shorte.st Home About Us Payout rates How it works Affiliation Forum More Privacy Policy Terms of use Contact us Social November 2015 | AMaN Computer Solution

21 Nov 2015

Angry Birds Seasons V5.3.2 Mod Apk [amansoftech]

Angry Birds Seasons V5.3.2 Mod Apk [amansoftech]
Join the Angry Birds as they celebrate unique seasonal events from around the world! Enjoy the addictive physics-based gameplay you love, but with an exciting twist. For the latest update, THEY CAME FROM OUTER SPACE – it’s Invasion of the Egg Snatchers! LATEST EPISODE: Invasion of the Egg Snatchers It’s all aliens, monsters, and mystery in 30 brand new levels of pig popping goodness peppered with plenty of campy B movie flair. Use the new Telebird to teleport through solid objects and pop those otherworldly piggies – wherever they may be hiding. Also, give the powerups a trial run in the power-up test range – just remember to wear eye protection. With over 2 billion downloads, Angry Birds is the most popular mobile game series of all time. Join the global phenomenon!
In addition to the Invasion of the Egg Snatchers, download and enjoy:
  • 23 THEMED EPISODES (plus cool bonus stuff)!
  • 700+ LEVELS of pig-popping action!
  • UNIQUE POWER-UPS that give you the edge in tricky levels!
  • PIG DAYS! Super special one-off levels that pay tribute to global events and holidays!
What’s New
  • Angry Birds Seasons celebrates its 5th birthday with the biggest update yet!
  • NEW EPISODE – Invasion of the Egg Snatchers! 30 new levels with a kooky B movie vibe.
  • NEW BIRD! Telebird teleports through solid objects to pop those hard-to-reach pigs.
  • NEW HATS! Dress your flock in zany costumes.
  • NEW PIG DAYS! Celebrate the most important days of the year.
 
              Angry Birds Seasons Mod APK
http://sh.st/n0A9U

Angry Birds Seasons Original Apk
http://sh.st/n0Swf

13 Nov 2015

Pocket File Manager v5.2.1.0 Cracked Windows Phone XAP[amansoftech]

Pocket File Manager v5.2.1.0 Cracked Windows Phone XAP[amansoftech]
Features
  • Full access to Phone and SD Card. Now you can store any files in those locations and retrieve them by connecting to PC.
  • Full featured FTP Server. Supports active and passive connections. Supports authentication.
  • Downloader with resume and scheduler. Automatically detects Youtube url and allows to download video file.
  • File browser.
  • Copy/Cut/Paste operations for files and folders
  • SkyDrive,Dropbox, Yandex.Disk, Box, Google Drive, Copy.com support
  • Send files by Bluetooth
  • Send file by Email
  • Share by HTTP with NFC support
  • Supports extracting from rar,zip,tar,gz,7z formats
  • Compressing files and folders into .zip file
  • Save music into media library and set music as ringtone
  • Open and view movie files (supported formats are depend on Windows phone supported formats)
  • Open file in phone. If supported applications are exist
  • Receive archive files from mail, browser and any application which can open it in phone.
  • Run under lock screen


    http://sh.st/b2pKi

Need for Speed™ Most Wanted v1.0.2 Cracked IPA [amansoftech]

Need for Speed™ Most Wanted v1.0.2 Cracked IPA [amansoftech]

Buckle up, hit the gas and hold on tight; you’re in for the ride of your life. Outrun cops, outsmart rivals – and outdrive your friends – in the most dangerous Need for Speed yet. Do you dare to be the Most Wanted?
Note: Due to its revved-up graphics and gameplay, you’ll need 1.8GB of free space on your device in order to install this game.
Features
  • MAKE TROUBLE, GET WANTED
Evade a relentless police force while you clash with street racers. Race and chase hot cars like the SRT Viper GTS, Porsche 911 Carrera S, Hummer H1 Alpha, and many more. Feel the intensity of no-brakes-allowed street racing with realistic full-car damage for the first time on mobile.
  • LEAVE YOUR MARK
Log into Origin to check the Wanted List and find out who is the Most Wanted across platforms and among your friends. Then, challenge your friends and prove your racing skills in nonstop competition.
  • GO FROM ZERO TO MOST WANTED…
Choose and customize over 40 unique cars .Race the way you want! By popular demand you can now touch or tilt to steer .Use Mods to enhance your car and get ahead of the pack in style .Experience the action with mind-blowing graphics and intense full-car damage
Earn Speed Points to unlock new cars

What’s New in Version 1.0.2

UPDATE NOW FOR MORE CARS AND NEW EVENTS! Think you can handle even more trouble? Boost your car collection and your wanted level with some brand new rides that will help you move up the Most Wanted list.


https://dailyuploads.net/17vcdzrikg8s

WinRAR 5.20 Final (x86/x64) Incl. Key [amansoftech]

WinRAR 5.20 Final (x86/x64) Incl. Key [amansoftech]

Description:
WinRAR is a powerful archive manager. RAR files can usually compress content by 8 percent to 15 percent more than ZIP files can. WinRAR is a powerful compression tool with many integrated additional functions to help you organize your compressed archives. It can backup your data and reduce size of email attachments, decompress RAR, ZIP and other files downloaded from Internet and create new archives in RAR and ZIP file format.

WinRAR puts you ahead of the crowd when it comes to compression. By consistently creating smaller archives, WinRAR is often faster than the competition. This will save you disc space, transmission costs AND valuable working time as well. WinRAR is ideal for multimedia files. WinRAR automatically recognizes and selects the best compression method. The special compression algorithm compresses multimedia files, executables and object libraries

Features:
- Using WinRAR puts you ahead of the crowd when it comes to compression by consistently making smaller archives than the competition, saving disk space and transmission costs.
- WinRAR provides complete support for RAR and ZIP archives and is able to unpack CAB, ARJ, LZH, TAR, GZ, ACE, UUE, BZ2, JAR, ISO, 7Z, Z archives.
- WinRAR offers a graphic interactive interface utilizing mouse and menus as well as the command line interface.
- WinRAR is easier to use than many other archivers with the inclusion of a special "Wizard" mode which allows instant access to the basic archiving functions through a simple question and answer procedure. This avoids confusion in the early stages of use.
- WinRAR offers you the benefit of industry strength archive encryption using AES (Advanced Encryption Standard) with a key of 128 bits.
- WinRAR supports files and archives up to 8,589 billion gigabytes in size. The number of archived files is, for all practical purposes, unlimited.
- WinRAR offers the ability to create selfextracting and multivolume archives.
Recovery record and recovery volumes allow to reconstruct even physically damaged archives.
- WinRAR features are constantly being developed to keep WinRAR ahead of the pack.


What's New :
Version 5.20

1. If Windows User Account Control prevents extracting or archiving
commands to create files in system protected folders, WinRAR attempts
to start its another copy with administrator privileges to complete
the operation. It is necessary to confirm privileges elevation
in response to User Account Control prompt to allow such second
WinRAR copy to run.

2. You can drag files in Explorer with right mouse button, drop them
to some folder and select WinRAR archiving commands in context menu
to create an archive with these files in the destination folder.

3. It is possible to use WinRAR.ini file instead of Registry to store
WinRAR settings. You may prefer such approach if you plan to install
WinRAR to removable media, such as USB flash drive, and then run it
on different computers.

See "WinRAR.ini file" topic in "Configuration settings" chapter
of WinRAR help for details.

4. Added extraction support for ZIP and ZIPX archives using
XZ compression algorithm.

5. If ZIP or ZIPX archive contains any compression algorithms except
usual "Store" or "Deflate", algorithm names are displayed
in "Version to extract" field of archive information dialog.
Algorithms with names unknown to WinRAR will be assigned "m"
name, where "num" is a compression algorithm numeric identifier.

6. "Open with WinRAR" command is available in Windows context menus
for archive formats supported by WinRAR. It can be turned off
with "Open with WinRAR (for usual archives)" option in WinRAR
"Settings/Integration/Context menu items..." dialog.

7. Command line RAR can read the default set of switches from rar.ini
file stored in RAR program folder. Previously it was possible to
define only the same set of switches for all RAR command with
"switches=" string. Now rar.ini also allows to specify
separate switch sets for individual RAR commands using
the following syntax:

switches_=

For example:

switches_a=-m5 -s
switches_x=-o+

8. Command "ch" supports switches -tl, -cu, -cl also for ZIP archives.
Previously "ch" allowed these switches only for RAR archive format.

9. For archive formats lacking file time information, such as .bz2,
.xz and .Z, WinRAR sets container archive modification time
to extracted files. It does not apply to tar.bz2, tar.xz and tar.Z,
which use file time stored in tar headers.

10. "Keep broken files" extraction option is supported for bzip2 archives.

11. WinRAR icon in Windows context menus is scaled up correctly
in high DPI screen modes such as 150% or 200% of normal text size.

12. It is possible to disable WinRAR "Benchmark" command with
"Benchmark" variable of HKEY_CURRENT_USER\Software\WinRAR\Policy
Registry key. In multi-user environment "Benchmark" command might
abuse shared computational resources. See "Registry variables" topic
in "Configuration settings" chapter of WinRAR help for more details.

13. Additionally to "sfxcmd" variable containing the entire command line,
SFX module sets "sfxpar" variable containing command line parameters
only, without leading SFX module name. These variables are set before
starting a program specified in "Setup" command.

14. File overwrite prompt in console RAR displays the size and modification
time for existing and new files.

15. When archiving from stdin with -si switch, RAR sets the current system
time to modification time of archived file. Previous version did not
set this time at all.

16. It is possible to use -si and -v switches together. Previous
versions did not allow to create volumes when archiving from stdin.

17. Warning is issued when starting unpacking 4 GB or larger file
from RAR or ZIP archive to FAT32 patition, so user may cancel
the operation. FAT32 does not support files of such size.

Also this warning is issued when starting to create RAR archive
with "Store" (-m0) method if estimated archive size is 4 GB or more.

18. "Select all" button in "Settings/Integration" dialog is renamed to
"Toggle all". Now it deselects archive formats if all they are
already selected.

19. "Delete archive" extraction option correctly removes all .zip and .7z
volumes. Previously it removed only the first volume in the set
for these archive formats.


Install Notes:
1] Install the program
2] After Installation, DO NOT Run it!
3] Copy "rarreg.key" from 'Key' folder to default install directory
4] Done, Enjoy ;)

http://sh.st/b1NCE

ZD Soft Screen Recorder 6.6 Final Incl. Keys[amansoftech]

ZD Soft Screen Recorder 6.6 Final Incl. Keys[amansoftech]
Description:
ZD Soft Screen Recorder is a handy and comprehensive application which captures what you see on screen and what you hear or say. It is usually used to create software demos, capture streaming videos and record game plays.

You can save your recordings and screen captures to various video and image formats, then you can add a watermark to the output files.

Features:
*Real-time video compression enables unlimited recording length.
*Arbitrary video resolutions and frame rates are supported.
*Smooth screen recording without lagging your system.
*Fully optimized for modern dual/quad-core CPUs.
*Both AVI and WMV output formats are supported.
*Perfect audio/video synchronization.
*Capable of pausing/resuming a recording by hitting a hotkey at any time.
*Capable of starting/stopping a recording automatically by a scheduled timer.
*Capable of capturing OpenGL, DirectDraw, Direct3D 8/9/10/11 rendered screen content.
*Capable of capturing multiple audio sources at the same time, e.g., both speaker and microphone.
*Capable of capturing what you hear even if no "Stereo Mix" is available.
*Capable of capturing screenshots by a hotkey.

System Requirements:
OS: Windows XP / Vista / Vista 64 bit / 7 / 7 64 bit / 8 / 8 64 bit
- Intel/AMD Dual-Core 1.5GHz or faster CPU
- 1GB or more RAM
- 10GB or more free disk space
- Windows Media Player 9 or higher version


What's New in Version 6.6:
(June 5th, 2014)
- Added support to capture 64-bit Windows programs.
- Fixed some bugs.

7 Nov 2015

Farm Heroes Saga v2.36.8 Mod APK[amansoftech]

Farm Heroes Saga v2.36.8 Mod APK[amansoftech]
From the makers of the hit game Candy Crush Saga, comes Farm Heroes Saga!
Switch and match the collectable cropsies in this fantastic adventure. Join forces with the Farm Heroes to stop Rancid the Raccoon from spoiling the precious farm lands. Switch and match three or more adorable cropsies to drive Rancid away for good! A farmtastic adventure filled with mixed fruit madness! Scrummy!
Play through hundreds of levels of strawberry switching, carrot crunching chaos to help our Farm Heroes save the day!
Features
  • Gather all kinds of cropsies to win the level before you run out of moves.
  • Easy and fun to play, but a challenge to fully master.
  • Acres of luscious levels to complete and marvelous magic beans to collect.
  • Take on your friends to compete for the best score and see who can switch their way to the fattest onions ever!
  • Rechargeable boosters, extra moves and special power-ups to help with those challenging levels.
Mod Info
  • Unlimited Lives
  • Infinite Boosters
How to Install
  1. Download the given APK
  2. Install normally
  3. Play
Happy Gaming!!!:-) 

http://sh.st/bZvmT

http://sh.st/bZvxw

Best Operating System For Penetration Testing / Hacking[amansoftech]

Best Operating System For Penetration Testing / Hacking[amansoftech]

Best Operating System For Penetration Testing / Hacking

1. Kali Linux
a
Kali is a complete re-build of BackTrack Linux, adhering completely to Debian development standards. All-new infrastructure has been put in place, all tools were reviewed and packaged, and we use Git for our VCS.
  • More than 300 penetration testing tools: After reviewing every tool that was included in BackTrack, we eliminated a great number of tools that either did not work or had other tools available that provided similar functionality.
  • Free and always will be: Kali Linux, like its predecessor, is completely free and always will be. You will never, ever have to pay for Kali Linux.
  • Open source Git tree: We are huge proponents of open source software and our development tree is available for all to see and all sources are available for those who wish to tweak and rebuild packages.
  • FHS compliant: Kali has been developed to adhere to the Filesystem Hierarchy Standard, allowing all Linux users to easily locate binaries, support files, libraries, etc.
  • Vast wireless device support: We have built Kali Linux to support as many wireless devices as we possibly can, allowing it to run properly on a wide variety of hardware and making it compatible with numerous USB and other wireless devices.
  • Custom kernel patched for injection: As penetration testers, the development team often needs to do wireless assessments so our kernel has the latest injection patches included.
  • Secure development environment: The Kali Linux team is made up of a small group of trusted individuals who can only commit packages and interact with the repositories while using multiple secure protocols.
  • GPG signed packages and repos: All Kali packages are signed by each individual developer when they are built and committed and the repositories subsequently sign the packages as well.
  • Multi-language: Although pentesting tools tend to be written in English, we have ensured that Kali has true multilingual support, allowing more users to operate in their native language and locate the tools they need for the job.
  • Completely customizable: We completely understand that not everyone will agree with our design decisions so we have made it as easy as possible for our more adventurous users to customize Kali Linux to their liking, all the way down to the kernel.
  • ARMEL and ARMHF support: Since ARM-based systems are becoming more and more prevalent and inexpensive, we knew that Kali’s ARM support would need to be as robust as we could manage, resulting in working installations for both ARMEL and ARMHF systems. Kali Linux has ARM repositories integrated with the mainline distribution so tools for ARM will be updated in conjunction with the rest of the distribution. Kali is currently available for the following ARM devices:
    • rk3306 mk/ss808
    • Raspberry Pi
    • ODROID U2/X2
    • Samsung Chromebook
    • EfikaMX
    • Beaglebone Black
    • CuBox
    • Galaxy Note 10.1
Kali is specifically tailored to penetration testing and therefore, all documentation on this site assumes prior knowledge of the Linux operating system.


http://sh.st/bLnJR

2. BackTrack 5 R3
b
BackTrack is intended for all audiences from the most savvy security professionals to early newcomers to the information security field. BackTrack promotes a quick and easy way to find and update the largest database of security tools collection to-date. Our community of users range from skilled penetration testers in the information security field, government entities, information technology, security enthusiasts, and individuals new to the security community.

Feedback from all industries and skill levels allows us to truly develop a solution that is tailored towards everyone and far exceeds anything ever developed both commercially and freely available. The project is funded by Offensive Security. Whether you’re hacking wireless, exploiting servers, performing a web application assessment, learning, or social-engineering a client, BackTrack is the one-stop-shop for all of your security needs.


http://sh.st/bLnBv
KDE
BackTrack 5 R3 KDE 32-Bit
http://sh.st/bLn40
BackTrack 5 R3 KDE 64-Bit
http://sh.st/bLn6K

GNOME
BackTrack 5 R3 GNOME 32-Bit
http://sh.st/bLmw0
BackTrack 5 R3 GNOME 64-Bit
http://sh.st/bLmto

3. NodeZero Linux
c
Penetration testing and security auditing requires specialist tools. The natural path leads us to collecting them all in one handy place.  However how that collection is implemented can be critical to how you deploy effective and robust testing.

It is said the necessity is the mother of all invention, and NodeZero Linux is no different. Our team is built of testers and developers, who have come to the census that live systems do not offer what they need in their security audits. Penetration Testing distributions tend to have historically utilized the “Live” system concept of Linux, which really means that they try not to make any permanent effects to a system. Ergo all changes are gone after reboot, and run from media such as discs and USB’s drives. However all that this maybe very handy for occasional testing, its usefulness can be depleted when you’re testing regularly. It’s our belief that “Live System’s” just don’t scale well in a robust testing environment.

All though NodeZero Linux can be used as a “Live System” for occasional testing, its real strength comes from the understanding that a tester requires a strong and efficient system. This is achieved in our belief by working at a distribution that is a permanent installation that benefits from a strong selection of tools, integrated with a stable Linux environment.

NodeZero Linux is reliable, stable, and powerful.  Based on the industry leading Ubuntu Linux distribution, NodeZero Linux takes all the stability and reliability that comes with Ubuntu’s Long Term Support model, and its power comes from the tools configured to live comfortably within the environment.


http://sh.st/bLmoV

4. BackBox Linux
d
BackBox is a Linux distribution based on Ubuntu. It has been developed to perform penetration tests and security assessments. Designed to be fast, easy to use and provide a minimal yet complete desktop environment, thanks to its own software repositories, always being updated to the latest stable version of the most used and best known ethical hacking tools.

BackBox main aim is providing an alternative, highly customizable and performing system. BackBox uses the light window manager Xfce. It includes some of the most used security and analysis Linux tools, aiming to a wide spread of goals, ranging from web application analysis to network analysis, from stress tests to sniffing, including also vulnerability assessment, computer forensic analysis and exploitation.

The power of this distribution is given by its Launchpad repository core constantly updated to the last stable version of the most known and used ethical hacking tools. The integration and development of new tools inside the distribution follows the commencement of open source community and particularly the Debian Free Software Guidelines criteria.

BackBox Linux takes pride as they excelled on the followings:

  • Performance and speed are key elements

Starting from an appropriately configured XFCE desktop manager it offers stability and the speed, that only a few other DMs can offer, reaching in extreme tweaking of services, configurations, boot parameters and the entire infrastructure. BackBox has been designed with the aim of achieving the maximum performance and minimum consumption of resources.

This makes BackBox a very fast distro and suitable even for old hardware configurations.

  • Everything is in the right place

The main menu of BackBox has been well organized and designed to avoid any chaos/mess finding tools that we are looking for. The selection of every single tool has been done with accuracy in order to avoid any redundancies and the tools that have similar functionalities.

With particular attention to the end user every needs, all menu and configuration files are have been organized and reduced to a minimum essential, necessary to provide an intuitive, friendly and easy usage of Linux distribution.

  • It’s standard compliant

The software packaging process, the configuration and the tweaking of the system follows up the Ubuntu/Debian standard guide lines.
Any of Debian and Ubuntu users will feel very familiar with, while newcomers will follow the official documentation and BackBox additions to customize their system without any tricky work around, because it is standard and straight forward!

  • It’s versatile

As a live distribution, BackBox offer an experience that few other distro can offer and once installed naturally lends itself to fill the role of a desktop-oriented system. Thanks to the set of packages included in official repository it provides to the user an easy and versatile usage of system.

  • It’s hacker friendly

If you’d like to make any change/modification, in order to suite to your purposes, or maybe add additional tools that is not present in the repositories, nothing could be easier in doing that with BackBox. Create your own Launchpad PPA, send your package to dev team and contribute actively to the evolution of BackBox Linux.
                                        http://sh.st/bLmoV

5. BlackBuntu
e
Blackbuntu is distribution for penetration testing which was specially designed for security training students and practitioners of information security. Blackbuntu is penetration testing distribution with GNOME Desktop Environment.

Here is a list of Security and Penetration Testing tools – or rather categories available within the Blackbuntu package, (each category has many sub categories) but this gives you a general idea of what comes with this pentesting distro:

  • Information Gathering,
  • Network Mapping,
  • Vulnerability Identification,
  • Penetration,
  • Privilege Escalation,
  • Maintaining Access,
  • Radio Network Analysis,
  • VoIP Analysis,
  • Digital Forensic,
  • Reverse Engineering and a
  • Miscellaneous section.

Because this is Ubuntu based, almost every device and hardware would just work which is great as it wastes less time troubleshooting and more time working.


http://sh.st/bLmTK


6- Samurai Web Testing Framework
f
The Samurai Web Testing Framework is a live linux environment that has been pre-configured to function as a web pen-testing environment. The CD contains the best of the open source and free tools that focus on testing and attacking websites. In developing this environment, we have based our tool selection on the tools we use in our security practice. We have included the tools used in all four steps of a web pen-test.

Starting with reconnaissance, we have included tools such as the Fierce domain scanner and Maltego. For mapping, we have included tools such WebScarab and ratproxy. We then chose tools for discovery. These would include w3af and burp. For exploitation, the final stage, we included BeEF, AJAXShell and much more. This CD also includes a pre-configured wiki, set up to be the central information store during your pen-test.

Most penetration tests are focused on either network attacks or web application attacks. Given this separation, many pen testers themselves have understandably followed suit, specializing in one type of test or the other. While such specialization is a sign of a vibrant, healthy penetration testing industry, tests focused on only one of these aspects of a target environment often miss the real business risks of vulnerabilities discovered and exploited by determined and skilled attackers. By combining web app attacks such as SQL injection, Cross-Site Scripting, and Remote File Includes with network attacks such as port scanning, service compromise, and client-side exploitation, the bad guys are significantly more lethal. Penetration testers and the enterprises who use their services need to understand these blended attacks and how to measure whether they are vulnerable to them. This session provides practical examples of penetration tests that combine such attack vectors, and real-world advice for conducting such tests against your own organization.

Samurai Web Testing Framework looks like a very clean distribution and the developers are focused on what they do best, rather than trying to add everything in one single distribution and thus making supporting tougher. This is in a way good as if you’re just starting, you should start with a small set of tools and then move on to next step.
http://samurai.inguardians.com/


7. Knoppix STD
g
Like Knoppix, this distro is based on Debian and originated in Germany. STD is a Security Tool. Actually it is a collection of hundreds if not thousands of open source security tools. It’s a Live Linux Distro (i.e. it runs from a bootable CD in memory without changing the native operating system of your PC). Its sole purpose in life is to put as many security tools at your disposal with as slick an interface as it can.
The architecture is i486 and runs from the following desktops: GNOME, KDE, LXDE and also Openbox. Knoppix has been around for a long time now – in fact I think it was one of the original live distros.
Knoppix is primarily designed to be used as a Live CD, it can also be installed on a hard disk. The STD in the Knoppix name stands for Security Tools Distribution. The Cryptography section is particularly well-known in Knoppix.
The developers and official forum might seem snobbish (I mean look at this from their FAQ
Question: I am new to Linux. Should I try STD?
Answer: No. If you’re new to Linux STD will merely hinder your learning experience. Use Knoppix instead.
But hey, isn’t all Pentest distro users are like that? If you can’t take the heat, maybe you shouldn’t be trying a pentest distro after all. Kudos to STD dev’s for speaking their mind.
http://s-t-d.org/


8. Pentoo
h
Pentoo is a Live CD and Live USB designed for penetration testing and security assessment. Based on Gentoo Linux, Pentoo is provided both as 32 and 64 bit installable livecd. Pentoo is also available as an overlayfor an existing Gentoo installation. It features packet injection patched wifi drivers, GPGPU cracking software, and lots of tools for penetration testing and security assessment. The Pentoo kernel includes grsecurity and PAX hardening and extra patches – with binaries compiled from a hardened toolchain with the latest nightly versions of some tools available.
It’s basically a gentoo install with lots of customized tools, customized kernel, and much more. Here is a non-exhaustive list of the features currently included :
  •     Hardened Kernel with aufs patches
  •     Backported Wifi stack from latest stable kernel release
  •     Module loading support ala slax
  •     Changes saving on usb stick
  •     XFCE4 wm
  •     Cuda/OPENCL cracking support with development tools
  •     System updates if you got it finally installed
Put simply, Pentoo is Gentoo with the pentoo overlay. This overlay is available in layman so all you have to do is layman -L and layman -a pentoo.
Pentoo has a pentoo/pentoo meta ebuild and multiple pentoo profiles, which will install all the pentoo tools based on USE flags. The package list is fairly adequate. If you’re a Gentoo user, you might want to use Pentoo as this is the closest distribution with similar build.
http://s-t-d.org/

9. WEAKERTH4N
i
Weakerth4n has a very well maintained website and a devoted community. Built from Debian Squeeze (Fluxbox within a desktop environment) this operating system is particularly suited for WiFi hacking as it contains plenty of Wireless cracking and hacking tools.
Tools includes: Wifi attacks, SQL Hacking, Cisco Exploitation, Password Cracking, Web Hacking, Bluetooth, VoIP Hacking, Social Engineering, Information Gathering, Fuzzing Android Hacking, Networking and creating Shells.
Vital Statistics
  •     OS Type: Linux
  •     Based on: Debian, Ubuntu
  •     Origin: Italy
  •     Architecture: i386, x86_64
  •     Desktop: XFCE
If you look into their website you get the feeling that the maintainers are active and they write a lot of guides and tutorials to help newbies. As this is based on Debian Squeeze, this might be something you would want to give a go. They also released Version 3.6 BETA, (Oct 2013) so yeah, give it a go. You might just like it.
http://weaknetlabs.com/main/

10. Matriux
j
Matriux is a Debian-based security distribution designed for penetration testing and forensic investigations. Although it is primarily designed for security enthusiasts and professionals, it can also be used by any Linux user as a desktop system for day-to-day computing. Besides standard Debian software, Matriux also ships with an optimised GNOME desktop interface, over 340 open-source tools for penetration testing, and a custom-built Linux kernel.
Matriux was first released in 2009 under code name “lithium” and then followed by versions like “xenon” based on Ubuntu. Matriux “Krypton” then followed in 2011 where we moved our system to Debian. Other versions followed for Matriux “Krypton” with v1.2 and then Ec-Centric in 2012. This year we are releasing Matriux “Leandros” RC1 on 2013-09-27 which is a major revamp over the existing system.
Matriux arsenal is divided into sections with a broader classification of tools for Reconnaissance, Scanning, Attack Tools, Frameworks, Radio (Wireless), Digital Forensics, Debuggers, Tracers, Fuzzers and other miscellaneous tool providing a wider approach over the steps followed for a complete penetration testing and forensic scenario. Although there are were many questions raised regarding why there is a need for another security distribution while there is already one. We believed and followed the free spirit of Linux in making one. We always tried to stay updated with the tool and hardware support and so include the latest tools and compile a custom kernel to stay abreast with the latest technologies in the field of information security. This version includes a latest section of tools PCI-DSS.
Matriux is also designed to run from a live environment like a CD/ DVD or USB stick which can be helpful in computer forensics and data recovery for forensic analysis, investigations and retrievals not only from Physical Hard drives but also from Solid state drives and NAND flashes used in smart phones like Android and iPhone. With Matriux Leandros we also support and work with the projects and tools that have been discontinued over time and also keep track with the latest tools and applications that have been developed and presented in the recent conferences.
Features (notable updates compared to Ec-Centric):
  • Custom kernel 3.9.4 (patched with aufs, squashfs and xz filesystem mode, includes support for wide range of wireless drivers and hardware) Includes support for alfacard 0036NH
  • USB persistent
  • Easy integration with virtualbox and vmware player even in Live mode.
  • MID has been updated to make it easy to install check http://www.youtube.com/watch?v=kWF4qRm37DI
  • Includes latest tools introduced at Blackhat 2013 and Defcon 2013, Updated build until September 22 2013.
  • UI inspired from Greek Mythology
  • New Section Added PCI-DSS
  • IPv6 tools included.
Another great looking distro based on Debian Linux. I am a great fan of Greek Mythology, (their UI was inspired by it), so I like it already.
http://www.matriux.com/index.php?language=en

4 Nov 2015

Get paid apps for free in Windows Phone[amansoftech]

Get paid apps for free in Windows Phone[amansoftech]


1. For WP 7.*
nokia-lumia-710
For this you will have to root your phone first. My fav custom ROM is Raptalian.
Here is a detailed guide on Rooting and installing custom ROM on your old Nokia Lumia

After that is done
Download and install WpAppPatcher
Application Description:
WPAppPatcher/WPAppSender is an application that creates a xap file from your application
installation by sending it to your pc so it can be patched to the full version and installed
again as a xap file without the need of using a credit card or Paypal.

Installation Instructions:
1) Extract “WPAppPatcher” to any location you want and launch the application.
2) Install “WPAppSender” on your Windows Phone (Open WPAppPatcher > Help > Install Client)(Install it using this menu option after which you will be able to install cracked apps).
3) Run “WPAppSender” on your Windows Phone and set your phone’s ip on your pc in “WPAppPatcher”.*
4) Now click on any application/game that you want to download and patch from your phone.
* Trust “WPAppSender” with “WP Root Tools” if the app crashes on start-up or no apps show up.
* If you are updating don’t forget to update both “WPAppPatcher” and “WPAppSender”
And thats it :)
You are done
Moving on
2. Windows phone 8
1200-nokia_lumia_925_color_range_crop_4B489AF7
DOWNLoad the required apps XAP file
1. Turn your net on
2. Using PC transfer the file to your SD card
3. Remove the usb
4. Wait for 2 mins or more <3 mins
5. Then restart your phone 1-2 times if it doesn’t work
6. leave the phone alone for 10 minutes
7. After which open the store
8. Here you can find an option SD card or your phone memory.
9.Open the SD card and click on the XAP file you want to install.
10.Voila ! you have your paid app installed in your windows 8 Mobile.


 WpAppPatcher
http://sh.st/bKkSw

XAP File
http://sh.st/bKk3z

 

Visitors