Related Posts Plugin for WordPress, Blogger...

Blog Archive

Theme images by Storman. Powered by Blogger.

Thursday, January 1, 2015

All Shortcut Key Of Microsoft Windows XP Latest

- No comments

Windows XP All Shortcut Keys

In this post i am giving all the shortcut keys of Microsoft Windows XP. These shortcut keys are very helpful and time saving. I hope this tutorial will help you. :)

Windows XP Shortcut Keys :-

ALT + - (ALT+hyphen) Displays the Multiple Document Interface (MDI) child window's System menu ALT+ENTER View properties for the selected item

 ALT + ESC Cycle through items in order they were opened
ALT + F4 Close the active program or item
ALT + SPACE Display the System menu for the active window
ALT + TAB Switch between open items
ALT + Underlined Display the corresponding menu
BACKSPACE View the folder one level up in My Computer or Windows Explorer

 CTRL+A Select all
CTRL+I Italics
CTRL+O Open an item
CTRL+U Underline
CTRL+V Paste
CTRL+F4 Close the active document
CTRL while dragging Copy selected item
CTRL+SHIFT while dragging Create shortcut to selected iteM
CTRL+RIGHT ARROW Move the insertion point to the beginning of the next word

CTRL+LEFT ARROW Move the insertion point to the beginning of the previous word

CTRL+DOWN ARROW Move the insertion point to the beginning of the next paragraph

 CTRL+UP ARROW Move the insertion point to the beginning of the previous paragraph

 SHIFT+DELETE Delete selected item permanently without placing the item in the Recycle Bin 

ESC Cancel the current task
F1 Displays Help
F2 Rename selected item
F3 Search for a file or folder
F4 Displays the Address bar list in windows explorer
F5 Refresh the active window
F6 Cycle through screen elements in a window or on the desktop
F10 Activate the menu bar in the active program
SHIFT+F10 Display the shortcut menu for the selected item
CTRL+ESC Display the Start menu
SHIFT+CTRL+ESC Launches Task Manager
SHIFT when you insert a CD Prevent the CD from automatically playing

WIN Display or hide the Start menu
WIN+BREAK Display the System Properties dialog box
WIN+D Minimizes all Windows and shows the Desktop
WIN+E Open Windows Explorer
WIN+F Search for a file or folder
WIN+F+CTRL Search for computers
WIN+L Locks the desktop
WIN+M Minimize or restore all windows
WIN+R Open the Run dialog box
WIN+TAB Switch between open items

HIdden Run Commands

Hidden Bluetooth software in windowsXp:


Restoring a Lost Desktop:

Type a period " . "
Then press Enter

R You Playing Game In Ur pc?

Want To Do It Advance?

Try This Trick
GoTo - run - type > joy.cpl

If ur PC is hanged then do this:

Press shift+ctrl+esc
n den click on 'END TASK'
ur PC is runing now

Create folder without name:

>select any folder
>rename it
>press alt & type 0160

Amazing trick for use:

Windows Backup Utility if installed

go to run
type ntbackup
Now use backup

Disable CD Autorun

1) Windows Key + R and enter GPEDIT.MSC

2) Go to Computer Configuration, Administrative Templates, System.

3) Find the entry for Turn Autoplay off and modify it as you wish.

Remove the Recycle Bin from the Desktop

If you don't use the Recycle Bin to store deleted files , you can get rid of its desktop icon all together.

Run Regedit and go to:


Click on the "Recycle Bin" string in the right hand pane. Hit Del, click OK.

Hide 'User Accounts' from users
Go to Start/Run, and type:


Open the path

User Config > Admin Templates > Control Panel

Doubleclick "Hide specified Control Panel applets"

put a dot in 'enabled', then click 'Show"

click Add button,

type "nusrmgt.cpl" into the add box

Turn off Welcome screen

Open User Accounts in Control Panel.

Click Change the way users log on or off

Hope you enjoyed! If you like my work please share it.

Cracking WPA-WPA2 with Hashcat in Kali Linux (BruteForce MASK based attack on Wifi passwords) Full

- No comments
cudaHashcat or oclHashcat or Hashcat on Kali Linux got built-in capabilities to attack and decrypt or Cracking WPA2 WPA with Hashcat – handshake .cap files. Only constraint is, you need to convert a .cap file to a .hccap file format. This is rather easy.


Hashcat is the self-proclaimed world’s fastest CPU-based password recovery tool. It is available free of charge, although it has a proprietary codebase. Versions are available for Linux, OSX, and Windows and can come in CPU-based or GPU-based variants. Hashcat currently supports a large range of hashing algorithms, including: Microsoft LM Hashes, MD4, MD5, SHA-family, Unix Crypt formats, MySQL, Cisco PIX, and many others.
Hashcat has made its way into the news many times for the optimizations and flaws discovered by its creator, which become exploited in subsequent hashcat releases. (For example, the flaw in 1Password’s hashing scheme)

Attack types

Hashcat offers multiple attack modes for obtaining effective and complex coverage over a hash’s keyspace. These modes are:
  • Brute-Force attack
  • Combinator attack
  • Dictionary attack
  • Fingerprint attack
  • Hybrid attack
  • Mask attack
  • Permutation attack
  • Rule-based attack
  • Table-Lookup attack
  • Toggle-Case attack
The traditional bruteforce attack is considered outdated, and the Hashcat core team recommends the Mask-Attack as a full replacement.


Hashcat comes in two main variants:
  • Hashcat – A CPU-based password recovery tool
  • oclHashcat – A GPU-accelerated tool
Many of the algorithms supported by Hashcat can be cracked in a shorter time by using the well-documented GPU-acceleration leveraged in oclHashcat (such as MD5, SHA1, and others). However, not all algorithms can be accelerated by leveraging GPUs. Bcrypt is a good example of this. Due to factors such as data dependant branching, serialization, and Memory (to name just a few), oclHashcat is not a catchall replacement for Hashcat.
Hashcat is available for Linux, OSX and Windows. oclHashcat is only available for Linux and Windows due to improper implementations in OpenCL on OSX

Important Note: Many users try to capture with network cards that are not supported. You should purchase a card that supports Kali Linux including injection and monitor mode etc. A list can be found in 802.11 Recommended USB Wireless Cards for Kali Linux. It is very important that you have a supported card, otherwise you’ll be just wasting time and effort on something that just won’t do the job.

Why use Hashcat for cracking WPA WPA2 handshake file?

Pyrit is the fastest when it comes to cracking WPA2 WPA handshake files. So why are we using Hashcat to crack WPA2 WPA handshake files?
  1. Because we can?
  2. Because Hashcat allows us to use customized attacks with predefined rules and Masks.
Now this doesn’t explain much and reading HASHCAT Wiki will take forever to explain on how to do it. I’ll just give some examples to clear it up.
Hashcat allows you to use the following built-in charsets to attack a WPA2 WPA handshake file.

Download Now

 Built-in charsets

?l = abcdefghijklmnopqrstuvwxyz
?d = 0123456789
?s = !”#$%&'()*+,-./:;⇔?@[\]^_`{|}~

?a = ?l?u?d?s

Capture handshake with WiFite

Why WiFite instead of other guides that uses Aircrack-ng ? Because we don’t have to type in commands..
Type in the following command in your Kali Linux terminal:
root@kali:# wifite –wpa You could also type in
root@kali:#wifite wpa2 If you want to see everything, (wep, wpa or wpa2, just type the following command. It doesn’t make any differences except few more minutes
root@kali:#wifite Once you type in following is what you’ll see.

So, we can see bunch of Access Points (AP in short). Always try to go for the ones with CLIENTS because it’s just much faster. You can choose all or pick by numbers. See screen-shot below

Awesome, we’ve got few with clients attached. I will pick 1 and 2 cause they have the best signal strength. Try picking the ones with good signal strength. If you pick one with poor signal, you might be waiting a LONG time before you capture anything ... if anything at all.
So I’ve picked 1 and 2. Press Enter to let WiFite do it’s magic.

Once you press ENTER, following is what you will see. I got impatient as the number 1 choice wasn’t doing anything for a LONG time. So I pressed CTRL+C to quit out of it.
This is actually a great feature of WIfite. It now asks me,
What do you want to do?
  1. [c]ontinue attacking targets
  2. [e]xit completely.
I can type in c to continue or e to exit. This is the feature I was talking about. I typed c to continue. What it does, it skips choice 1 and starts attacking choice 2. This is a great feature cause not all routers or AP’s or targets will respond to an attack the similar way. You could of course wait and eventually get a respond, but if you’re just after ANY AP’s, it just saves time.

And voila, took it only few seconds to capture a handshake. This AP had lots of clients and I managed to capture a handshake.
This handshake was saved in /root/hs/BigPond_58-98-35-E9-2B-8D.cap file.
Once the capture is complete and there’s no more AP’s to attack, Wifite will just quit and you get your prompt back.

Now that we have a capture file with handshake on it, we can do a few things.

Cleanup your cap file using wpaclean

Next step will be converting the .cap file to a format cudaHashcat or oclHashcat or Hashcat on Kali Linux will understand.
Here’s how to do it:
To convert your .cap files manually in Kali Linux, use the following command
wpaclean <out.cap> <in.cap>
Please note that the wpaclean options are the wrong way round. <out.cap> <in.cap> instead of <in.cap> <out.cap> which may cause some confusion.
In my case, the command is as follows:
root@kali:#wpaclean hs/out.cap hs/BigPond_58-98-35-E9-2B-8D.cap

  Download Dictionary File Now

Convert .cap file to .hccap format

We need to convert this file to a format cudaHashcat or oclHashcat or Hashcat on Kali Linux can understand.
To convert it to .hccap format with “aircrack-ng” we need to use the -J option
root@kali:#aircrack-ng <out.cap> -J <out.hccap>
Note the -J is a capitol J not lower case j.
In my case, the command is as follows:
root@kali:#aircrack-ng hs/out.cap -J hs/out

Cracking WPA2 WPA handshake with Hashcat
cudaHashcat or oclHashcat or Hashcat on Kali Linux is very flexible, so I’ll cover two most common and basic scenarios:
  1. Dictionary attack
  2. Mask attack

  1. Dictionary attack

First we need to find out which mode to use for WPA2 WPA handshake file. I’ve covered this in great length in Cracking MD5, phpBB, MySQL and SHA1 passwords with Hashcat on Kali Linux guide. Here’s a short rundown:
root@kali#cudahashcat --help | grep WPA
So it’s 2500.
Now use the following command to start the cracking process:
root@kali#cudahashcat -m 2500 /root/hs/out.hccap /root/rockyou.txt

Bingo, I used a common password for this Wireless AP. Took me few seconds to crack it. Depending on your dictionary size, it might take a while.
You should remember, if you’re going to use Dictionary attack, Pyrit would be much much much faster than cudaHashcat or oclHashcat or Hashcat. Why we are showing this here? Cause we can. :)

2.  Brute-Force Attack

Now this is the main part of this guide. Using Brute Force MASK attack.
To crack WPA WPA2 handshake file using cudaHashcat or oclHashcat or Hashcat, use the following command:


root@kali#cudahashcat -m 2500 -a 3 capture.hccap ?d?d?d?d?d?d?d?d

Where -m = 2500 means we are attacking a WPA2 WPA handshake file.
-a = 3 means we are using Brute Force Attack mode (this is compatible with MASK attack).
capture.hccap = This is your converted .cap file. We generated it using wpaclean and aircrack-ng.
?d?d?d?d?d?d?d?d = This is your MASK where d = digit. That means this password is all in numbers. i.e. 7896435 or 12345678 etc.
I’ve created a special MASK file to make things faster. You should create your own MASK file in similar way I explained earlier. I’ve saved my file in the following directory as blackmoreops-1.hcmask.


Do the following to see all available default MASK files provided by cudaHashcat or oclHashcat or Hashcat:

root@kali#ls /usr/share/oclhashcat/masks/
In my case, the command is as follows:
root@kali#cudahashcat -m 2500 -a 3 /root/hs/out.hccap  /usr/share/oclhashcat/masks/blackmoreops-1.hcmask

Sample .hcmask file

You can check the content of a sample .hcmask file using the following command:
root@kali# tail -10 /usr/share/oclhashcat/masks/8char-1l-1u-1d-1s-compliant.hcmask

Edit this file to match your requirement, run Hashcat or cudaHashcat and let it rip.

Location of Cracked passwords

Hashcat or cudaHashcat saves all recovered passwords in a file. It will be in the same directory you’ve ran Hashcat or cudaHashcat or oclHashcat. In my case, I’ve ran all command from my home directory which is /root directory.


This guide explains a lot. But you should read Wiki and Manuals from to get a better understanding of MASK and Rule based attacks because that's the biggest strength of Hashcat.
Thanks for reading. Feel free to share this article.

How To Hack Facebook, Gmail, Skype And All Password Of A Person Full Tut

- No comments
Hack All Passwords Form A Computer Remotely
Last tutorial by me had a problem with E-Mail, So here is fully working tutorial. Wanna hack passwords of Facebook, Gmail, Orkut and other online and offline passwords of your friends, enemies, girlfriend, boyfriend or your Ex this is the perfect article for you. A keylogger is a program that runs in the background on someones computer that logs every key they press, and then sends the log of all the pressed keys to the attacker. This essentially allows you the ability to collect all the usernames and passwords typed in.

What do we need?

  1. Keylogger [Link Below]
  2. A new e-mail address specifically for keylogging

Note :- Watch every screenshot carefully to do everything correctly.


Method 1 

How To Create Keylogger?

  • Download the program, open it up and you should see the builder. Input your email username & password into the boxes. The reason we are doing this is because the keylogger will log into your email, then email yourself the logs. I recommend making a new email specifically for keylogging. Gmail SMTP Server Is :-

  • In delivery option choose E-Mail
  • This is the time in between the logs. I usually recommend 5-15 minutes.
  • At this point I suggest you click Test Email and make sure everything is working fine.
  • Click the Recovery Tab.
  • Check Enable Stealers

  • Now go to settings tab and check boxes I have checked [Only those boxes]

  • Now click on the Binder option
  • Add any exe to deliver it [It will combine itself with an exe and whenever one install the exe the keylogger will be installed automatically]

  • Now click Tools option and Enable Fake error message
  • Now add an icon to it

  • Now click on Build option
  • And then click Compile Server
  • Wait for a while
  • Done {A message will pop}
  • Enjoy!

Note:-  Now get your build file and send it to your victims and get all information out of their computer. Use some attractive methods to persuade them to use your keylogger and anyhow jut make them run it once.

Method 2

  • FTP server
  • Click on FTP option in the logger
  • Create a FTP server first to create click here and sign up and create a FTP server

  • Put your FTP address, username, and password

  • Now click on test
  • You will get this message

Hope you enjoyed this tutorial!

Download Keylogger

Downlaod Predator Keylogger


How To Earn Extra Money With Your Websites Or Blog [Guide] [UPDATED]

- No comments
Extra Earning With Your Websites

Guys if you are running your blog and website by uploading files and want to earn some extra money, now today I will share with you some of the real and genuine sites which are giving the user's money for more than a year and are trusted one. You can search on every format regarding these sites, you will come to at one point as these are real and trusted sites for earning  by uploading sites.
Also there are lot of sites which gives the money but these sites are one of the best while in case of withdraw your money and in other services. The sites with their maximum uploading files rates are listed below with brief explanation and signup methods. If you are running your sites with only 1000 viewers everyday, you can easily make more than 10$ by these sites, and there are no limits for earning

UserCloud is the best site which I ever saw and gives maximum revenue, as using it you can earn even 10$ in a day and good thing is that it's minimum withdraw is 5$, also other features of that site are :
  • Unlimited Storage
  • Unlimited Downloads
  • Unlimited Upload
  • Unlimited file size
  • Files Never Deleted
  • Remote URL upload
  • Download-Accelerators support
  • Downloads resume
  • Unlimited Download Speed
  • No downloads delay
  • No downloads captcha
  • FTP
  • No Advertisements
Accepted payout method is Paypal yet, but I have talked to admin of that site, and more payout method will be introduced in next years. So hurry up guys and register on this amazing site. Link has been provided above for the site info and registration.
Rapidgator is one of the best and trust worthy site which gives upto 40$ by uploading files on their site, also it has more than 2000 GB Free storage for your files. For earning from rapidgator, you just need to signup on this site and just upload your files and start your earnings with them today. The signup link is Here !
Withdraw notes : First you cannot get money at once, for this you will have to upload the files and then will get different rates on the basis of sizes of files, but you can earn maximum from them after signup and also it the good and reliable hosting site; by using this site, you can get cheap and better hosting for your site as well. Minimum withdraw is 15 USD. Accepted Payment method is webmoney.
Tusfiles is also best and trustworthy site for the earning by uploading, you can earn maxium 10 USD after 1000 uploaded files download, also they give the point on the basis of download. Use it and start making money, also they have user friendly and good staff which gives response quickly. To earn with tusfiles, just signup and start uploading the files and earn the maximum with them.
Withdraw notes : It gives the withdraw within 48 hours when you get the minimum amount of 10 USD. Accepted Payment methods are webmoney, payza, paypal, wire transformer, payoneer, perfect money, and amazon gift card.
Hugefiles is also a trusted and good service which gives money on uploading the different types of files and gives revenue after downloading these files. It gives maximum of 25 USD after downloading of 10000 files. The minimum withdraw amount for this hosting site is 15 USD. To earn signup link is given below
Withdraw notes : Accepted Payout methods are webmoney and paypal.
It’s also a trusted site which gives more than 25 USD on 1000 downloads of your uploading site w.r.t size of your files.
Withdraw notes : The minimum withdraw is 15 USD and accepted payout method is webmoney.
It’s also a good and newly designed upload hosting site which gives the maximum of 10 USD after 1000 downloads of your files.
Withdraw notes : The minimum withdraw is 10 USD and accepted payout method is paypal.

There are lot of sites for this purpose, but these are the genuine sites which are not fraud or any other spamming sites which have given money a lot of user’s. Also you can ask any question regarding the topic. Guys as I have used referral links, so it’s your choice to whether trust me or not.

Sonic Bat Virus Maker (Make Virus Easily) Latest

- No comments

Sonic Bat Virus Maker ( Creator )
A computer virus is a stealth program that is injected into your computer without your knowledge and runs against your wishes and frustrate you some time. Viruses can also replicate themselves. All computer viruses are man-made.A virus can replicates itself by being copied or initiating its copy to another program, computer boot sector or files,etc.Some viruses are also used to get useful
information of users like credit card details,email-id passwords,etc.
Sonic Bat Virus Maker is a small tool which is made to generate the batch files codes for reboot,formatting,disabling regedit,etc on a single click.This tools combines all the batch file codes as per the user which can perform different task in a single batch file name as sonic.bat.


  • Change Time.
  • Change Log On Password.
  • Add Any Number Of New User.
  • Disable Mouse.
  • Disable Keyboard.
  • Fork Bomb.
  • Delete/Format System drive(C:).
  • Drive Rename.
  • Folder Flood(Desktop,Music,Picture,Root,Doc,System32,Windows,Programs)
  • Swap Mouse Button.
  • Print Alert Message
  • Message Execution Timer.
  • Shutdown With Option(Reboot,Log Off,Shutdown and Abort).
  • Run On Startup.

How To Use ?
  1. Choose Your Virus Type.
  2. Click on add Code.
  3. Click on Build
  4. Choose save location.
  5. Done ! your virus is ready to harm victim's PC.

Warning :- 

  • Never test on your personal computer, it could be harmfully affect your  PC.  

Direct Download Link

Sonic Bat Virus Creator Download 


All Run Commands For Windows 8

- No comments
Run Commands for Windows 8
As we know that Windows 8 is the latest version of Windows Operating System. Do you remember that we used RUN Commands in Windows XP on those days. But now the RUN option is hidden from Windows System. Anyway you can open 'RUN' window by pressing 'Windows Key + R '. In this post today, I will give you some RUN Commands which can be used in Windows 8. But some of them still can be used in Windows Xp and Windows 7.

Program Name
Run Command
About Windows
Add a Device
Add Features to Windows 8
Add Hardware Wizard
Advanced Startup Options
Advanced User Accounts
Authorization Manager
Backup and Restore
Bluetooth File Transfer
Buy a Product Key Online
Change Computer Performance Settings
Change Data Execution Prevention Settings
Change Printer Settings
Character Map
ClearType Tuner
Color Management
Command Prompt
Component Services
Component Services
Computer Management
Computer Management
Connect to a Network Projector
Connect to a Projector
Control Panel
Create A Shared Folder Wizard
Create a System Repair Disc
Credential Backup and Restore Wizard
Data Execution Prevention
Default Location
Device Manager
Device Pairing Wizard
Diagnostics Troubleshooting Wizard
Digitizer Calibration Tool
DirectAcesss Properties
DirectX Diagnostic Tool
Disk Cleanup
Disk Defragmenter
Disk Management
Display Color Calibration
Display Switch
DPAPI Key Migration Wizard
Driver Verifier Manager
Ease of Access Center
Encrypting File System Wizard
Event Viewer
Fax Cover Page Editor
File History
File Signature Verification
Flash Player Settings Manager
Font Viewer
IExpress Wizard
Import to Windows Contacts
Install or Uninstall Display Languages
Internet Explorer
iSCSI Initiator Configuration Tool
iSCSI Initiator Properties
Language Pack Installer
Local Group Policy Editor
Local Security Policy
Local Users and Groups
Location Activity
Malicious Software Removal Tool
Manage Your File Encryption Certificates
Math Input Panel
Microsoft Management Console
Microsoft Support Diagnostic Tool
NAP Client Configuration
New Scan Wizard
ODBC Data Source Administrator
ODBC Driver Configuration
On-Screen Keyboard
Performance Monitor
Performance Options
Phone Dialer
Presentation Settings
Print Management
Printer Migration
Printer User Interface
Private Character Editor
Protected Content Migration
Recovery Drive
Refresh Your PC
Registry Editor
Remote Access Phonebook
Remote Desktop Connection
Resource Monitor
perfmon /res
Resultant Set of Policy
Securing the Windows Account Database
Set Program Access and Computer Defaults
Share Creation Wizard
Shared Folders
Snipping Tool
Sound Recorder
SQL Server Client Network Utility
Steps Recorder
Sticky Notes
Stored User Names and Passwords
Sync Center
System Configuration
System Configuration Editor
System Information
System Properties (Advanced Tab)
System Properties (Computer Name Tab)
System Properties (Hardware Tab)
System Properties (Remote Tab)
System Properties (System Protection Tab)
System Restore
Task Manager
Task Manager
Task Scheduler
Touch Keyboard and Handwriting Panel
Trusted Platform Module (TPM) Management
User Account Control Settings
Utility Manager
Version Reporter Applet
Volume Mixer
Windows Activation Client
Windows Anytime Upgrade Results
Windows Contacts
Windows Disc Image Burning Tool
Windows Easy Transfer
Windows Explorer
Windows Fax and Scan
Windows Features
Windows Firewall with Advanced Security
Windows Help and Support
Windows Journal
Windows Media Player
Windows Memory Diagnostic Scheduler
Windows Mobility Center
Windows Picture Acquisition Wizard
Windows PowerShell
Windows PowerShell ISE
Windows Remote Assistance
Windows Repair Disc
Windows Script Host
Windows SmartScreen
Windows Store Cach Clear
Windows Update
Windows Update Standalone Installer
WMI Management
WMI Tester
XPS Viewer
Related Posts Plugin for WordPress, Blogger...