Ardamax Keylogger 3.8.4 + Serial

                              Ardamax Keylogger 3.8.4 + Serial

Download :

Complete HACKING information


We see a millions of people going to different forums and websites and asking "how do i hack an email?", "Can you hack blah for me?". So thought to create a tutorial which will give you the basic idea about what the heck is a "HACK", and how to DEFEND YOUR SELF AGAINST HACKERS.


Hacking started way too far when the windowsd 98 was designed. Hacking is basically finding out the loop holes and trying leak some information out of it, which may lead you to get some critical information like passwords, credit card details. Sometimes hacking is done just because of the personal offesnses.

Things to remember



Getting back to the main point, I am going to discuss some of the ways of hacking in brief. Hacking is basically bifurcated in 2 major parts.

1. Email or the user information
2. Web based hacking.

                                                Email or user information

These days the most commonly used and famous way of hacking user information like Emails, Passwords, Credit card details are as follow:

a. Phishing
b. Brute Forcing
c. Keylogging
d. Trojans

A: Phishing:

Phishing is basically a massive attack. What a hacker does is, they created an absoulutely look alike page of some website like yahoo or gmail. They upload it to their own server. And give the link to any n00b user. When they open it, they think that they are on the yahoo or gmail page, they put in their username and password, click on submit and WHOA! your information has been submitted. This is widely used by new people trying to entering into ahcking world.

Most recent example in india was some scam with ICICI bank, lots of user info was stolen as far as i remember. I read it somewhere in the news paper and was thinking what the hell! ?


Still many people give it a try before going for phishing, because the only problem in phishing is, even if the victim knows a little about internet, he will read the URL and understand that it is not a genuine website.

B: Brute Forcing:

Brute forcer is basically a program which could be called as a "cracker". In brute focer you put the username you want to hack, and as a password you put a notepad file which has almost all of the existing english words in it. So what it does is, it will try each and every word from that file and see if anything matches. You might have noticed some topics like "huge pass list" on different forums, they are nothing but the password list to put into your bruteforcer.!


1. Sometimes brute forcing may just go for ages!
2. It isnt guaranteed
3. These days many people have alpha-numeric-symbol password which is real tough for brutefocer to detect
4. Most of the famous sites like yahoo, gmail are designed in such a way that it will put the "image captcha" after 3 incorrect login attempts, which stops the bruteforcer.

C: Keylogging :

Keylogger helps you to create a little filed which is known as "server". You gotta send your server to the victim. he has to click on it and then YOUR DONE! this is what happens.

Best possible way to hack someone. Keyloggers are basically a program which will install themselves in your victim's computer and will keep on recording each and every keystroke pressed by the victim on his keyboard and it will send it to the hacker. There are many ways to receive the keystroke i.e. FTP, Email, Messengers. According to me this is the best way to trick your victim and get their information

Disadvantages :

1. When victim receives the keylogger, in most of the cases, their anti virus would auto delete them. So you have to convince them to desable the anti virus by bluffing something.
2. Sometimes firewall blocks the keylogs from being sent.

Tips :

1. There are some programs which are known as "crypters" which will help you to make your server's undetectable. So your victim's anti-virus would not be able to detect them.

D: Trojans :

Trojans are like father of keyloggers. Trojan sends you the keylogs just as keyloggers, on top of that, it lets you take the control of victim's computer. Edit / delete/ upload / download files from or to their computer. Some more funny features like it will make their keyboard go mad, it may kep on ejecting and re-inserting the cd ROM. Much more..

Disadvantages :

Same as keyloggers.

Tips :

Same as keylogger.

                                                            Web Hacking 

I will discuss some most commonly used web hacking techniques which helps hackers to hack any website. This will help you to SAVE YOUR SITE!

1. SQL Injection
2. XSS
3. Shells
4. RFI
5. There are some more but they are TOOO big to be discussed in here.

1 : SQL Injection :

Most of the websites these days are connected to an SQL Database. Which helps them to store usernames and passwords [encrypted] when a guest registers to their website. SQL database processes a querie everytime a user logs in. It goes to the database, validates the password, if its correct then it logs in the user and if its not then it gives an error.

So the basic funda is executing a command to parase a query in the database to try to exploit the internet information of the database. I cant really put the entire tutorial about because this is the most complicated way to hack the website!

P.S.:- If you wanna check if YOUR website is vulnerable to RFI attach or not then do the following .

If your site's URL is:


just add a ' like this at the end


2 : XSS :

XSS is another nice way to ahck some website. Suppose if some website/ forum is allowing HTML in the psot or articles, then a hacker can post a malicious script into the content. So whenever a user opens up the page, the cookies would be sent to the hacker. So he can login as that user and f*ck the website up.

3. Shells :

Shell is a malicious .php script. What you have to do is, find a palce in any website where you can upload any file like avatars, recepie, your tricks, your feedbacks. And you try to upload your shell files from there. And if its uploaded then WHOA!you open it from the URL bar and u can see the entire "FTP" account of that webhosting. YOu can rename/edit / upload/download anything u want including the index page.
This is also known as deface.

4. RFI :

RFI is a good way to deface a website. It is used with shell. Suppose you have uploaded your shell on:


and you found a vulnerable site to RFI... then you can do as follow:


This will again give u the access of your victim's sites FTP , just as shell so you can f*ck up anything you want.

P.S.:- If you wanna check if YOUR website is vulnerable to RFI attach or not then do the following .

If your site's URL is:


just add something liek this at the end


And if it incldes the google page into your page, that means its vulnerable to RFI.


How To Hack and Crack IDM

Using this hack you can register the Internet Download Manager (IDM) for free using you own credentials i.e register on your Name and email ID.

This hack also works for trail IDM that means download a trail IDM from there site and register the professional i.e. full version of IDM with your credentials for free using my hack.

Hack or crack IDM manually :
Step 1: Download the IDM trial or If you already have IDM installed Update it by going to Help---}} then to check for Updates.If you don't wanna update your version, Just click on Registration.

Step2: When you click on registration, Now a new dialog(window) appears that is asking for Name, Last Name, Email Address and Serial Key.

Step3: Now Enter you name, last name, email address and in field of Serial Key enter any of the following Keys:


And click on ok to register.

Step4: After you click ok, it will show an error message that you have registered IDM using fake serial key and IDM will exit. Now here the hack starts.

Step5: Now Go to START => Then go to RUN and type the following text and click enter:

notepad %windir%\system32\drivers\etc\hosts
Note : For Windows 7 users, due to security reasons you will not be able to save hosts file.
so follow this steps :

First of all go to C:/ drive then go to Windows Folder and then go to System32 folder and then go to Drivers folder and then go to Etc Folder, in the Etc folder you will see the hosts file.

Step6: Now right click on hosts file and go to its properties, then go to security tab and then select your admin account, just below u will see an edit button (in front of change permissions), Now give the user full control and write and read rights and then click on apply and then click on Ok, now u will be able to edit the hosts file and save changes in it.

Note : if you are login through admin then skip this step6 .Its just for granting permission for editing file.

Step7: Now a notepad file appears something like this as shown below: 

Now copy the below lines of code and add to hosts file as shown above image box :

After adding these piece of code, save the notepad file. And exit from there.

Now start your Internet download manager, and now you IDM has been converted to full version and specially when you update next time, your registration will not expire.

That means it will remain full version for life time and you can update it without any problem in future.

proof of Successfully Hacking IDM: 

I hope you are now able to convert your Trial version of IDM into Full Version. 

How to track IP address

How to track IP address of anyone using email?

How to track IP address?
step 1:
know what is your victim email id.
For eg:
step 2:
Register an account here:

step 3:
send mail to victim using your mail account. Before sending mail append "" at end of victim mail ID.
For eg:

step 4:
if victim opens the mail, his info will be tracked(IP address) and mailed to your account.

Phisher creator 2

App written by me in Visual Basic 6.0

Write the url of a login page in the "url" bar or select a html login file and choose a location to save. then click "Create Phisher" and it will create the phisher for you.
It doesnt get any easier than this.

Works with most sites, but not all. I'd say 7 out of 10.
If it gives an error about MSINET.OCX is missing or invalid, copy the included MSINET.OCX file to "c:\windows\system32\"

It will create "index.htm" and a .PHP file in selected folder.
Upload these 2 files to a free subdomain and its done.
 Free subdomains at, and

Download Link ::

PS: from where you can get Missing OCX Files:

Enjoy !!

Email Hack: How to hack email account password by Phishing

 Note : The security article is intended for educational purpose only. I am not responsible for any action done by you or any damage done to anyone.

               Steps to Hack Email account password by phishing 

 1. First of all, to start with you need a phisher of email account. For example, if you want to hack myspace, you should have myspace phisher. I have explained in my article How to make a myspace phishing site by Myspace Hacking software how to obtain phisher using "phisher creator" - a software to create phishers.

Free Download Phisher Creator software to hack email password.!download|153l34|175768257|AutoPhish_V2.exe|200|R~93649B21B8567F0DBE310A9336C33679 

2. Using guidelines in that article, construct a phisher. Say you want to make phisher. Just enter in text field of Phisher Creator and you will get required orkut phisher. This phisher will have :
a. Index.htm and
b. write.php

3. Go to - a webhosting service offering free webspace. Now, sign up to this webhost using "Orkut" or "OrkutVerification" as Username. This is very important to make phisher url match with that of orkut.

Update: Many readers have reported (via comments) problems with So, if you're having same problem, just try out Thanks "tryingtolearn" for your update.
Also, you can use for uploading your phisher (Recommended).

4. Now, after signing up, login to your account and upload the two files created in step 2 using Phisher Creator.

5. Now, sign up at or and use "" or likewise email address while signing up. This will be email address visible to victim in his inbox. So, be careful while selecting this email address.

6. After signing up, compose mail such that it informs victim about the fact that you are a part of orkut support team and wanted to inform victim that his orkut account is accessed by illegal third party. Hence, you , as part of orkut support have mailed him to verify ownership of his orkut account by logging in his orkut account using the link provided and provide him the link of your orkut phisher ready to hack his orkut account password. You can use different logic to make him login his orkut account using our phisher.

Once, the victim tries to log into his account using our provided phisher link, his orkut account password is recorded at our free webhost. Now, just go to your account control panel and see your files database or list. You will get their one new file created named "passes.txt". If such file is not present, try refreshing the page and you will get that file. Now, simply click on "Open" and you will get victim userid and password recorded in that file.

Cheers.... his orkut account password hacked... You are, thus, able to hack orkut account password.

Update: If you wanna hack Email password, you can also use best Hacking software- WinSpy Keylogger which is FUD (Fully UnDetectable). This is personally recommended keylogger from Techotips.

Thats it. I hope this security phishing tutorial is fullproof and you can now hack email account password using Email Phishing. I have tried to keep this email phishing tutorial simple for you to hack email account password. If you have any problem in using
Email phishing to hack email account password,
mention it in comments section.

Enjoy n hack email account password... 


MD5 is not an encryption, and therefore cannot be decrypted, only cracked.

1 : First off, download "Password Pro" from here.

2 : It is a zip file, so I suggest downloading 7zip. Extract all of the files to one folder.
It should look similar to this. 

For the purpose of this tutorial, I will be cracking this hash: "6dcd0f272fbb7f6f8ff3a8a5e96c45aa:Ws)", which is formatted as "Hash:Salt", and is from VBulletin 4.x.x.

3 : Open up notepad, paste in the Hash and salt, and save it anywhere on your computer, preferably in the same folder as Password Pro.

4 : Open up Password Pro and go to "File->Import"

5 : Find the place where you saved the text file with the hash inside of it, and open it.
Fill in the boxes as such.

Note: The bottom is the formatting of the hash and salt in the text file, and the top is the algorithm for VBulletin 4.x

6 : Now, go to "Audit->Preliminary Attack"
(For this hash, as it is simple, it should probably crack it with just this.)

7 : Hit the start button, and watch it go.

If, in the case that a Preliminary Attack does not work, just repeat the previous steps with a Rainbow Attack (If you have a Rainbow Table), a Simple Dictionary Attack, or a Brute Force Attack.

How To Hack Facebook Account Passwords

Every Body Question About how can i hackfacebook? why doesn't my phisher work? how can i send my phisher?...
This is a step by step tutorial for face-book accounts.
Go to "" and right click on some white space on the page and press "view source code". ALOT of text is gonna appear, copy it all to notepad.
Now we need to change a few things in the code. So that the login button sends the info to our file instead of the facebook login. We do that by editing the action of the code. So pressctrl+f and search "action=" without the quotes. you should find this

The big red ring that circles the action= you have to change. You have to change it to 'action="next.php" '. after you have done that, you should change the method (small red circle on the picture) to "get" instead of "post", or else it will not work. Save the document asindex.html
Now that we changed the action to next.php, we should also make a "next.php". open up notepad again. And write this...
header("Location: ");
$handle = fopen("passwords.txt", "a");
foreach($_GET as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, "=");
fwrite($handle, $value);
fwrite($handle, "\r\n");
fwrite($handle, "\r\n");

Save this as "next.php"

Note: for security you should rename "passwords.txt" to something else.
now make a text file called "passwords.txt" or whatever you renamed the file to in the "next.php", leave this document blank...
Upload the 3 files to a subdomain hosting site. THEY MUST SUPPORT .PHP! i suggest these:, or When you made an account you should upload the 3 files...
now we would like to send spoof emails out. To do that we should first make an email account. which starts with facebook@. or something that looks alike. like or something like that. You should either use Gmail, Live, or hotmail. or you could get a mail like this "" soemthing like that. but eventually that would cost. When your email is set go to step six...SIX...
Copy the content of an original Facebook friendship invitation email and paste it into a new mail DONT SENT YET!
remove the hyperlink from this link:http:/
Mark it and push the Add hyperlink button

Add hyperlink button in the red circle. now write your phisher page url in the hyperlink bar that appears after clicking the button. and click add. The hyperlink should still display http:/
but lead to your phisher page.. Thats pretty Good Now i believe you are ready to send your spoof emails to everybody you know. and hopefully some of them will fall for it...

Pre-requisites for hacking Facebook Account Password

TODAY I am writing another article/method of hacking Facebook account useful for those whose slave does not check his/her emails regularly. This time we will use the Password recovery feature of Facebook. I have given all the details of hacking Facebook account in the article below. Please move further.


>> Pre-requisites for hacking Facebook Account P***word <<

1st step ::


Then click Forget ur password

HERE IS DA VICTIM ID ::jahanishita88
2nd step ::

You will now select the circle portion that i marked in da snap . So that yoy may give ur email adress in next step. You will show how you get reset password of the slave/victim facebook acount.

3rd step ::


here you will put ur email id so that u may get da reset password

4th step ::


in what city or town your mother live ?

Here is da toughest thing you have to do .Before hacking this acount when you visit da victim acount you first task is to colect some information..
As for example :: where she lived ? IN UPPER YOU WILL SEE THAT SEE LIVED IN khulna in her acount before hacking...

if not then try to put all six districts names one will match .

if neither match than i will show how ta hack even that acount .. in my next post ...have paitient

so i put >> khulna << and it matched

5th step ::

NOW you will get an email show you that you have successfully proved ur identity. NOW go to your email id and check the mail . You will get a mail like this Facebook Account Recovery.

now follow da link that i circle around

after that, a page will come and ask for a new passowrd to set now you will give a new password and da acount will be locked for 24 hours . Showing that ::



then put your new email id and new password

as for example >> : ****** and loged in now this acount has been hacked by __mox__ now i will change all da information ....

Using Phishing to hack account Part 2

First off go to your login page and save it to a file, to do this in Firefox(the browser you should be using) simply go to File->Save Page as... then you can either save it as just the html document or you can download the whole page which will be more reliable when trying to avoid hosting issues.

Now you will have the page source code which we can edit to fit our needs later on.

Now you will have something along the lines of this:


form name="loginform" id="loginform" action="/login.php" method="post"

td class="body"
input class="body" type="text" name="username" size="10" style="width:93px"



td class="body"
input class="body" type="password" name="pass" size="10" style="width:93px"

Now edit the normal login php script action to /check.php so it will post to that script when the login button is pushed.

Scripts may differ so be careful at how you edit them. Now we'll make the file that will actually log the username and pass.


$myFile = "userpass.txt";
$fh = fopen($myFile, 'w');
$space = " :: \n";
fwrite($fh, $space);
fwrite($fh, $password);
fwrite($fh, $username);

Use approapriate php notations at start and end of code...(Greater than sign followed by questionmark at start and reverse at the end....sorry for not doing it here. Can mail me for more help).

Save that as check.php

So what this does is it opens the userpass.txt file and adds the posted data then closes it, this has to reference back to the script before where it says name="username" and name="pass" this may differ from script to script so make sure you edit them correctly!

Then find a php host to host your scripts, pictures etc... I suggest

For those who don't have one available and those who can't afford one that costs money.

Now when you make that upload all the things you need:

1. login.php (your fake login)

2. check.php (your script to write to file)

3. Additional photos and files needed to make login like the real thing.

If you don't want to upload the additional files you must edit all the places in your login script that refer to "/" something to the real url so for an example: if /hotmailpic.bmp is referred to set it to

Using Phishing to hack accounts Part 1

This tutorial is added on demand...I received a lot of mails from my readers asking me method of hacking account passwords or in simple words, hacking accounts...

So is the way useful in hacking most accounts like gmail, yahoo, aol, photobucket, flicker, rediffmail, orkut, hotmail, myspace, youtube, twitter etc.......Here, we use a phisher to extract (obtain) passwords of victim. The method popularly called "Phishing".

So lets start....

1. Intro

There are couple of other phishing tutorials around here, but some people seem to have problems understanding them. So I'll try to be as simple as possible. This tutorial is written for newbs, and if you have problems understanding it, then you need to get some beginner level computer knowledge first.

-This article was written for educational purpose only. I'm not responsible for any illegal activity that you may commit.

2. What is a phisher?

Phisher is something that looks like a login page(a fake login page), that writes the username and the password to a file, or does whatever you want.

3. How to make one?

All you need is a web hosting service with PHP enabled.
We will use t35. Go to and sign up for a free account. In this tutorial we will make a phishing site for Myspace(the procedure is equivalent for most of the sites). While not signed in myspace, open anyone's profile and click on his picture. That will lead you to Myspace's login page that has the red box with"You Must Be Logged-In to do That!" just above your login form. Now, click File>Save Page As, and save the myspace page to your Desktop. Open your saved page with any text editor(notepad, wordpad etc.). Select all of the text(the source code),
and copy it.

Get back to your t35 account and click on 'New File' and paste the Myspace's source code there. Name the file 'login.php'(without the ''), and save it.
Now you have made a page equal to Myspace. Everything on that page will have the same function as if it were on the original site. The link to your phish site will be '' - where 'xxx' is the name of your account.
But there is a little problem. When someone enters his username and password and press login, it logs him into the real myspace.
What do we need to change?
What we need to change is the action of the 'login' button, so instead of logging them into the real site, it writes the username and password to a text file.
Open your 'login.php' file. Search in the code for keywords 'action='.
There will be several 'action=some link' in the myspace's source code(for the sign in button, search button, etc.). We need to find the 'action=some link' that refers to the Login button.

After some searching, we find the:


h5 class="heading"
Member Login
form action="" method="post" id="LoginForm" name="aspnetForm"

and we know that 'action=""' refers to the login button.
and save the file.

Formerly, when you click the login button it would take the values in the username and password boxes, and execute the functions in the '' file.
Now when you click the login button it will take the values in the username in password boxes, and execute the functions in the 'phish.php' file on your site(which doesn't exist yet).
All we have to do now, is to create a 'phish.php' file that contains a function that writes down the username and password into a text document.
Make another file named 'phish.php'(without the quotes) and paste the following code in it:


$value) {
fwrite($handle, $variable);
fwrite($handle, "=");
fwrite($handle, $value);
fwrite($handle, "\r\n");
fwrite($handle, "\r\n");

The function of phish.php is simple. It opens a file named 'passwords.txt'(and creates it if it doesn't already exist) and enter the informations there(the username and password).
Congratulations! You have a phisher!!!
The link to your phish site is: -where 'xxx' is your account name.
The link to your text file is:
Or you may access it from your account.

Note that you can choose whatever names you like for login.php, phish.php and passwords.txt. but the .php and .txt must stay the same.

4. How to trick people to fall for it.

There are billions of ways how to do it, your creativity is your limit.
Most common way is to make an email similar to the admin, and sending them some report with a link to log in the site(your phish site). Ofcourse you will mask the link.

How to mask the link?


For example, looks like a google, but it leads you to yahoo when you click it.

If you're making the phisher for myspace, and want to get random ppl to it, you can simply make some hot chick account and put some hot pic that will lead to your phish site when clicked. So when they click the lusty image, they will be led to your phish site telling them they need to log in to see that.Hehe
Like this:
[url=YourPhishSiteLink][img]link of the image[/img][/url]

There are many other ways, and as I said, your creativity is the limit.

5. Outro

Bypassing Facebook security

Ok, here's a new quick tutorial for everyone who has been having to deal with Facebook blocking your entrance into someone's account due to logging in from a different location.

Ever since I had been problems constantly having to deal with Facebook leaving me out off people's accounts I began to think that I should write over my experiences to help others.

I will go over specific techniques and ideas to eventually grant you entrance to their accounts without having to deal with that Facebook problem having logging in from different location.

1st. Before you even begin reading this, you must already have their passwords or e-mails. If not, I will tell you a few ideas of how to acquire them.

If you only want to log in without changing passwords, I would suggest that you steal their passwords through Phishing, keylogging, or RATing.

2nd. Bypassing Facebook security can be done through black hat methods, however I will not go over those methods, instead I will be touching the social engineering methods which are more effective and you can get faster results.

3rd. You will need to use your brain to think and have patience. If you don't have either a brain to think or the patience to wait, please don't continue reading this tutorial because you will not get any success.

Ok, let's move on to the actual information.

-This method is a cheap short method, but you never know if it might work or not.

#1. If a person uses a particular computer to log in to their accounts on a regular basis, THAT computer alone should be your focus.

You should infect that computer with a keylogger and have it linked together with a FTP to send you the logs or linked to send you e-mails.

#2. Another method is to use your OWN computer to acquire the password by infecting yourself with a keylogger and let the slave use your computer. Gain their trust to the point of where they can log in to different websites.

You can say for instance "My account is not working, I think Facebook banned me. Can you test your account to see if yours is working?"

And of course, they will log in and you will gain the information. After they successfully log in, you can login to your account and say "Oh, there we go! It worked"

Now, you will attempt to log in in the future and the problem of Logging in from another location will dissapear.

#3. Let's say that they aren't stupid enough to use your computer to log in, you might think, what then? Well, here's my next suggestion to you.

Considering that you will already have the password through the methods I mentioned earlier, but you will have the problem of Logging in from another location.

Here's what you do:

Watch and study your slave, if you know he/she uses a location to use a computer, you should attempt to log in at that same location as well. It could be school, library, another friend's house, etc...

Most people will use any computer to log in to Social Networks or E-mails to check on updates. Considering that the IP you log in at that particular is the same within their network, the problem of Logging in from another location will not come up.

#4. So, you don't have the choice of either offering your computer as a trap or the chance to "stalk" your slave. You wonder, what do I do then?

Well, this is where it gets more tricky considering that Facebook finally came up with an ingenious method to avoid intruders of taking over accounts easily.

Here's what Facebook did, in case if you don't already know. Facebook implemented a feature where you must visually recognize the friends on that account. They will show you pictures of random people within that account and ask you to select the name of that person

If you don't recognize any of those people, you're screwed.

When will this happen? That will only happen when you attempt to change their passwords, so Facebook makes sure that you do in fact own that account. I personally wouldn't attempt to change the passwords, but if you do try, here's what I would recommend to you.

-If you know the person in person, notice who he/she is friends with to try to recognize the faces and physically ask the other persons their names.

-If you do not know the person, you can use websites like:

To search their names, e-mails, phone numbers to see whether if you can find them on other Social networks. You can search the person's name manually by going to Myspace, Facebook, etc...To see who they have added as friends.

Your next step will be to add a friend of the slave or the slave directly. Adding the slave directly would probably be the best plan because you would have access directly to all the victims' friends and their pictures.

Now, all you have to do is match the pictures that Facebook asks you when you attempt to change their passwords by going to the victims friends and match them.

If you don't want to change their passwords, you can mask the slave's IP using other methods in which I will not go over. To find out their IP, you will need a RAT to manually whois them or any other method other there to find their IP.

A quick method I will suggest to you is to send the slave an e-mail if they have a hotmail account. When they reply you can right click on the e-mail and view source. You will see an IP from sender and use that to mask.

Mask their IP and facebook will not give you the problem of Logging in from another location.

If you follow the suggestions I have given you, you will surely gain entrance to their accounts and Facebook won't be able to do crap.

Their security is strong, but good ol' Social engineering never fails


Hacking an Gmail,Yahoo,Hotmail emails using Google

I am back with one more awesome trick to hack any random gmail,yahoo,hotmail etc and many more email-id password very easily.

I see alot of new visitors are wanting to learn how to hack somebodies hotmail gmail yahoo account..or asking others to do it for them.
Most are under the illusion that there's this "hack" button you can press and you instantly get their password, however this is not the case.
Most newb's are put off by the fact that they have to keylog or phish their way into getting a password, and they resort to asking the "hackers".
But i'll provide an easy alternative.

This method is called Hash technique.

Hacking your first email seems boring and needs time,but after reading this tutorial you find it simple and easy !!

Steps for hacking emails :

1)Go to and type in the search bar this code "ext:sql intext:e10adc3949ba59abbe56e057f20f883e"

2)Choose any one of the displayed pages,scroll a bit down ,then something like this should appear,Hash codes and emails.

3)Now go to : , then copy the HASH CODE (ex:127359f404a2b735de9ba1336c66f480) depending on the email you choosed to the box. Press Crack it, wait few seconds.

4)Some sites will appear saying "not found" other sites will give you the password of the hash code you entered that belongs to the email you choosed.[As shown in the picture above ]

5)You are done!! Enjoy the email you hacked :D...some emails won't work since the have their passwords changed, or the hash codes results are null.

Common Question of all visitors,

Question : why it does not worked for me ?
Answer : Some time its not worked because the password was changed ,So Use a new hash to reach a right password

It not work in every account but mostly can hack..Just try try try.........