! But it’s not a sexually trasmitted disease, trust me.

STD is a Linux-based Security Tool. Actually, it is a collection of hundreds if not thousands of open source security tools. It’s a Live Linux Distro, which means it runs from a bootable CD in memory without changing the native operating system of the host computer. Its sole purpose in life is to put as many security tools at your disposal with as slick an interface as it can.

http://s-t-d.org/download.html
for more details visit
http://isahackers.com/satz/showthread.php?t=174

HOT- Proxy Tester V2 By -DIER.16

Thursday, May 24, 2012

15000 Vulnerable Websites Free !


Hey guys, I wanna share with you list that I found in Somesites 
15K vulnerable websites.
To get that, just download the link here:


for more details visit
http://isahackers.com/satz/showthread.php?t=559

Wednesday, May 23, 2012

[New Version] Java Drive-by Generator v2.5.1


 [New Version] Java Drive-by Generator v2.5.1 [New Version]
HELLO ISA
I found a java drive by genreator . i want to share all of member in the ISA .its new version of IJAVA DRVE BY GENREATOR so i will go to share all of you

Credit goes to
UNKNOWN

Its Our previous Version Of Ijava genreator :- http://isahackers.com/satz/showthrea...ighlight=ijava


Note
first download and install the Java Development Kit JDK
Download Link
http://www.oracle.com/technetwork/ja...ad-432154.html
Java Drive-by Generator v2.5.1
SNAPSHOT

for more details visit
http://isahackers.com/satz/showthread.php?t=554

STAY ANONYMOUS AND SECURE BY SSH TUNNELING BY SSH + TOR


Hello All,
I know all of you are scared to hack/deface a website without taking precautions.
Most of you must not be having a good VPN which is paid and secure enough to do illegal stuffs. So today i will teach you how to stay completely secure without using any VPN

So first ,i would just tell some problems of free VPN's
They are slow and contain ads in most cases
Limited number of proxies
Very insecure
Store logs
Easily Traceable using Logs
Even when they say they do not store logs,they do it
They are not reliable


Tools Needed

1.TOR
2.PuTTY

1.TOR
Free software implementation of second-generation onion routing, a system enabling its users to communicate anonymously on the Internet.

PuTTY

PuTTY is a free implementation of Telnet and SSH for Windows and Unix platforms, along with an xterm terminal emulator.



Open PuTTY.
In The Category, choose Session.
In the Host Name,Type shellmix.com.
Type Port as 30.
Connection Type : SSH.
Now Click Open.
A Black Window will appear.
Enter Username and password as "newuser" [Password appears blank but its typed]

A Black Window Appears
Now enter a Login Name.
Enter a Password.
Enter another password For MySQL Database.
Enter Email Address.
Choose Editor and Enter pico.
Choose language : Enter us.
Choose Vhost : Enter shell.
Enter HDD : Enter hdd1 or hdd2.
Now press Enter to Continue.
Now ,your shell account is ready.Make sure you remember the username and password you created.
SSH TUNNELING
Re-Open PuTTY.
Hostname : shellmix.com.
Port : 22.
Now in category on the left,choose SSH.
Expand it and select Tunnel.
Destination : Dynamic.
Port : Any random port. (Example : 4545)
Click Add.


Click Open.
Enter Login name and Password that you created earlier
Leave this window open
Open TOR
Click Firefox > Options > Advanced > Network > Settings
Click Manual Proxy Configuration
Socks Host : 127.0.0.1
Port : 4545 (The port you used earlier in PuTTY)
Click OK
SSH Tunnel Is Ready.Go to http://www.ip2location.com/ and verify your fake IP



for more visit our forum



Tuesday, May 22, 2012

Havij 1.152 Pro (Cracked)



Register Name: Cracked@By.Exidous
Lic File http://www.sendspace.com/file/e76pvq
Havij http://www.sendspace.com/file/zg7s8d
Missing OCX's http://www.sendspace.com/file/944mqf
for more visit
http://isahackers.com/satz/showthread.php?140-Havij-1-152-Pro-(Cracked)&highlight=havij

SQLi Google Dorker By: Exidous

167$ CPA Blaster Ultimate Free NOW For ISA !


If you’re struggling to make money with CPA, CPA Blaster is exactly what you need…

No Experience - easy to use, no complex knowledge needed

No Cost - our methods are completely free and they generate their own free traffic

No Time - no more spending a week setting up your website and getting traffic only to see 3$/day… you can get your whole website and traffic setup in 2 hours.

Note: This tool was made to boost your CPA campaign earnings to levels you never thought you could reach. So, I’ll skip the “product features” and tell you what the direct benefits are…
Instant Content: All you have to do is think about what TV serie you want to promote and CPA Blaster will do all the hard work for you. Our software will find and post all episodes on your blog with the click of one button… And that’s not all it will keep your blog updated, posting all the new episodes for all the series you want!


Instant Youtube Traffic: This tool will make your life much easier , the ones how are already using youtube traffic know that your videos are constantly being removed because the competition is flagging them. Cpa Blaster will auto check all your videos , and if one of them is removed it will automaticly upload it with different title and description on a different account all on autopilot.

Proof of the this software cracked: 


                                                                          PHP Code:
                                                   SalesPage: http://www.cpa-blaster.com/

Steps to Use: 1) Download CPA Blaster Tutorial from here: http://www.mediafire.com/?kcnf8hhf425csui 

2) Download the tool of CPA Blaster from the below link!! Enjoy

It costs 167$ and now I am giving it out for free. Enjoy the Tool, Buddy.

Here is the link: http://www.mediafire.com/?xf9lrxcl3n3r2cs
for more visit
http://isahackers.com/satz/showthread.php?553-167-CPA-Blaster-Ultimate-Free-NOW-For-ISA

StRaXxXD FUD File Binder v1.0[100% Working]


File information  
Report date:    2012-04-27 13:14:37 (GMT 1)
File name:    StRaXxXD_Binder_v1.0.zip
File size:    143031 bytes
MD5 hash:    818dbab577d446d8b3c4800671541a2a
SHA1 hash:    55d06d6a32c9cde9684a0b2acd3267e1a698b94c
Detection rate:    0 on 20 (0%)
Status:    CLEAN
Antivirus    Database    Engine    Result
a-squared    27/04/2010    4.5.0.8    -
Avast    100331-1    4.8.1368    -
AVG    271.1.1/2837    9.0.0.725    -
Avira AntiVir    7.10.6.221    7.6.0.59    -
BitDefender    27/04/2010    7.0.0.2555    -
ClamAV    27/04/2010    0.96.1    -
Comodo    3468    3.13.579    -
Dr.Web    27/04/2010    5.0    -
F-PROT6    20100426    6.3.3.4884    -
G-Data    19.9309    2.0.7309.847    -
Ikarus T3    27/04/2010    1001074    -
Kaspersky    27/04/2010    9.0.0.736    -
McAfee    31/03/2010    5.1.0.0    -
NOD32    5064    4.0.474    -
Panda    26/04/2010    9.5.2    -
Solo    27/04/2010    8.0    -
TrendMicro    129    9.120-1004    -
VBA32    27/04/2010    3.12.12.2    -
VirusBuster        1.5.6    -
Zoner    27/04/2010    0.2    -
Extra information
File type:    Unknown file
Packer:    Nothing found
Binder detector:    Nothing found
PDF analyzer:    Nothing found
http://www.mediafire.com/?zw9uzt2p5ol6c9d

for more info visit our site
http://isahackers.com/satz/showthread.php?550-StRaXxXD-FUD-File-Binder-v1-0-100-Working

Binding With Iexpress [FUD]



Binding With Iexpress
Hey guys this is my tutorial on how to bind with Iexpress(noob friendly)

Step 1:

Ok so obviously you want to Goto Start > Run > Iexpress
or Windows Key + R > Iexpress

Step 2:

Now You will Need to find the two files you would like to bind
i will use these as an example:example1.exe and example2.exe

Step 3:

In iExpress press create new self extracting device
>next
Pick a title
>next

Step 4:


Click Do not display a license

Step 5:

here comes the binding

Press on the Add Button and select the files you wish to bind
>next

Step 6:


On install program put the non-malicious file
And in the Post Install command put the malicious file
so im put example1.exe in the install program
and example2.exe in the post install command
thus binding example2.exe to example1.exe

Step 7:


Put show window to default
>next
Then select no message

Step 8:

Now its time for the binded file

go ahead and click brows and find the location to save you're newly binded file
click hide file extracting progress animation from user
>next
No restart
click dont save
>next
click finish

Optional:
changing the icon and information
This requires basic knowledge of reshacker!

Open it in Reshacker and change the icon and assembly information

for more info visit our site
http://isahackers.com/satz/showthread.php?540-Binding-With-Iexpress-FUD

Hide IP using VPN [NO SOFTWARES]



1. Open the "Control Panel"



2. Click on "Network and Internet"



3. Click "Network and Sharing Center"



4. In the box: "Change your Network Settings"
Choose "Set up a new connection or network"



5. In the box: "Choose a connection oppion"
Choose "Connect to the Internet"



6. Choose "Set up a new connection anyway"


7. Choose "Broadband (PPPoE)"




8. Example:

Username: free
Password: 1142

Connection name: us.gofreevpn.com

9. Connect..
for more info visit
http://isahackers.com/satz/showthread.php?546-Hide-IP-using-VPN-NO-SOFTWARES