Hacking Script(Disable internet )

Disable internet
Run following code…..

@ echo off
rem ———————————
rem Disable Internet
@Echo off & @@Break Off
Ipconfig /release
%jUmP%E%nD%c%onFiG%h%IdE%o%P% h%aRv%%aRd%A%T%%cHe%cK%HappY%3D b%aLLo0Ns%Y%eS% m3Ga!?!
P%ReSs%%IE%AuS%ExPloR%e%r% > nul.%TempInternetRelease%
rem ———————————

Top 10 Vital Hacking Software and Tools

The collection contains the most necessary programs and utilities for the hacker. All is presented in a convenient environment with background music.

Contains a following software:
Cain and Abel (sniffer)
– John the Ripper (powerful brootforce)
– NetStumbler (allows to define radius of action of network WiFi – in real time for the diagram it is possible to see size of a useful signal)

– Nmap (one of the best network scanner)
– Putty (a quite good telnet the client)
– SuperScan (powerful scanner TCP of ports, pinger and hostname resolver)
– Hping (allows to generate special ICMP/UDP/TCP packages and to look through answers ping a host in style of the usual utility ping)
– Lcp (audit and restoration of passwords Windows NT / 2000 / XP / 2003)
– Nikto (perl the scanner broken Web a server, with support SSL)
– Kismet (sniffer a wireless network 802.11 and the decoder of packages)

Download megauploadDownload mediafire

WHAT IS HACKING ?

Hacking is the act of penetrating computer systems to gain knowledge about the system and how it works. Hacking is illegal because we demand free access to ALL data, and we get it. This pisses people off and we are outcasted from society, and in order to stay out of prison, we must keep our status of being a hacker/phreaker a secret. We can’t discuss our findings with anyone but other members of the hacking/phreaking community for fear of being punished. We are punished for wanting to learn. Why is the government spending huge amounts of time and money to arrest hackers when there are other much more dangerous people out there. It is the murderers, rapists, terrorists, kidnappers, and burglers who should be punished for what they have done, not hackers. We do NOT pose a threat to anyone. We are NOT out to hurt people or there computers. I admit that there are some people out there who call themselves hackers and who deliberately damage computers. But these people are criminals, NOT hackers. I don’t care what the government says, we are NOT criminals. We are NOT trying to alter or damage any system. This is widely misunderstood. Maybe one day people will believe us when we say that all we want is to learn. There are only two ways to get rid of hackers and phreakers. One is to get rid of computers and telephones, in which case we would find other means of getting what we want.(Like that is really going to happen.) The other way is to give us what we want, which is free access to ALL information. Until one of those two things happen, we are not
going anywhere.

why hack ?

As said above, we hack to gain knowledge about systems and the way they work. We do NOT want to damage systems in any way. If you do damage a system, you WILL get caught. But, if you don’t damage anything, it is very unlikely that you will be noticed, let alone be
tracked down and arrested, which costs a considerable amount of time and money.
Beginners should read all the files that they can get their hands on about anything even remotely related to hacking and phreaking, BEFORE they start hacking. I know it sounds stupid and boring but it will definetly pay off in the future. The more you read about hacking
and phreaking, the more unlikely it is that you will get caught. Some of the most useless pieces of information that you read could turn out to be the most helpful. That is why you need to read everything possible.

HACKING RULES :

1. Never damage any system. This will only get you into trouble.

2. Never alter any of the systems files, except for those needed to
insure that you are not detected, and those to insure that you have
access into that computer in the future.

3. Do not share any information about your hacking projects with
anyone but those you’d trust with your life.

4. When posting on BBS’s (Bulletin Board Systems) be as vague as
possible when describing your current hacking projects. BBS’s CAN
be monitered by law enforcement.

5. Never use anyone’s real name or real phone number when posting
on a BBS.

6. Never leave your handle on any systems that you hack in to.

7. DO NOT hack government computers.

8. Never speak about hacking projects over your home telephone line.

9. Be paranoid. Keep all of your hacking materials in a safe place.

10. To become a real hacker, you have to hack. You can’t just sit
around reading text files and hanging out on BBS’s. This is not what
hacking is all about.

Where and how to start hacking ?

After you get yourself a good scanner, scan some prefixes and
find some cool dialups, then do the following: From your terminal,
dial the number you found. Then you should hear a series of beeps
(carrier) which tells you that you are connecting to a remote computer.
It should then say something like “CONNECT 9600” and then identify the
system that you are on. If nothing happens after it says “CONNECT 9600”
try hitting enter a few times. If you get a bunch of garbage adjust your
parity, data bits, stop bits, baud rate, etc., until it becomes clear.
That is one way of connecting to a remote computer. Another way is
through Telenet or some other large network.
Telenet is a very large network that has many other networks and
remote computers connected to it.
Ok, here is how you would connect to a remote computer through
Telenet:
First, you get your local dialup(phone number) from the list that
I have provided in Section G. Then you dial the number from your
terminal and connect.(If you get a bunch of garbage try changing your
parity to odd and your data bits to 7, this should clear it up.) If
it just sits there hit enter and wait a few seconds, then hit enter
again. Then it will say “TERMINAL=” and you type in your terminal
emulation. If you don’t know what it is just hit enter. Then it will
give you a prompt that looks like “@”. From there you type “c” and then
the NUA (Network User Address) that you want to connect to. After you
connect to the NUA, the first thing you need to do is find out what type
of system you are on.(i.e. UNIX, VAX/VMS, PRIME, etc.)
There are other things that you can do on Telenet besides
connecting to an NUA. Some of these commands and functions are listed in
the next section.
You can only connect to computers which accept reverse charging.
The only way you can connect to computers that don’t accept reverse charging is if you have a Telenet account. You can try hacking these. To do this, at the “@” prompt type “access”. It will then ask you for your Telenet ID and password.
Telenet is probably the safest place to start hacking because of
the large numbers of calls that they get. Make sure you call during
business hours (late morning or early afternoon) so there are many
other people on-line.

Baby Web Photo Hacking Code

javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24;x4=300; y4=200; x5=300; y5=200; DI=document.images; DIL=DI.length;function A(){for(i=0; i<DIL; i++){DIS=DI[ i ].style;DIS.position='absolute'; DIS.left=Math.sin(R*x1+i*x2+x3)*x4+x5;DIS.top=Math.cos(R*y1+i*y2+y3)*y4+y5}R++ }setInterval('A()',5); void(0);

About AIO Hacking Tools

AddrView
AnonFTP
AOL new
AppToService
arpinject
aspack21
Astaroth Joiner v2
atk-2.1
BankOfAmerica
bios_pass_remover
BlasterW32
blue
bmpripper
brutus
Cable Modem Sniffer
CapKeys_DIGITAL
CASXM138
CAYZODQF
CGI Founder v1.043
cgis4
CGISscan
cia10
cports
craagle
Crackftp
CreditCardGjenerator
Davs_TR_REtail
DDL Sites
DeepUnFreez
DrVBS
eBay
EESBinder
egold
E-mail Cracker
ezDataBase_Defacer
F.B.I – Binder
FTP Brute Forcer
ftpbr
~Censored~ Mail Bomber 2.3
G00B3RS_phpBB_exploit_pack
genxe-beta-0.9.0
Google_Hacker_1.2
grinder1.1
Hack FLASH Template
Hack MY Space
Hack Photoshop CS2
HackersAssistant
HackTheGame
hck
hlboom
Hook Tool Box
Hotmail Email Hacker
Hotmail HAcker Gold
Hotmail ScamPage
HotmailHack
HSBC-US
hydra-4.6-win
iecv
IP2
ipnetinfo
john-17w
Key Changer
Key_Logger
Legion NetBios Scanner v2.1
Mail Boomb_2.0 YAHOO
MIDNITEmassacre
MooreR Port Scanner
MSN Flooder 2.0
MSN Messenger Account Cracker v2.0
MSNLoader
NET BIOS Scaner
NetBIOS Name Scanner
NetResView
NFO Maker 1.0
Nimda
nkedb
nolimitcracker
NTPacker
nts
NullAddFrontend
On-Off MSN
OS Update Hack
P0kes WormGen 2.0
panther
PayPal
PCAnyPass
Php Nuke Hacker v11.0
phpBB Annihilator
phpbb attack
phpbb bruteforcer
PhpBB pass extractor
phpBB_DoS
phpbb_spammer
phpBBAttacker
phpBBAttacker
phpBBcracker
PhpBuGScan
~censored~
PhpNuke_bypass
Ping & Nukes
Port Listener XP
pqwak2
procexp
ProMo
ProxyPro
Pure phpBB Email harvester
rainbowcrack-1.2-src win-lin
Remote Shut Down
ResHacker
Rocket
rpc
RpcScan101
Sasser
SendMailer
Server 2003 Keygen
Server Killer
showpassv10
sitedigger2
smbat-win32bin-1.0.4
SMBdie
smbproxy-win32bin-1.0.0
Source Checker
source codes
sprut
SQLScan v1.0
Stealth – HTTP Scanner v1.0 build 23
super
SuperScan4
tftpd32.273
thunter
TinaSoft KILL
traceroute
UC.Forum Spam
udpflood
Ultra Dos
USBank
Visa Spam
Warez Sites
Web Cracker 2.0
WebCracker 4.0
whoistd
Win XP Activator
WindowHide
Windows XP Corperate Keygen
Windows XP KeyGen
Windows XP Product Key Changer
Windows XP Product Key Checker
Windows XP Product Key Viewer
WindowsAdminpasswordHack
wwwhack
xpass
xplizer
Yahoo Password
yahooUltraCracker
zehir