What is IMAGE WORM and How to use it What is IMAGE WORM and How to use it

Image worm is a very popular trick to replace images on a remote computer.Image worm is a software which create a worm(Server.exe) using a ...

Read more »

Best Password Crackers Best Password Crackers

Password Crackers:   The name is pretty self explanatory in this case. These tools help you recover passwords from the data that a compute...

Read more »

IP Logger SCRIPT [PHP] IP Logger SCRIPT [PHP]

How to get anyone's IP address? It's easy guys... STEPS: 1.Create an account on  000webhost.com   then  log in   2.Click on ...

Read more »

Ultimate Virus Builder [50+ OPTIONS] Ultimate Virus Builder [50+ OPTIONS]

Guys this is an ULTIMATE VIRUS BUILDER which have 50+ options to do with! Some of the options are in the picture below  : ...

Read more »

BLAB Live Chat Script [PHP] BLAB Live Chat Script [PHP]

BlaB! is a web based chat written in   PHP , using   AJAX   as a transport system and   MySQL ,   SQLite  or  PostgreSQL  as a database...

Read more »

How to Make a TROJAN HORSE How to Make a TROJAN HORSE

Most of you may be curious to know about  how to make a Trojan  or Virus on your own. Here is an answer for your curiosity. In thi...

Read more »

How to INCREASE your RAM using USB/Pen Drive (WINDOWS XP and 7 too) How to INCREASE your RAM using USB/Pen Drive (WINDOWS XP and 7 too)

Guys in this tutorial i am going to tell you how to INCREASE your RAM using a USB/Pen Drive in WINDOWS XP and 7 too Requirements: 1.A U...

Read more »

How to INCREASE  your RAM using USB/Pend Drive How to INCREASE your RAM using USB/Pend Drive

Guys, if have low RAM and you'r computer/laptop is slow!You can INCREASE your RAM using a USB/Pen Drive Requirements: 1.A USB/Pe...

Read more »

What is SQL INJECTION and How to do it! What is SQL INJECTION and How to do it!

SQL Injection attacks are code injections that exploit the database layer of the application. This is most commonly the MySQL database, bu...

Read more »

Phishing Tutorial Step by Step Phishing Tutorial Step by Step

What is Phishing ? In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensit...

Read more »

Use pc internet in android Use pc internet in android

Use Yous PC's Internet on your Android via USB [Complete Tutorial] Requirements : 1.  Root your phone firstly for rooting p...

Read more »

Create single name facebook id Create single name facebook id

Today, in this post i'm talking about how to make single name account on facebook. Today, Facebook is a biggest social media site with ...

Read more »
 
Top