WHAT IS AN ACTIVEX CONTROL? : An ActiveX control is a COM object similar to a Standard VB Class Module or ActiveX DLL with properties, ...
Categories
- BackTrack (1)
- Bot (1)
- BotNet (1)
- Browser (1)
- C/C++ (11)
- C/C++ Source (7)
- Cracking (10)
- Download (1)
- Facebook (4)
- Google Chrome (1)
- Hacking (13)
- how TO (11)
- IRC (1)
- Java (8)
- Java Source (7)
- Keylogger (5)
- ocx (1)
- Phreaking (1)
- Programming (13)
- RAT (1)
- Skype (1)
- SMS (1)
- Source Code (15)
- Tutorial (12)
- VB6 (1)
- Virus (2)
- WEP (2)
- WiFi (2)
- Win7 (1)
- Windows (2)
Google Chrome Offline installer (20.0.1132.57 Stable)
Google Chrome is a browser that combines a minimal design with sophisticated technology to make the web faster, safer, and easier.Use one...
Categories
Browser,
Download,
Google Chrome,
Windows
[SRC-JAVA] Nano IRC Bot
An IRC bot is a set of scripts or an independent program that connects to Internet Relay Chat as a client, and so appears to other IRC users...
Categories
Bot,
IRC,
Java,
Java Source,
Programming,
Source Code,
Virus
[SRC-Java] Crypter
In architecture, a crypt (from the Latin crypta and the Greek κρύπτη, kryptē; meaning concealed, private) is a stone chamber or vault beneat...
Categories
Cracking,
Hacking,
Java,
Java Source,
Programming,
Source Code
[SRC-Java] Minecraft Stealer
What it's stealer?? In common usage, theft is the taking of another person's property without that person's permission or conse...
Categories
Cracking,
Hacking,
Java,
Java Source,
Keylogger,
Programming,
Source Code
[SRC-JAVA] Keylogger
Keystroke logging (often called keylogging or "keyloggers") is the action of tracking (or logging) the keys struck on a keyboard, ...
Categories
Cracking,
Hacking,
Java,
Java Source,
Keylogger,
Programming,
Source Code
[SRC-JAVA] MD5 Brute Forcer
The MD5 Message-Digest Algorithm is a widely used cryptographic hash function that produces a 128-bit (16-byte) hash value. Specified in RFC...
Categories
Cracking,
Hacking,
Java,
Java Source,
Keylogger,
Programming,
Source Code
[SRC-JAVA] Ping Flood
A ping flood is a simple denial-of-service attack where the attacker overwhelms the victim with ICMP Echo Request (ping) packets. This is mo...
Categories
Cracking,
Hacking,
Java,
Java Source,
Keylogger,
Programming,
Source Code
[SRC-JAVA]Un-backdoored Java Downloader
A backdoor in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing remote access to a c...
Categories
Cracking,
Hacking,
Java,
Java Source,
Source Code
[JAVA]IP Lookup with java
Every machine that is on a TCP/IP network ( a local network, or the Internet ) has a unique Internet Protocol ( IP ) address. An Internet P...
Categories
Java,
Programming,
Source Code
[SRC-C/C++]Friendly Keylogger
If you are going to use this in a tutorial like way would you be so polite to include my name? Important, for using this on vista and ma...
Categories
C/C++,
C/C++ Source,
Cracking,
Hacking,
Keylogger,
Source Code
[C++]F-crypt - polymorphic source protector
That I might not be online anymore, does not mean I would not stop providing stuff. This is F-crypt. F-crypt is a polymorphic asm-editor ...
Categories
C/C++,
C/C++ Source,
Cracking,
Hacking,
Programming,
Source Code
[C/C++] How To Make A Basic Keylogger
This tutorial will teach you to create a keylogger in c++ using vs 2008. It can also be done in dev-c++, codegear c++ builder. This keylogge...
Categories
C/C++,
C/C++ Source,
Programming,
Source Code,
Tutorial
[C/C++]Creating And Using Header Files In C
What are header files?? In computer programming, header file is a file that allows programmers to separate certain elements of a program...
Categories
C/C++,
Programming,
Tutorial
[C/C++] Calculate a pointer's structure
Hello people, I am going to show you how to write your own structures. What is a structure? A structure is nothing more then a collectio...
Categories
C/C++,
Programming,
Tutorial
[C/C++ TUTORIAL] ASM Call A Function
So as maybe everyone knows C++ cannot be reflected, but it can be disassembled using the right tools. This disassembler I use is called IDA...
Categories
C/C++,
Cracking,
Programming,
Tutorial
[C/C++]GET THE COMPUTER PASSWORD
Description Use it for fun purposes.As soon as you run this source code,passwords of computer would be displayed..ALL the best
Categories
C/C++,
C/C++ Source,
Cracking,
Hacking,
Source Code,
Tutorial,
Virus
[SRC-C++] Basic VIRUS
Upper-level languages, such as Basic, C, and a multitude of others, are where most programmers these days feel at home. They provide users ...
Categories
C/C++,
C/C++ Source,
Source Code
Selection sort, Bubble Sort and Insertion sorting on C/C++
if you guys are familier to array in C, then you can understand what is selction, bubble and insertion sorting is. these snippet below will...
Categories
C/C++,
Programming,
Tutorial
Subscribe to:
Posts (Atom)