Image worm is a very popular trick to replace images on a remote computer.Image worm is a software which create a worm(Server.exe) using a image specified by the user/programmer.When the "Server.exe"…
Best Password Crackers

Password Crackers: The name is pretty self explanatory in this case. These tools help you recover passwords from the data that a computer system is storing or transmitting over a network. Ophcrack Me…
IP Logger SCRIPT [PHP]
How to get anyone's IP address? It's easy guys... STEPS: 1.Create an account on 000webhost.com then log in 2.Click on Goto CPanel 3.Scroll down and Click on File Manager(if asks password then close …
Ultimate Virus Builder [50+ OPTIONS]
Guys this is an ULTIMATE VIRUS BUILDER which have 50+ options to do with! Some of the options are in the picture below : DOWNLOAD …
BLAB Live Chat Script [PHP]
![BLAB Live Chat Script [PHP]](http://3.bp.blogspot.com/-JGL4WfKLu8Y/UxGuWQn1waI/AAAAAAAAAJE/B2dIK_KjT_k/s180-c/blite1b.png)
BlaB! is a web based chat written in PHP, using AJAX as a transport system and MySQL, SQLite or PostgreSQL as a database storage. The project started back in 2002 as a self-refreshing page called Sim…
How to Make a TROJAN HORSE
Most of you may be curious to know about how to make a Trojan or Virus on your own. Here is an answer for your curiosity. In this post I’ll show you how to make a simple Trojan on your own using C pr…
How to INCREASE your RAM using USB/Pen Drive (WINDOWS XP and 7 too)

Guys in this tutorial i am going to tell you how to INCREASE your RAM using a USB/Pen Drive in WINDOWS XP and 7 too Requirements: 1.A USB (less than 4GB) 2.Windows XP based laptop/computer(not window…
How to INCREASE your RAM using USB/Pend Drive
Guys, if have low RAM and you'r computer/laptop is slow!You can INCREASE your RAM using a USB/Pen Drive Requirements: 1.A USB/Pen Drive (minimum 2 GB free) 2.A WINDOWS(7) based computer/laptop. 3.2,3…
What is SQL INJECTION and How to do it!

SQL Injection attacks are code injections that exploit the database layer of the application. This is most commonly the MySQL database, but there are techniques to carry out this attack in other data…
Phishing Tutorial Step by Step

What is Phishing ? In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details…
Use pc internet in android
Use Yous PC's Internet on your Android via USB [Complete Tutorial] Requirements : 1. Root your phone firstly for rooting process you can read our previous articals about rooting your android phone. 2…
Create single name facebook id
Today, in this post i'm talking about how to make single name account on facebook. Today, Facebook is a biggest social media site with millions of daily users. As per rule, it is not possible to make…