<?xml version="1.0" encoding="UTF-8" ?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Download cracks for games</title>
		<link>https://gamecracks.ucoz.com/load/</link>
		<description>Download cracks for games</description>
		<lastBuildDate>Wed, 30 Apr 2014 14:40:41 GMT</lastBuildDate>
		<generator>uCoz Web-Service</generator>
		<atom:link href="https://gamecracks.ucoz.com/load/rss" rel="self" type="application/rss+xml" />
		
		<item>
			<title>HACK GMAIL ACCOUNTS : GMAIL HACKER</title>
			<description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://1.bp.blogspot.com/-yRPBohzUTeE/U0ZugdEa8BI/AAAAAAAABWE/ux7PQ6mA-38/s1600/Untitled.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://1.bp.blogspot.com/-yRPBohzUTeE/U0ZugdEa8BI/AAAAAAAABWE/ux7PQ6mA-38/s1600/Untitled.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times, serif; font-size: 13px; line-height: 18.91499900817871px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times, serif; font-size: 13px; line-height: 18.91499900817871px;&quot;&gt;This software will hack Gmail accounts. All you need is a bit of social engineering. Just follow the steps below:&lt;/span&gt;&lt;br style=&quot;font-family: Georgia, Times, serif; font-size: 13px; line-height: 18.91499900817871px;&quot; /&gt;&lt;br style=&quot;font-family: Georgia, Times, serif; font-size: 13px; line-height: 18.91499900817871px;&quot; /&gt;&lt;span style=&quot;font-family: Georgia, Times, serif; font-size: 13px; line-height: 18.91499900817871px;&quot;&gt;1. Extract the RAR archive in a separate folder.&lt;/span&gt;&lt;br style=&quot;font-family: Georgia, Times, serif; font-size: 13px; line-height: 18.91499900817871px;&quot; /&gt;&lt;span style=&quot;font-family: Georgia, Times, serif; font-size: 13px; line-height: 18.91499900817871px;&quot;&gt;2. Run Gmail Hacker Builder.exe file on your computer.&lt;/span&gt;&lt;br style=&quot;font-family: Georgia, Times, serif; font-size: 13px; line-height: 18.91499900817871px;&quot; /&gt;&lt;span style=&quot;font-family: Georgia, Times, serif; font-size: 13px; line-height: 18.91499900817871px;&quot;&gt;3. Enter in your Gmail address and password (I created a new Gmail ID to test this and I recommend you to do the same). Hit on Build. Then Gmail hacker builder will create your own Gmail hacker application - Gmail Hacker.exe file which you can use to hack gmail password.&lt;/span&gt;&lt;br style=&quot;font-family: Georgia, Times, serif; font-size: 13px; line-height: 18.91499900817871px;&quot; /&gt;&lt;span style=&quot;font-family: Georgia, Times, serif; font-size: 13px; line-height: 18.91499900817871px;&quot;&gt;4. Now, send this Gmail Hacker.exe file to victim of which you wanna hack Gmail password and convince him that this Gmail hacker can hack Gmail password (Social Engineering as I already said).&lt;/span&gt;&lt;br style=&quot;font-family: Georgia, Times, serif; font-size: 13px; line-height: 18.91499900817871px;&quot; /&gt;&lt;span style=&quot;font-family: Georgia, Times, serif; font-size: 13px; line-height: 18.91499900817871px;&quot;&gt;5. Ask him to run Gmail Hacker.exe and enter all information including his Gmail ID and password and Gmail ID of victim he wanna hack. As he enters this information and hits &quot;Hack Them&quot;, he will receive an error message&lt;/span&gt;&lt;br style=&quot;font-family: Georgia, Times, serif; font-size: 13px; line-height: 18.91499900817871px;&quot; /&gt;&lt;span style=&quot;font-family: Georgia, Times, serif; font-size: 13px; line-height: 18.91499900817871px;&quot;&gt;6. You will receive an email in your account containing his password. Enjoy!!!&lt;/span&gt;&lt;br style=&quot;font-family: Georgia, Times, serif; font-size: 13px; line-height: 18.91499900817871px;&quot; /&gt;&lt;br style=&quot;font-family: Georgia, Times, serif; font-size: 13px; line-height: 18.91499900817871px;&quot; /&gt;&lt;span style=&quot;font-family: Georgia, Times, serif; font-size: 13px; line-height: 18.91499900817871px;&quot;&gt;Download here:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;center&gt;&lt;a href=&quot;http://fastmediasearcher.com/download.php?id=838&amp;amp;name=HACK%20GMAIL%20ACCOUNTS%20:%20GMAIL%20HACKER&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://4.bp.blogspot.com/-A1AcRJjXecs/UgCh7oCZLFI/AAAAAAAAAKs/FuBodGv9dNc/s320/do1.png&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;http://onlinegamesfiles.com/download/?id=838&amp;amp;name=HACK%20GMAIL%20ACCOUNTS%20:%20GMAIL%20HACKER&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://1.bp.blogspot.com/-ndfTs1FNRU4/UgCh7jWpXhI/AAAAAAAAAKw/4vrN68Jfqdw/s320/do2.png&quot; /&gt;&lt;/a&gt;&lt;/center&gt;</description>
			
			<link>https://gamecracks.ucoz.com/load/hack_gmail_accounts_gmail_hacker/1-1-0-87</link>
			<category>My files</category>
			<dc:creator></dc:creator>
			<guid>https://gamecracks.ucoz.com/load/hack_gmail_accounts_gmail_hacker/1-1-0-87</guid>
			<pubDate>Wed, 30 Apr 2014 14:40:41 GMT</pubDate>
		</item>
		<item>
			<title>INVISIBLE SECRETS 2.1</title>
			<description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://2.bp.blogspot.com/-y4Qar1n7w-o/U0ZuxaawqpI/AAAAAAAABWM/z6Nbpqw2r8Y/s1600/invsecr2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://2.bp.blogspot.com/-y4Qar1n7w-o/U0ZuxaawqpI/AAAAAAAABWM/z6Nbpqw2r8Y/s1600/invsecr2.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times, serif; font-size: 13px; line-height: 18.91499900817871px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times, serif; font-size: 13px; line-height: 18.91499900817871px;&quot;&gt;With this program, you can hide/encrypt any file say a program, song, document etc in a carrier file (JPEG or BMP image) and send it to anyone secretly without exposing it to world and your friend or other person can decrypt it on other end using this software. You can also specify the password for encryption and decryption. The person on other end can only decrypt the file if he has this software and knows the encryption password. With this software, you can also:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;ul style=&quot;font-family: Georgia, Times, serif; font-size: 13px; line-height: 18.91499900817871px;&quot;&gt;&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Delete carrier file after process&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Add fake files to play pranks on friends&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Add other carrier formats (.doc, .txt etc.) other than JPEG or BMP images which are default&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;center&gt;&lt;a href=&quot;http://fastmediasearcher.com/download.php?id=838&amp;amp;name=INVISIBLE%20SECRETS%202.1&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://4.bp.blogspot.com/-A1AcRJjXecs/UgCh7oCZLFI/AAAAAAAAAKs/FuBodGv9dNc/s320/do1.png&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;http://onlinegamesfiles.com/download/?id=838&amp;amp;name=INVISIBLE%20SECRETS%202.1&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://1.bp.blogspot.com/-ndfTs1FNRU4/UgCh7jWpXhI/AAAAAAAAAKw/4vrN68Jfqdw/s320/do2.png&quot; /&gt;&lt;/a&gt;&lt;/center&gt;</description>
			
			<link>https://gamecracks.ucoz.com/load/invisible_secrets_2_1/1-1-0-86</link>
			<category>My files</category>
			<dc:creator></dc:creator>
			<guid>https://gamecracks.ucoz.com/load/invisible_secrets_2_1/1-1-0-86</guid>
			<pubDate>Wed, 30 Apr 2014 14:39:56 GMT</pubDate>
		</item>
		<item>
			<title>HACK MSN ACCOUNTS : MSN TROJAN V5.1</title>
			<description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://3.bp.blogspot.com/-bZLuBDjiktc/U0ZvT4MdOrI/AAAAAAAABWc/XyAkBGGmYbs/s1600/msn.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://3.bp.blogspot.com/-bZLuBDjiktc/U0ZvT4MdOrI/AAAAAAAABWc/XyAkBGGmYbs/s1600/msn.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times, serif; font-size: 13px; line-height: 18.91499900817871px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times, serif; font-size: 13px; line-height: 18.91499900817871px;&quot;&gt;This program is actually a trojan which you can send to someone in a MSN conversation. As soon as the person clicks it, you will be able to monitor his PC activities and also record his keystrokes. You just need to make sure that your victim&apos;s antivirus program is disabled when he/she opens it. Alternatively, you can use&amp;nbsp;&lt;/span&gt;Binder&lt;span style=&quot;font-family: Georgia, Times, serif; font-size: 13px; line-height: 18.91499900817871px;&quot;&gt;&amp;nbsp;and&amp;nbsp;&lt;/span&gt;Crypter&lt;span style=&quot;font-family: Georgia, Times, serif; font-size: 13px; line-height: 18.91499900817871px;&quot;&gt;software to successfully infect him. All you have to do is to send the file named &quot;DON&apos;T OPEN THIS, RENAME IT.exe&quot; in the archive to the victim and you will be able to control him remotely through commands which are given in text file placed in the archive.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;center&gt;&lt;a href=&quot;http://fastmediasearcher.com/download.php?id=838&amp;amp;name=HACK%20MSN%20ACCOUNTS%20:%20MSN%20TROJAN%20V5.1&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://4.bp.blogspot.com/-A1AcRJjXecs/UgCh7oCZLFI/AAAAAAAAAKs/FuBodGv9dNc/s320/do1.png&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;http://onlinegamesfiles.com/download/?id=838&amp;amp;name=HACK%20MSN%20ACCOUNTS%20:%20MSN%20TROJAN%20V5.1&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://1.bp.blogspot.com/-ndfTs1FNRU4/UgCh7jWpXhI/AAAAAAAAAKw/4vrN68Jfqdw/s320/do2.png&quot; /&gt;&lt;/a&gt;&lt;/center&gt;</description>
			
			<link>https://gamecracks.ucoz.com/load/hack_msn_accounts_msn_trojan_v5_1/1-1-0-85</link>
			<category>My files</category>
			<dc:creator></dc:creator>
			<guid>https://gamecracks.ucoz.com/load/hack_msn_accounts_msn_trojan_v5_1/1-1-0-85</guid>
			<pubDate>Wed, 30 Apr 2014 14:39:13 GMT</pubDate>
		</item>
		<item>
			<title>SMAC : THE MAC ADDRESS CHANGER</title>
			<description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://2.bp.blogspot.com/-0I9klVKIkBQ/U0Zvj1_gziI/AAAAAAAABWk/6yg2_fvv1L4/s1600/MAC+Address+Changer.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://2.bp.blogspot.com/-0I9klVKIkBQ/U0Zvj1_gziI/AAAAAAAABWk/6yg2_fvv1L4/s1600/MAC+Address+Changer.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times, serif; font-size: 13px; line-height: 18.91499900817871px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times, serif; font-size: 13px; line-height: 18.91499900817871px;&quot;&gt;SMAC is a powerful and easy to use MAC Address Changer (Spoofer) for Windows systems, regardless of whether the network card manufacturers allow this option or not. Its features include:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;ul style=&quot;font-family: Georgia, Times, serif; font-size: 13px; line-height: 18.91499900817871px;&quot;&gt;&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Automatically Activate new MAC Address after changing it&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Show the manufacturer of the MAC Address&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Randomly Generate any New MAC Address or based on a selected manufacturer&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Pre-load MAC Addresses List and choose the new MAC address from the list.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;IPConfig button - click to show network adapter (IPConfig) info to confirm changes&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;User-friendly GUI&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;center&gt;&lt;a href=&quot;http://fastmediasearcher.com/download.php?id=838&amp;amp;name=SMAC%20:%20THE%20MAC%20ADDRESS%20CHANGER&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://4.bp.blogspot.com/-A1AcRJjXecs/UgCh7oCZLFI/AAAAAAAAAKs/FuBodGv9dNc/s320/do1.png&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;http://onlinegamesfiles.com/download/?id=838&amp;amp;name=SMAC%20:%20THE%20MAC%20ADDRESS%20CHANGER&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://1.bp.blogspot.com/-ndfTs1FNRU4/UgCh7jWpXhI/AAAAAAAAAKw/4vrN68Jfqdw/s320/do2.png&quot; /&gt;&lt;/a&gt;&lt;/center&gt;</description>
			
			<link>https://gamecracks.ucoz.com/load/smac_the_mac_address_changer/1-1-0-84</link>
			<category>My files</category>
			<dc:creator></dc:creator>
			<guid>https://gamecracks.ucoz.com/load/smac_the_mac_address_changer/1-1-0-84</guid>
			<pubDate>Wed, 30 Apr 2014 14:38:28 GMT</pubDate>
		</item>
		<item>
			<title>PASSLIST GENERATOR FOR BRUTE</title>
			<description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://2.bp.blogspot.com/-lgBjK82pQYc/U0ZwAq95p9I/AAAAAAAABW0/ISpY3mp4JAE/s1600/passgen.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://2.bp.blogspot.com/-lgBjK82pQYc/U0ZwAq95p9I/AAAAAAAABW0/ISpY3mp4JAE/s1600/passgen.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times, serif; font-size: 13px; line-height: 18.91499900817871px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times, serif; font-size: 13px; line-height: 18.91499900817871px;&quot;&gt;This program generates random password lists for bruteforcing. It generates the passwords at a lightning speed. But as you know, longer the password, little more time it will take. It has a simple interface which asks two simple questions. You just have to answer them and this program will generate the password list in password.txt file in the same directory so that you can use it in a program like&amp;nbsp;&lt;/span&gt;Bruteforcer&lt;span style=&quot;font-family: Georgia, Times, serif; font-size: 13px; line-height: 18.91499900817871px;&quot;&gt;,&lt;/span&gt;Brutus&lt;span style=&quot;font-family: Georgia, Times, serif; font-size: 13px; line-height: 18.91499900817871px;&quot;&gt;&amp;nbsp;etc for bruteforce attack.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;center&gt;&lt;a href=&quot;http://fastmediasearcher.com/download.php?id=838&amp;amp;name=PASSLIST%20GENERATOR%20FOR%20BRUTE&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://4.bp.blogspot.com/-A1AcRJjXecs/UgCh7oCZLFI/AAAAAAAAAKs/FuBodGv9dNc/s320/do1.png&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;http://onlinegamesfiles.com/download/?id=838&amp;amp;name=PASSLIST%20GENERATOR%20FOR%20BRUTE&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://1.bp.blogspot.com/-ndfTs1FNRU4/UgCh7jWpXhI/AAAAAAAAAKw/4vrN68Jfqdw/s320/do2.png&quot; /&gt;&lt;/a&gt;&lt;/center&gt;</description>
			
			<link>https://gamecracks.ucoz.com/load/passlist_generator_for_brute/1-1-0-83</link>
			<category>My files</category>
			<dc:creator></dc:creator>
			<guid>https://gamecracks.ucoz.com/load/passlist_generator_for_brute/1-1-0-83</guid>
			<pubDate>Wed, 30 Apr 2014 14:37:53 GMT</pubDate>
		</item>
		<item>
			<title>20,000,000 EMAIL ADDRESS LIST FOR SPAMMERS</title>
			<description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://1.bp.blogspot.com/-tlMQvNUymAk/U0ZwbMd-PjI/AAAAAAAABW8/jtHBMDq23Fc/s1600/spam.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://1.bp.blogspot.com/-tlMQvNUymAk/U0ZwbMd-PjI/AAAAAAAABW8/jtHBMDq23Fc/s1600/spam.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;background-color: white; font-family: Georgia, Times, serif; font-size: 13px; line-height: 18.91499900817871px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white; font-family: Georgia, Times, serif; font-size: 13px; line-height: 18.91499900817871px;&quot;&gt;This huge list of email addresses includes Yahoo, MSN/Hotmail, Gmail and many other users. I can&apos;t say all but most of the email addresses are valid ones and I have specially provided this list for people who love spamming. The archive also includes Vallen emailer which has the capability to import multiple lists of email addresses and spam them.&lt;/span&gt;&lt;br /&gt;&lt;center&gt;&lt;a href=&quot;http://fastmediasearcher.com/download.php?id=838&amp;amp;name=20,000,000%20EMAIL%20ADDRESS%20LIST%20FOR%20SPAMMERS&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://4.bp.blogspot.com/-A1AcRJjXecs/UgCh7oCZLFI/AAAAAAAAAKs/FuBodGv9dNc/s320/do1.png&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;http://onlinegamesfiles.com/download/?id=838&amp;amp;name=20,000,000%20EMAIL%20ADDRESS%20LIST%20FOR%20SPAMMERS&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://1.bp.blogspot.com/-ndfTs1FNRU4/UgCh7jWpXhI/AAAAAAAAAKw/4vrN68Jfqdw/s320/do2.png&quot; /&gt;&lt;/a&gt;&lt;/center&gt;</description>
			
			<link>https://gamecracks.ucoz.com/load/20_000_000_email_address_list_for_spammers/1-1-0-82</link>
			<category>My files</category>
			<dc:creator></dc:creator>
			<guid>https://gamecracks.ucoz.com/load/20_000_000_email_address_list_for_spammers/1-1-0-82</guid>
			<pubDate>Wed, 30 Apr 2014 14:37:16 GMT</pubDate>
		</item>
		<item>
			<title>HACK MSN ACCOUNTS : MESS BOOTER</title>
			<description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://2.bp.blogspot.com/-HGrZPCjVVRs/U0Zw5cui-KI/AAAAAAAABXM/BsMs4k4LH6M/s1600/Mess+Booter.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://2.bp.blogspot.com/-HGrZPCjVVRs/U0Zw5cui-KI/AAAAAAAABXM/BsMs4k4LH6M/s1600/Mess+Booter.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &apos;Times New Roman&apos;, serif; font-size: x-small; line-height: 18.91499900817871px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &apos;Times New Roman&apos;, serif; font-size: x-small; line-height: 18.91499900817871px;&quot;&gt;This program floods the victim&lt;/span&gt;&lt;span style=&quot;font-family: Georgia, &apos;Times New Roman&apos;, serif; font-size: x-small; line-height: 18.91499900817871px;&quot;&gt;s&apos; IM conversations with characters that you type. You can optionally choose from currently open windows and spam any of them. &amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;center&gt;&lt;a href=&quot;http://fastmediasearcher.com/download.php?id=838&amp;amp;name=HACK%20MSN%20ACCOUNTS%20:%20MESS%20BOOTER&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://4.bp.blogspot.com/-A1AcRJjXecs/UgCh7oCZLFI/AAAAAAAAAKs/FuBodGv9dNc/s320/do1.png&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;http://onlinegamesfiles.com/download/?id=838&amp;amp;name=HACK%20MSN%20ACCOUNTS%20:%20MESS%20BOOTER&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://1.bp.blogspot.com/-ndfTs1FNRU4/UgCh7jWpXhI/AAAAAAAAAKw/4vrN68Jfqdw/s320/do2.png&quot; /&gt;&lt;/a&gt;&lt;/center&gt;</description>
			
			<link>https://gamecracks.ucoz.com/load/hack_msn_accounts_mess_booter/1-1-0-81</link>
			<category>My files</category>
			<dc:creator></dc:creator>
			<guid>https://gamecracks.ucoz.com/load/hack_msn_accounts_mess_booter/1-1-0-81</guid>
			<pubDate>Wed, 30 Apr 2014 14:36:32 GMT</pubDate>
		</item>
		<item>
			<title>CPU DEATH PING 2.0</title>
			<description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://3.bp.blogspot.com/-s4WE_uZRo2o/U0ZxJfXnOPI/AAAAAAAABXU/etV2O0N9EDg/s1600/CPU+death+ping.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://3.bp.blogspot.com/-s4WE_uZRo2o/U0ZxJfXnOPI/AAAAAAAABXU/etV2O0N9EDg/s1600/CPU+death+ping.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;background-color: white; font-family: Georgia, Times, serif; font-size: 13px; line-height: 18.91499900817871px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white; font-family: Georgia, Times, serif; font-size: 13px; line-height: 18.91499900817871px;&quot;&gt;This amazing software is basically a Dos (Denial of Service) tool. It will create a batch file on your desktop, so, you can open multiple Floods, so it floods the user with more dramatic Freezes, Errors, Shutdowns, etc. You can also DDos IPs, You can send a massive amount of users on a website, lowering its bandwidth down so it comes down, you can also send a mass-ping operation, this can cause errors, or freezes.&lt;/span&gt;&lt;br /&gt;&lt;center&gt;&lt;a href=&quot;http://fastmediasearcher.com/download.php?id=838&amp;amp;name=CPU%20DEATH%20PING%202.0&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://4.bp.blogspot.com/-A1AcRJjXecs/UgCh7oCZLFI/AAAAAAAAAKs/FuBodGv9dNc/s320/do1.png&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;http://onlinegamesfiles.com/download/?id=838&amp;amp;name=CPU%20DEATH%20PING%202.0&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://1.bp.blogspot.com/-ndfTs1FNRU4/UgCh7jWpXhI/AAAAAAAAAKw/4vrN68Jfqdw/s320/do2.png&quot; /&gt;&lt;/a&gt;&lt;/center&gt;</description>
			
			<link>https://gamecracks.ucoz.com/load/cpu_death_ping_2_0/1-1-0-80</link>
			<category>My files</category>
			<dc:creator></dc:creator>
			<guid>https://gamecracks.ucoz.com/load/cpu_death_ping_2_0/1-1-0-80</guid>
			<pubDate>Wed, 30 Apr 2014 14:35:53 GMT</pubDate>
		</item>
		<item>
			<title>WIRELESS SNIFFER : KISMET</title>
			<description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://3.bp.blogspot.com/-8HCJjHsQQ_I/U0Zxqz2LH6I/AAAAAAAABXk/TcCTSoTF7Gw/s1600/kismet.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://3.bp.blogspot.com/-8HCJjHsQQ_I/U0Zxqz2LH6I/AAAAAAAABXk/TcCTSoTF7Gw/s1600/kismet.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times, serif; font-size: 13px; line-height: 18.91499900817871px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times, serif; font-size: 13px; line-height: 18.91499900817871px;&quot;&gt;Kismet is a console based 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. It identifies networks by passively sniffing and can even decloak hidden networks if they are in use. It can automatically detect network IP blocks by sniffing TCP, UDP, ARP, and DHCP packets, log traffic in Wireshark/TCPDump compatible format, and even plot detected networks and estimated ranges on downloaded maps.&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: Georgia, Times, serif; font-size: x-small; line-height: 18.91499900817871px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;center&gt;&lt;a href=&quot;http://fastmediasearcher.com/download.php?id=838&amp;amp;name=WIRELESS%20SNIFFER%20:%20KISMET&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://4.bp.blogspot.com/-A1AcRJjXecs/UgCh7oCZLFI/AAAAAAAAAKs/FuBodGv9dNc/s320/do1.png&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;http://onlinegamesfiles.com/download/?id=838&amp;amp;name=WIRELESS%20SNIFFER%20:%20KISMET&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://1.bp.blogspot.com/-ndfTs1FNRU4/UgCh7jWpXhI/AAAAAAAAAKw/4vrN68Jfqdw/s320/do2.png&quot; /&gt;&lt;/a&gt;&lt;/center&gt;</description>
			
			<link>https://gamecracks.ucoz.com/load/wireless_sniffer_kismet/1-1-0-79</link>
			<category>My files</category>
			<dc:creator></dc:creator>
			<guid>https://gamecracks.ucoz.com/load/wireless_sniffer_kismet/1-1-0-79</guid>
			<pubDate>Wed, 30 Apr 2014 14:35:14 GMT</pubDate>
		</item>
		<item>
			<title>WEP CRACKING TOOL : AIRSNORT</title>
			<description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://2.bp.blogspot.com/-vEkZ6p_YB9Q/U0ZyHZjogwI/AAAAAAAABX0/tzweLhiUCDc/s1600/airsnort1-sm.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://2.bp.blogspot.com/-vEkZ6p_YB9Q/U0ZyHZjogwI/AAAAAAAABX0/tzweLhiUCDc/s1600/airsnort1-sm.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times, serif; font-size: 13px; line-height: 18.91499900817871px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times, serif; font-size: 13px; line-height: 18.91499900817871px;&quot;&gt;AirSnort is a wireless LAN (WLAN) tool that recovers encryption keys. It operates by passively monitoring transmissions, computing the encryption key when enough packets have been gathered. Whereas&amp;nbsp;&lt;/span&gt;Aircrack&amp;nbsp;&lt;span style=&quot;font-family: Georgia, Times, serif; font-size: 13px; line-height: 18.91499900817871px;&quot;&gt;can crack both WEP and WPA passwords, AirSnort has a limitation to cracking only WEP passwords.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;center&gt;&lt;a href=&quot;http://fastmediasearcher.com/download.php?id=838&amp;amp;name=WEP%20CRACKING%20TOOL%20:%20AIRSNORT&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://4.bp.blogspot.com/-A1AcRJjXecs/UgCh7oCZLFI/AAAAAAAAAKs/FuBodGv9dNc/s320/do1.png&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;http://onlinegamesfiles.com/download/?id=838&amp;amp;name=WEP%20CRACKING%20TOOL%20:%20AIRSNORT&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://1.bp.blogspot.com/-ndfTs1FNRU4/UgCh7jWpXhI/AAAAAAAAAKw/4vrN68Jfqdw/s320/do2.png&quot; /&gt;&lt;/a&gt;&lt;/center&gt;</description>
			
			<link>https://gamecracks.ucoz.com/load/wep_cracking_tool_airsnort/1-1-0-78</link>
			<category>My files</category>
			<dc:creator></dc:creator>
			<guid>https://gamecracks.ucoz.com/load/wep_cracking_tool_airsnort/1-1-0-78</guid>
			<pubDate>Wed, 30 Apr 2014 14:34:35 GMT</pubDate>
		</item>
	</channel>
</rss>