Skip to main content

Posts

Place Files Inside EXE and Execute them using Gamemaker

I am fond of creating games in Gamemaker and Mugen. However I found an interesting way to create executable files that may contain anything inside them (may be a whole cracked Program) and may act as extractors or copy protectors Tools required  GameMaker 7 or above Procedure  1) Download and Install Gamemaker and start a Game Project by going to File -> New.  2) Every game consists of a Room in which all objects shall act and interact with each other.So Create a new room by either clicking on the icon on Standard toolbar or by going to Resources Menu -> Create Room.Name it anything you want.In my case ROOM0  3)Every Game consists of Objects which are responsible for all interactions. So create a new object by either clicking on the icon on Standard toolbar or by going to Resources Menu -> Create Object.Name it anything you want.In my case VIRUS  4)Now create a new script (Press CTRL+ALT+C or Resources Menu -> Create Script),Name it SCRIPT0 and type there {  execu
Recent posts

How to Hack a Twitter Account

Twitter is one of the topmost widely running social networking sites,Its alexa ranking is 14(As per now).So therefore it is largely becoming target of hackers,Many requests keep coming to me ,please tell us a way to Hack twitter accounts or How to hack twitter accounts,so therefore i today i have written a post on How to hack twitter accounts Well for this purpose i will tell you the most used method to hack twitter accounts i.e phishing How to hack twitter accounts - Phishing First of all download:   Twitter fake login page ( Latest Version ) Click Here To Download : NOTE : You will be asked to enter a password while extracting the Documents. Please Insert the password as : IHA Step 1 First extract the contents into a folder Step 2 Then edit login.php .(right click and then select edit) In that ,find (CTRL+F) ‘http://rafayhackingarticles.blogspot.com’ then change it to your destined URL but don’t forget ‘'. Now rename the script to pass.php and save it

Create Fake Pages

I will give some hacking lessons to budding hackers. This will tell you how to create fake pages. Here is how you create one. Let me show how you do for Google.com. Open Google in a new tab or Click Here . Now select "View" from menubar Then select "Source"(IE) or "Page Source"(firefox). This will show you raw html of the site in a notepad in case of IE. In firefox this will be visible in firefox. Now You need To save this page. Just select "Save page as " . Change save type as to "All Files". and save it as XYZ.html(anyname.html) Now just double click on the html it will open in your browser. You will be get the exact replica of the google page Only problem is the images are not visible. This is because most sites uses relative path. Just visit the actual page and save all images. Now upload it anywhere on the web. Just get the links of the images. In many cases even the css file(for how sites appear) are also relatve. Yo

Basic Introduction To SQL Injection

SQl injection is a vulnerability that allows an attacker to influence the queries that are passed to the back-end database.It has been present since the time databases have been attached to the web applications.However, the main credit of bringing SQL injection into public notice goes to Rain Forest Puppy who in 1998 wrote an article on it and in 2000 he wrote another article describing how he hacked one of the popular website on the internet using SQL injection. Before understanding the how SQL injection attacks we need to understand the Simple Three Tier Architectureor a Four Tier Architecture.This will clear your basics and give you a rough idea of how database-driven web applications work. Three Tier Architecture In a simple three tier datbase-driven architecture the three layers that are used are:- Presentation Tier(Browsers) Logic Tier Storage Tier(Database) The three tier architecture follows a linear relationship i.e Presentation Tier connects to the Logic Tier and

Recovery attack on facebook ids, hack and crash id

TODAY I AM "going to post a dangerous attack in a simple way better chances then other ways." Steps :- 1. enter the id of victim and any fake password then click on request new one! see screenshot 2. no longer access of these see screenshot 3. enter a non- fb email which have no fb account so fb will sent a recovery mail. see screenshot 4. now you will have no problem if you know security que of your victim! or if not try in three chances if the question is correct it will over! 5.  if your security que is correct you will see something like that enter new password what you want! then fb will sent a confirm mail to your id by clicking you can hack a id! 6. now open your suggest mail id and check fb mail and click on links then after 24 hours you can use hacked id! now i m going to tell you what will happen if you enter wrong security question i will go back and enter fake ans! if you give wrong security ans you will see something like that

How to use Keyloggers – Detailed Tutorial and FAQs

Here is a DETAILED tutorial which contains every possible information that you need to know about keyloggers which includes how to use it, how it works etc. WARNING: I highly recommend that you read this post completely since every single piece of information is important. I know most of you are new to the concept of keyloggers. For some of you, this might be the first time you heard about the term “keylogger”. So to give you a clear picture and make you understand better I would like to take up this post in the form of FAQs (Frequently Asked Questions). Here we go… 1. What is a Keylogger? A keylogger (also called as spy software) is a small program that monitors each and every keystroke a user types on a specific computer’s keyboard. A keylogger program can be installed just in a few seconds and once installed you are only a step away from getting the victim’s password. 2. How Keylogger works? Once the keylogger is installed on a PC, it starts operating in the backgrou

Software cracking : An Overview

Software Cracking Software cracking - you all have heard about this term , Today I will provide an overview about Software Cracking .It is the processor menthod of bypassing the registration and payment process for on a software product and To remove copy protection safeguards or to convert a demo version of software into a fully functional version without paying for it. This process generally requires loading the executable into a hexadecimal code editor and directly modifying the code. Now this executable file is then run in place of the original. Software cracking is illegal and all the cracked software are called pirated software. Cracked software are not so reliable as they have the modified executable fileand may result in undesirable behaviour. The most common software crack is the modification of an application's binary to cause or prevent a specific key branch in the program's execution. This is accomplished by reverse engineering the compiled program code usi