Email Login| Link Exchange | Cyber News | Phishing Attack | SQL Injection | SEO | DOS Attack | Hacking Tools | |Hacking Tricks | Penetration Testing | Trojans & Keyloggers |Hacking Videos | General Discussion | Website Hacking | Session Hijacking | Social Engineering | Anonymous Surfing | Recover Passwords | Bypass Firewall | Hacking Books | Network Sniffers | Password Cracking | Enumerating & Fingerprinting | Movies & Songs

Share This Post With Your Friends

Monday, March 8, 2010

How to hack email, yahoo, orkut, myspace and gmail account passwords. Download free email password hacking software. List of Underground hacking sites

Free Penetration Testing

Centuno is now offering a Free Penetration Testing. Simulate an actual hacking attack with Free Penetration Testing.

Readers, the below is basically not related to security. I have received huge number or emails from readers of this blog regarding all such script kiddie tools and softwares. Every thing already available on net free of cost so I have not seen any harm in sharing of all these links. USE IT AT YOUR OWN RISK.

I have found below cited blogs/sites/forums related to hacking and cracking, which I would like to share. These blogs contains all stuff like how to hack email account password, How to create a Phishing page and how to hack gmail, orkut, myspace, facebook, twitter and many other websites account passwords. I have also mentioned few of links from freehacking.net itself.

You can also get the free password hacking softwares to download. Be careful before downloading. I am mentioning those website links here does not mean I have tested all those tools. I am taking no responsibility of those Techniques tools and softwares. All the softwares detected as Trojan and virus by antivirus, so you have to use it on some system which is not having any antivirus. Also don't use you real email id password while doing testing. Create a fake account first and use it.

  • List of all underground hacking websites: Hacker Top Sites. To visit click here
  • Download free Anonymous mailer software, Send anonymous email. DOWNLOAD HERE
Password for rar file is: techotips.blogspot.com
To know how it works, visit here
Password for rar file is: techotips.blogspot.com
To know how it works, visit here

Password for rar file is: techotips.blogspot.com
To know how it works, visit here

  • How does an attacker installed any trojan on the victim's computer? How to bypass antivirus ? Answer: Using Wrappers. To know more click here
  • Which are various back doors, Trojans and Key loggers available and how they work? To Get a complete guide regarding all famous back doors...click here
  • How you can spread you Trojan, virus OR keylogger on network or internet ? To know which all are various modes of transmission..CLICK HERE
  • How many different types of trojans, backdoors and keyloggers are available on internet.. To know CLICK HERE
  • To know working of trojan OR how trojan works..CLICK HERE
  • How to Hack Facebook Account Passwords Using Phishing Attack..
  • How to Hack Twitterl Account Passwords Using Phishing Attack..
  • How to hack facebook using Facebook Freezer. To download the software
  • A very good source to download free Keyloggers, Trojans and password stealer's. CLICK HERE

Free Penetration Testing

Centuno is now offering a Free Penetration Testing. Simulate an actual hacking attack with Free Penetration Testing.

9 Visitor Reactions & Comments:

said...

Hi Amarjit Thanx for the awsome blog.....learnt alot from u....
Amarjit i hav a problem in project plz help me ....
Scenario:

You are employed for a small firm which currently employs four (4) people including yourself. Each of the four employees of the firm store sensitive files on a USB stick which is utilising Truecrypt to protect sensitive information. You have recently found one of these USB sticks on the floor in the office and you are certain that it belongs to one of the other three employees. Rather than ask the other employees if they have lost a USB stick you have decided that you will browse through its contents instead. However, knowing that each employee utilises Truecrypt, you will first need to acquire the password to decrypt the contents.

Employees use Truecrypt to create an encrypted container file on the USB stick. This file isencrypted using a number of strong symmetric algorithms including AES. When the sensitive information needs to be accessed, Truecrypt can ‘mount’ the encrypted file. This results in the encrypted file acting as a ‘virtual drive’. When mounted the encrypted file appears as a removable drive (e: f: etc). Alice supplies a password in order to mount the drive. When the drive is mounted, each employee can read and manipulate the sensitive files as if they were stored on any other removable drive. When the virtual drive is dismounted, it simply exists as an encrypted file on the USB stick.

Task:
Draw a set of attack trees which reflect your analysis of how you could successfully access the contents of the sensitive information on the USB stick. The attack trees can be annotated or you may have some discussion accompanying them (as you think necessary). You are only interested in breaching the confidentiality of the information and you do not wish to corrupt or delete/destroy the information.

can u find the answer for me ??

thanx in advance

Anonymous said...

Phele aisa post hai free hacking min joi samjh aaya hai yepeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee


Regards
So sweeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeet

said...

@ Ajay,

Will mail you soon.

@ Anon..

Thanks to god..now you become a little technical.

Anonymous said...

sahi haiiiiiii

said...

I like your blog and I think that it's really useful. I tried the gmail account hack thing, downloaded and everything, but my anti-virus (avast4) says that it contained a virus. I really need to hack my way into my google account, which was hacked by someone else. It's a new account with which I've only sent one email with and might have received a reply. The email is . the original password was kittenlove (so much for trying to be random)and the answer to the security question was ping. Now of course all of that has been changed and I can't access the account. Also the name that went with the email was kit morchov. As I said earlier there should only be one contact on the contact list. Anyhow I really would like some help since I really am not the most tech/hack savvy. Thanks so much in advance.

said...

Now I feel like an idiot, I missed the part where you said that the programs will be seen as a virus by the antivirus software. Did you buy any chance test out the gmail one? I'm still a little uncertain about trying it on my computer if there's the chance that it's a virus. Do you have any suggestions on how to tell if it's a virus?

Anonymous said...

Hi Amarjit,

Thnks for u r wonderfull support for people who wanna learn ethical hacking...u r just rocking the minds of new learners

said...

hello i am trianee hacker and completed my ETHICAL HACKING at LONDON the institute of EC COUNCIL, now i make my blog to vast fo my nation can u help me to make our nation secure to oppose cyber crime?

a know whole thing related hacking send me your reply at

Anonymous said...

Thanks for the excellent blog

I've uploaded all contents into one folder called gmail,I tested it out with my own google password but how do I store them

Newer Post Older Post Home