Hacking... 100%
โโโโโโโโโHACKEDโโโโโโโโโโโ
Top 10 most famous hackers
1. Kevin Mitnick
Probably the most famous hacker of his generation,
Mitnick has been described by the US Department of Justice as 'the most wanted computer criminal in United States history.
The self-styled 'hacker poster boy' allegedly hacked into the computer systems of some of the world's top technology and telecommunications companies including Nokia, Fujitsu and Motorola.
After a highly publicised pursuit by the FBI, Mitnick was arrested in 1995 and after confessing to several charges as part of a plea-bargain agreement, he served a five year prison sentence.
He was released on parole in 2000 and today runs a computer security consultancy.
He didn't refer to his hacking activities as 'hacking' and instead called them 'social engineering'.
2. Kevin Poulson
Poulson first gained notoriety by hacking into the phone lines of Los Angeles radio station KIIS-FM,
Ensuring he would be the 102nd caller and thus the winner of a competition the station was running in which the prize was a Porsche.
Under the hacker alias Dark Dante, he also reactivated old Yellow Page escort telephone numbers for an acquaintance that then ran a virtual escort agency.
The authorities began pursuing Poulson in earnest after he hacked into a federal investigation database.
Poulson even appeared on the US television Unsolved Mysteries as a fugitive โ although all the 1-800 phone lines for the program mysteriously crashed.
Since his release from prison, Poulson has reinvented himself as a journalist.
3. Adrian Lamo
Adrian Lamo was named 'the homeless hacker' for his penchant for using coffee shops,
Libraries and internet cafรฉs as his bases for hacking.
Most of his illicit activities involved breaking into computer networks and then reporting on their vulnerabilities to the companies that owned them.
Lamo's biggest claim to fame came when he broke into the intranet of the New York Times and added his name to their database of experts.
He also used the paper's LexisNexis account to gain access to the confidential details of high-profile subjects.
Lamo currently works as a journalist.
4. Stephen Wozniak
Famous for being the co-founder of Apple, Stephen 'Woz' Wozniak began his 'white-hat' hacking career with 'phone phreaking' โ slang for bypassing the phone system.
While studying at the University of California he made devices for his friends called 'blue boxes' that allowed them to make free long distance phone calls.
Wozniak allegedly used one such device to call the Pope.
He later dropped out of university after he began work on an idea for a computer.
He formed Apple Computer with his friend Steve Jobs and the rest, as they say, is history.
5. Loyd Blankenship
Also known as The Mentor, Blankenship was a member of a couple of hacker elite groups in the 1980s โ notably the Legion Of Doom,
Who battled for supremacy online against the Masters Of Deception.
However, his biggest claim to fame is that he is the author of the Hacker Manifesto (The Conscience of a Hacker),
Which he wrote after he was arrested in 1986.
The Manifesto states that a hacker's only crime is curiosity and is looked at as not only a moral guide by hackers up to today,
But also a cornerstone of hacker philosophy.
It was reprinted in Phrack magazine and even made its way into the 1995 film Hackers, which starred Angelina Jolie
6. Michael Calce
Calce gained notoriety when he was just 15 years old by hacking into some of the largest commercial websites in the world.
On Valentine's Day in 2000, using the hacker alias MafiaBoy,
Calce launched a series of denial-of-service attacks across 75 computers in 52 networks, which affected sites such as eBay, Amazon and Yahoo.
He was arrested after he was noticed boasting about his hack in online chat rooms.
He was received a sentence of eight months of 'open custody,' one year of probation, restricted use of the internet, and a small fine.
7. Robert Tappan Morris
In November of 1988 a computer virus,which was later traced to Cornell University,infected around 6,000 major Unix
1. Kevin Mitnick
Probably the most famous hacker of his generation,
Mitnick has been described by the US Department of Justice as 'the most wanted computer criminal in United States history.
The self-styled 'hacker poster boy' allegedly hacked into the computer systems of some of the world's top technology and telecommunications companies including Nokia, Fujitsu and Motorola.
After a highly publicised pursuit by the FBI, Mitnick was arrested in 1995 and after confessing to several charges as part of a plea-bargain agreement, he served a five year prison sentence.
He was released on parole in 2000 and today runs a computer security consultancy.
He didn't refer to his hacking activities as 'hacking' and instead called them 'social engineering'.
2. Kevin Poulson
Poulson first gained notoriety by hacking into the phone lines of Los Angeles radio station KIIS-FM,
Ensuring he would be the 102nd caller and thus the winner of a competition the station was running in which the prize was a Porsche.
Under the hacker alias Dark Dante, he also reactivated old Yellow Page escort telephone numbers for an acquaintance that then ran a virtual escort agency.
The authorities began pursuing Poulson in earnest after he hacked into a federal investigation database.
Poulson even appeared on the US television Unsolved Mysteries as a fugitive โ although all the 1-800 phone lines for the program mysteriously crashed.
Since his release from prison, Poulson has reinvented himself as a journalist.
3. Adrian Lamo
Adrian Lamo was named 'the homeless hacker' for his penchant for using coffee shops,
Libraries and internet cafรฉs as his bases for hacking.
Most of his illicit activities involved breaking into computer networks and then reporting on their vulnerabilities to the companies that owned them.
Lamo's biggest claim to fame came when he broke into the intranet of the New York Times and added his name to their database of experts.
He also used the paper's LexisNexis account to gain access to the confidential details of high-profile subjects.
Lamo currently works as a journalist.
4. Stephen Wozniak
Famous for being the co-founder of Apple, Stephen 'Woz' Wozniak began his 'white-hat' hacking career with 'phone phreaking' โ slang for bypassing the phone system.
While studying at the University of California he made devices for his friends called 'blue boxes' that allowed them to make free long distance phone calls.
Wozniak allegedly used one such device to call the Pope.
He later dropped out of university after he began work on an idea for a computer.
He formed Apple Computer with his friend Steve Jobs and the rest, as they say, is history.
5. Loyd Blankenship
Also known as The Mentor, Blankenship was a member of a couple of hacker elite groups in the 1980s โ notably the Legion Of Doom,
Who battled for supremacy online against the Masters Of Deception.
However, his biggest claim to fame is that he is the author of the Hacker Manifesto (The Conscience of a Hacker),
Which he wrote after he was arrested in 1986.
The Manifesto states that a hacker's only crime is curiosity and is looked at as not only a moral guide by hackers up to today,
But also a cornerstone of hacker philosophy.
It was reprinted in Phrack magazine and even made its way into the 1995 film Hackers, which starred Angelina Jolie
6. Michael Calce
Calce gained notoriety when he was just 15 years old by hacking into some of the largest commercial websites in the world.
On Valentine's Day in 2000, using the hacker alias MafiaBoy,
Calce launched a series of denial-of-service attacks across 75 computers in 52 networks, which affected sites such as eBay, Amazon and Yahoo.
He was arrested after he was noticed boasting about his hack in online chat rooms.
He was received a sentence of eight months of 'open custody,' one year of probation, restricted use of the internet, and a small fine.
7. Robert Tappan Morris
In November of 1988 a computer virus,which was later traced to Cornell University,infected around 6,000 major Unix
machines,
Slowing them down to the point of being unusable and causing millions of dollars in damage.
Whether this virus was the first of its type is debatable.
What is public record, however, is that its creator, Robert Tappan Morris, became the first person to be convicted under the Computer Fraud and Abuse Act.
Morris said his 'worm' virus wasn't intended to damage anything and was instead released to gauge the size of the internet.
This assertion didn't help him, however, and he was sentenced to three years probation, 4000 hours of community service and a hefty fine.
A computer disk containing the source code for the Morris Worm remains on display at the Boston Museum of Science to this day.
8. The Masters Of Deception
The Masters Of Deception (MoD) were a New York-based group of elite hackers who targeted US phone systems in the mid to late 80s.
A splinter group from the Legion Of Doom (LoD), they became a target for the authorities after they broke into AT&T's computer system.
The group was eventually brought to heel in 1992 with many of its members receiving jail or suspended sentences.
9. David L. Smith
Smith is the author of the notorious Melissa worm virus,
Which was the first successful email-aware virus distributed in the Usenet discussion group alt. sex.
The virus original form was sent via email. Smith was arrested and later sentenced to jail for causing over $80 million worth of damage.
10. Sven Jaschan
Jaschan was found guilty of writing the Netsky and Sasser worms in 2004 while he was still a teenager.
The viruses were found to be responsible for 70 per cent of all the malware seen spreading over the internet at the time.
Jaschan received a suspended sentence and three years probation for his crimes. He was also hired by a security company.
_____________________
Copy with credit
@programingandhacking
Slowing them down to the point of being unusable and causing millions of dollars in damage.
Whether this virus was the first of its type is debatable.
What is public record, however, is that its creator, Robert Tappan Morris, became the first person to be convicted under the Computer Fraud and Abuse Act.
Morris said his 'worm' virus wasn't intended to damage anything and was instead released to gauge the size of the internet.
This assertion didn't help him, however, and he was sentenced to three years probation, 4000 hours of community service and a hefty fine.
A computer disk containing the source code for the Morris Worm remains on display at the Boston Museum of Science to this day.
8. The Masters Of Deception
The Masters Of Deception (MoD) were a New York-based group of elite hackers who targeted US phone systems in the mid to late 80s.
A splinter group from the Legion Of Doom (LoD), they became a target for the authorities after they broke into AT&T's computer system.
The group was eventually brought to heel in 1992 with many of its members receiving jail or suspended sentences.
9. David L. Smith
Smith is the author of the notorious Melissa worm virus,
Which was the first successful email-aware virus distributed in the Usenet discussion group alt. sex.
The virus original form was sent via email. Smith was arrested and later sentenced to jail for causing over $80 million worth of damage.
10. Sven Jaschan
Jaschan was found guilty of writing the Netsky and Sasser worms in 2004 while he was still a teenager.
The viruses were found to be responsible for 70 per cent of all the malware seen spreading over the internet at the time.
Jaschan received a suspended sentence and three years probation for his crimes. He was also hired by a security company.
_____________________
Copy with credit
@programingandhacking
Basic termux commands
cd . .
Change current directory to parent directory.
cd -
Move one directory back from where you are now
cp-r
Used to copy any directory [including hidden files]
cp -f
Force copy by removing the destination files if needed
mv -f
Force move by overwriting destination files without prompt
mv -v
To move any directory
mv [file1 name] [new file2 name]
to rename files file1 renames to file2
Is
List current folder contents
is -l
To show files/directory size,modified,date,time,owner of file,permissions
ls -a
List of all files including hidden files
ls -R
It shows recursively list of sub-directories
cat[file]
To display file information
nano [file]
To display and edit files
wget
This command used to download any file from online source like github
git clone [github url]
Used to clone any repository form github.
rm [file]
Used to remove/delete any files
clear
To clear all the task on a terminal; means clear terminal
uname -m
Used to find the architecture of your device.
Copy with credit
@programingandhacking
cd . .
Change current directory to parent directory.
cd -
Move one directory back from where you are now
cp-r
Used to copy any directory [including hidden files]
cp -f
Force copy by removing the destination files if needed
mv -f
Force move by overwriting destination files without prompt
mv -v
To move any directory
mv [file1 name] [new file2 name]
to rename files file1 renames to file2
Is
List current folder contents
is -l
To show files/directory size,modified,date,time,owner of file,permissions
ls -a
List of all files including hidden files
ls -R
It shows recursively list of sub-directories
cat[file]
To display file information
nano [file]
To display and edit files
wget
This command used to download any file from online source like github
git clone [github url]
Used to clone any repository form github.
rm [file]
Used to remove/delete any files
clear
To clear all the task on a terminal; means clear terminal
uname -m
Used to find the architecture of your device.
Copy with credit
@programingandhacking
Advanced termux commands ๐๐๐
du
Display directory space usage
df
Display disk usage
cal
To display calender
whoami
It shows your login name
uname -a
Used to display kernal information
date
It shows current date and time
uptime
This command shows system current uptime
cat /proc/meminfo
It shows memory information
cat /proc/cpuinfo
It shows cpu information
cat /proc/version
It shows information about Linux System
free
Display memory swape usage
kill [PID]
kill process by pid [Proces ID]
ps
It shows all running process on your system
du
Display directory space usage
df
Display disk usage
cal
To display calender
whoami
It shows your login name
uname -a
Used to display kernal information
date
It shows current date and time
uptime
This command shows system current uptime
cat /proc/meminfo
It shows memory information
cat /proc/cpuinfo
It shows cpu information
cat /proc/version
It shows information about Linux System
free
Display memory swape usage
kill [PID]
kill process by pid [Proces ID]
ps
It shows all running process on your system
METASPLOIT FRAMEWORK
If you wish to install the metasploit-framework all by itself
You can use a shell script to install it.
remember dont turn off your internet connection
follow these steps :
1. uninstall termux app
2. Newly install Termux app
3. open Termux app
4. run these commands
$ apt update
$ apt upgrade
$ apt install wget
5. clone metasploit with this command
$ wget https://Auxilus.github.io/metasploit.sh
$ bash metasploit.sh
This script will install the latest version of metasploit-framework.
script also include some extras to make updating metasploit faster.
If all goes well, i.e. No red colored warnings,
you can start metasploit using ./msfconsole.
Now take a coffe and sit down and wait 15-20 minutes
to install metasploit in termux
after installation type this command :
$ cd metasploit-framework
Now run msfconsole
$ ./msfconsole
Enjoy metasploit....
Copy with credit
@programingandhacking
If you wish to install the metasploit-framework all by itself
You can use a shell script to install it.
remember dont turn off your internet connection
follow these steps :
1. uninstall termux app
2. Newly install Termux app
3. open Termux app
4. run these commands
$ apt update
$ apt upgrade
$ apt install wget
5. clone metasploit with this command
$ wget https://Auxilus.github.io/metasploit.sh
$ bash metasploit.sh
This script will install the latest version of metasploit-framework.
script also include some extras to make updating metasploit faster.
If all goes well, i.e. No red colored warnings,
you can start metasploit using ./msfconsole.
Now take a coffe and sit down and wait 15-20 minutes
to install metasploit in termux
after installation type this command :
$ cd metasploit-framework
Now run msfconsole
$ ./msfconsole
Enjoy metasploit....
Copy with credit
@programingandhacking
Forwarded from 1137439312:AAGumjHJ7pzA6vrrfVMlKoqTUsCs59GySrg
แฐแแ๐ แตแแแ แแแ
แญแแแแ๐ค? แจ #technology แแญ แ แฅแฎ แแแต แญแแแแ? แฆแ
!๐ แแแ แฅแแณแณแตแก๐ แญแ แ แฒแต แจแฐแจแแฐ แปแแ แแญแถ แ แชแ แ แชแ๐ค แจ #tech แแญ แแจแแแฝแ แแณแแฐ แซแฐแญแณแแข แจแแฑแ ๐
How to install Kali in android ๐ช
First download Termux on playstore
Copy the following
pkg install wget openssl-tool proot tar -y && hash -r && wget https://raw.githubusercontent.com/Techriz/AndronixOrigin/master/Installer/Kali/kali.sh && bash kali.sh
And paste in Termux
Next
Copy the following
apt install wget && wget https://raw.githubusercontent.com/Techriz/AndronixOrigin/master/APT/XFCE4/xfce4_de.sh && bash xfce4_de.sh
And paste in Termux
All done now you have kali in your phone.
:- Annoymouszone ๐
First download Termux on playstore
Copy the following
pkg install wget openssl-tool proot tar -y && hash -r && wget https://raw.githubusercontent.com/Techriz/AndronixOrigin/master/Installer/Kali/kali.sh && bash kali.sh
And paste in Termux
Next
Copy the following
apt install wget && wget https://raw.githubusercontent.com/Techriz/AndronixOrigin/master/APT/XFCE4/xfce4_de.sh && bash xfce4_de.sh
And paste in Termux
All done now you have kali in your phone.
:- Annoymouszone ๐
โ
(rooting /jailbreak) แแ แแแต แแโ
๐ แ แแตแ แตแแญ, แณแฅ, แแญแแ แแ แฒแซแญแตแ #แฉแต แแตแจแ แแแต แซแ device แจแซแแแแ แแฅแฅแญ แแ แแตแจแ แแแต แแแข
โ แแ แฅแ แ แ แแ ?
โ๏ธ แ แแตแ แตแแญ #แฉแต แตแแฐแญแ แตแแฉแ แจแฐแซแ company แแฅแ แจแฐแ แ แแแแแ แจแ แ แแแ แแฐแฅ แ แแแ แตแแฉ แ แฅแแฐแแแแ แแ แแ แฅแแฝแแแแข
โ๏ธ แซแแแแ แฅแแฒแซแ แจแแญแแ แณแธแแ apps access แแตแจแ แฅแแฝแแแ แข
โ๏ธ แตแแฉแ แตแแแแ แฐแญแแ แจแแแกแตแ แฒแตแฐแ แ แแฝ แแฅแแต แฅแแฝแแแแข
โ แแณแฑแตโ
๐ แตแแฉแ แจแฐแซแ แซแแแ แแ แฅแตแซแฐแจแแแ แตแจแต แตแแตแแฉ security แแตแฐแแแ แจแแแ
แญแ แแแต แตแแฉ แ แซแญแจแต แจแแ แแต แฅแตแ แจแฐแ แแแข
โ ๏ธ แจแขแตแฎแตแซ แแช แแแแฝแ
แ แฅแแแน แแแซแต แตแแญแแตแ แฉแต แแตแจแแ แขแแ แฑแ แ แ แแณแแต แแแซแต แ แแแแ แซแตแ แญแแแข
โ ๏ธแตแแญแแต แ แฐแแญ แแญแฎแ แตแแญ แจแแ แฉแต แฃแซแฐแญแ แญแแจแฃแแข
แฉแต แแตแจแ แ แตแแแ แขแแ แฅแแณแ แถแ unroot แแตแจแ แญแแจแฃแ::
Credit mister died man the unknown hat or yothor
๐ แ แแตแ แตแแญ, แณแฅ, แแญแแ แแ แฒแซแญแตแ #แฉแต แแตแจแ แแแต แซแ device แจแซแแแแ แแฅแฅแญ แแ แแตแจแ แแแต แแแข
โ แแ แฅแ แ แ แแ ?
โ๏ธ แ แแตแ แตแแญ #แฉแต แตแแฐแญแ แตแแฉแ แจแฐแซแ company แแฅแ แจแฐแ แ แแแแแ แจแ แ แแแ แแฐแฅ แ แแแ แตแแฉ แ แฅแแฐแแแแ แแ แแ แฅแแฝแแแแข
โ๏ธ แซแแแแ แฅแแฒแซแ แจแแญแแ แณแธแแ apps access แแตแจแ แฅแแฝแแแ แข
โ๏ธ แตแแฉแ แตแแแแ แฐแญแแ แจแแแกแตแ แฒแตแฐแ แ แแฝ แแฅแแต แฅแแฝแแแแข
โ แแณแฑแตโ
๐ แตแแฉแ แจแฐแซแ แซแแแ แแ แฅแตแซแฐแจแแแ แตแจแต แตแแตแแฉ security แแตแฐแแแ แจแแแ
แญแ แแแต แตแแฉ แ แซแญแจแต แจแแ แแต แฅแตแ แจแฐแ แแแข
โ ๏ธ แจแขแตแฎแตแซ แแช แแแแฝแ
แ แฅแแแน แแแซแต แตแแญแแตแ แฉแต แแตแจแแ แขแแ แฑแ แ แ แแณแแต แแแซแต แ แแแแ แซแตแ แญแแแข
โ ๏ธแตแแญแแต แ แฐแแญ แแญแฎแ แตแแญ แจแแ แฉแต แฃแซแฐแญแ แญแแจแฃแแข
แฉแต แแตแจแ แ แตแแแ แขแแ แฅแแณแ แถแ unroot แแตแจแ แญแแจแฃแ::
Credit mister died man the unknown hat or yothor
โ ๏ธ Dark Web Forum Links
แฅแแ แแจแ แแญ แตแ แแแ แฅแ แฆแญ แแณแชแซแแฝ แจแแแแฝแแตแ แฅแซแ แฅแตแ แญแ แแแต แณแแแแฝแ!
๐บTor Chan
http://zw3crggtadila2sg.onion/imageboard/
๐บ แตแ แฅแ แแแญ แแแซแซ แแ แตแ Markets, Drugs, Hackings, Revolustion, Downloads, Hidden Services แฅแ แฅแ แฅแ
โ ๏ธNote : แฅแแ แแแซแซ แแจแ แแญ แตแตแแก แฝแแญ แแซแแฅแแฝแ แญแฝแแ! Login แ แแณแฐแญแ แแ.
แจแแจแ Default Username or password is torchan2, torchan2.
๐บAnonymous Forum
http://rhe4faeuhjs4ldc5.onion/
๐บแ แแฐ แแแช แแญแแ Pro แ แแซแ White Hat / black hat แแจแญ แแแญ แจแแ แจแจแ แฐแ แ แฅแซแ แฅแ แแจแ แแญ แฅแณแแญแฅ แแแต แณแแแแ ! (แ แฐแแ แแจแฎแฝ แซแแ แต แแจแ)
๐บAnonyweb
http://anonywebix6vi6gz.onion/
๐บแจแแแแ แ แฅแซแ แฅแตแ แญแ แแแต แณแแแแ
แ แ แญแญ แแ แแจแญ แแแแ แจแแตแแแ แฅแแ แปแแ แแญ แ แฐแฅ แแแญแ แแ แจแ แตแฝแแแฝแ๐๐๐
@programming_and_hacking
แฅแแ แแจแ แแญ แตแ แแแ แฅแ แฆแญ แแณแชแซแแฝ แจแแแแฝแแตแ แฅแซแ แฅแตแ แญแ แแแต แณแแแแฝแ!
๐บTor Chan
http://zw3crggtadila2sg.onion/imageboard/
๐บ แตแ แฅแ แแแญ แแแซแซ แแ แตแ Markets, Drugs, Hackings, Revolustion, Downloads, Hidden Services แฅแ แฅแ แฅแ
โ ๏ธNote : แฅแแ แแแซแซ แแจแ แแญ แตแตแแก แฝแแญ แแซแแฅแแฝแ แญแฝแแ! Login แ แแณแฐแญแ แแ.
แจแแจแ Default Username or password is torchan2, torchan2.
๐บAnonymous Forum
http://rhe4faeuhjs4ldc5.onion/
๐บแ แแฐ แแแช แแญแแ Pro แ แแซแ White Hat / black hat แแจแญ แแแญ แจแแ แจแจแ แฐแ แ แฅแซแ แฅแ แแจแ แแญ แฅแณแแญแฅ แแแต แณแแแแ ! (แ แฐแแ แแจแฎแฝ แซแแ แต แแจแ)
๐บAnonyweb
http://anonywebix6vi6gz.onion/
๐บแจแแแแ แ แฅแซแ แฅแตแ แญแ แแแต แณแแแแ
แ แ แญแญ แแ แแจแญ แแแแ แจแแตแแแ แฅแแ แปแแ แแญ แ แฐแฅ แแแญแ แแ แจแ แตแฝแแแฝแ๐๐๐
@programming_and_hacking
แฅแแดแต แจ แแแแแแ windows computer administrator password แแแ แฅแแฝแแแ?
Requirements:
โ> แแแแแ แจwindows operating system แจแฐแซแแ แต cd แแญแ usb
Eg. Windows7 os or windows 8 os
Letโs beginโฆโฆโฆ..
โ> computrแฉแ แจ cd แแญแ แจusb แแตแแณแต(boot from cd or usb)
โ> แแญ boot แ แญแ แจแฐแแณ แ แแ shift+F10 แแซแ แจแ command promote แญแจแแณแ
แแแแฃแต command promote แซแแจแแฐ shift+fn+F10 แแญแฉแต
โ> Type โcd c:โ without quotation then hit enter
โ>Type โdirโ hit enter
--> Windows แจแแแ แแญแแญ แฅแตแจแแแฃ แตแจแต แแฐแแ แฅแจแแซแจแฉ แแแจแญ
Eg. โD:โ hit enter then โdirโ hit enter then check โwindowsโ
โE:โ hit enter then โdirโ hit enter then check โwindowsโ
โ> แจแ แ แตแฅแ แแญ แจแแณแจแแ แ แตแญแญแ แญแปแ
โ> โcd windows/system32โ hit enter
--> Type โrename osk.exe osk.oldโ hit enter
โ> Type โrename cmd.exe osk.exeโ hit enter
--> แ แแ 75% แแแแแ แตแซ แจแญแฐแแ แจแ แแฅแ computerun restart แแตแจแ
โ> แจแตแญ แ แแซ แ แฉแ แจแแณแจแแ icon แแซแ
โ>On-Screen Keyboard แจแแแแ แแแจแฅ
-->command promote display แฒแแ แตแฅแ แแญ แซแแแ command แแตแแฃแต
โ> Type โnet userโ hit enter
โ> Type โnet user help *โ hit enter โ---- help แแแต แจ computeru แตแ แแ
-->แจแ แแตแแแแตแ password แแตแแฃแต
โ> Password แฅแแตแญแแจแ แจแแแแน แฐแ hit enter แแแด
--> แ แแ Passwordu แฐแจแญแฏแ แแแต แแ
โ> แจแจแจแซแบแแตแ Password แ แตแแฅแณแน login แแจแ
โฆโฆโฆโฆโฆโฆแ แแฐแแแแ แฅแซแ แซแแน แจแตแญ แฃแแ link text แ แญแแแ
Telegramโฆโฆโฆโฆโฆโฆ..@solok40
Requirements:
โ> แแแแแ แจwindows operating system แจแฐแซแแ แต cd แแญแ usb
Eg. Windows7 os or windows 8 os
Letโs beginโฆโฆโฆ..
โ> computrแฉแ แจ cd แแญแ แจusb แแตแแณแต(boot from cd or usb)
โ> แแญ boot แ แญแ แจแฐแแณ แ แแ shift+F10 แแซแ แจแ command promote แญแจแแณแ
แแแแฃแต command promote แซแแจแแฐ shift+fn+F10 แแญแฉแต
โ> Type โcd c:โ without quotation then hit enter
โ>Type โdirโ hit enter
--> Windows แจแแแ แแญแแญ แฅแตแจแแแฃ แตแจแต แแฐแแ แฅแจแแซแจแฉ แแแจแญ
Eg. โD:โ hit enter then โdirโ hit enter then check โwindowsโ
โE:โ hit enter then โdirโ hit enter then check โwindowsโ
โ> แจแ แ แตแฅแ แแญ แจแแณแจแแ แ แตแญแญแ แญแปแ
โ> โcd windows/system32โ hit enter
--> Type โrename osk.exe osk.oldโ hit enter
โ> Type โrename cmd.exe osk.exeโ hit enter
--> แ แแ 75% แแแแแ แตแซ แจแญแฐแแ แจแ แแฅแ computerun restart แแตแจแ
โ> แจแตแญ แ แแซ แ แฉแ แจแแณแจแแ icon แแซแ
โ>On-Screen Keyboard แจแแแแ แแแจแฅ
-->command promote display แฒแแ แตแฅแ แแญ แซแแแ command แแตแแฃแต
โ> Type โnet userโ hit enter
โ> Type โnet user help *โ hit enter โ---- help แแแต แจ computeru แตแ แแ
-->แจแ แแตแแแแตแ password แแตแแฃแต
โ> Password แฅแแตแญแแจแ แจแแแแน แฐแ hit enter แแแด
--> แ แแ Passwordu แฐแจแญแฏแ แแแต แแ
โ> แจแจแจแซแบแแตแ Password แ แตแแฅแณแน login แแจแ
โฆโฆโฆโฆโฆโฆแ แแฐแแแแ แฅแซแ แซแแน แจแตแญ แฃแแ link text แ แญแแแ
Telegramโฆโฆโฆโฆโฆโฆ..@solok40
๐ฐ Spotify Account Giveaway ๐ฐ
8th person to send this code will win
Code:
Send the code to @Anand_g_bot
Note: Send the code as it is
Giveaway by @Anand_g_bot
Spam=Ban
Sending more than 1 time code=Disqualify
If u want this type of giveaway in your channel contact @Anand_Ka_Bot !!
8th person to send this code will win
Code:
Secret
( Tap to Copy )Send the code to @Anand_g_bot
Note: Send the code as it is
Giveaway by @Anand_g_bot
Spam=Ban
Sending more than 1 time code=Disqualify
If u want this type of giveaway in your channel contact @Anand_Ka_Bot !!
๐ฐ MICROSOFT OFFICE 365 ๐ฐ
๐ All accounts are working and fresh. We will never give Not working Accounts
โ If these accounts have guard then sorry we can't help.
==========================
โญ๏ธ Link to Accounts :
๐ Link: https://www.up-4ever.org/3busl8rkoxbu
==========================
โ Don't change the password else account will stop soon
โโโโโโโโโโโโ
ENJOY โค๏ธ๐
๐ All accounts are working and fresh. We will never give Not working Accounts
โ If these accounts have guard then sorry we can't help.
==========================
โญ๏ธ Link to Accounts :
๐ Link: https://www.up-4ever.org/3busl8rkoxbu
==========================
โ Don't change the password else account will stop soon
โโโโโโโโโโโโ
ENJOY โค๏ธ๐
Upload-4Ever
Download
Download File
๐ฐ HOTSPOT SHIELD VPN ๐ฐ
๐ All accounts are working and fresh. We will never give Not working Accounts
โ If these accounts have guard then sorry we can't help.
==========================
โญ๏ธ Link to Accounts :
๐ Link: https://www.up-4ever.org/n0lw3qsdpzjy
==========================
โ Don't change the password else account will stop soon
โโโโโโโโโโโโ
ENJOY โค๏ธ๐
๐ All accounts are working and fresh. We will never give Not working Accounts
โ If these accounts have guard then sorry we can't help.
==========================
โญ๏ธ Link to Accounts :
๐ Link: https://www.up-4ever.org/n0lw3qsdpzjy
==========================
โ Don't change the password else account will stop soon
โโโโโโโโโโโโ
ENJOY โค๏ธ๐
www.up-4ever.org
Download 400X HOTSPOT SHEILD ACCOUNTS txt
Download File 400X HOTSPOT SHEILD ACCOUNTS txt
๐ฐ HBO MAX ๐ฐ
๐ All accounts are working and fresh. We will never give Not working Accounts
โ If these accounts have guard then sorry we can't help.
==========================
โญ๏ธ Link to Accounts :
๐ Link: https://www.up-4ever.org/4oyyrxy3yxx6
==========================
โ Don't change the password else account will stop soon
โโโโโโโโโโโโ
ENJOY โค๏ธ๐
๐ All accounts are working and fresh. We will never give Not working Accounts
โ If these accounts have guard then sorry we can't help.
==========================
โญ๏ธ Link to Accounts :
๐ Link: https://www.up-4ever.org/4oyyrxy3yxx6
==========================
โ Don't change the password else account will stop soon
โโโโโโโโโโโโ
ENJOY โค๏ธ๐
www.up-4ever.org
Download 15X HBO MAX txt
Download File 15X HBO MAX txt
๐ฐ DOMMINOS ๐ฐ
๐ All accounts are working and fresh.
โ If these accounts have guard then sorry we can't help.
==========================
โญ๏ธ Link to Accounts :
๐ฅ https://www.up-4ever.org/mz610alvxak1
==========================
๐ Don't change the password else account will stop soon
โโโโโโโโโโโโ
ENJOY โค๏ธ๐
Send Screenshot To @Coder_chat_bot ๐๐
๐ซ Send S.S. Please
๐ All accounts are working and fresh.
โ If these accounts have guard then sorry we can't help.
==========================
โญ๏ธ Link to Accounts :
๐ฅ https://www.up-4ever.org/mz610alvxak1
==========================
๐ Don't change the password else account will stop soon
โโโโโโโโโโโโ
ENJOY โค๏ธ๐
Send Screenshot To @Coder_chat_bot ๐๐
๐ซ Send S.S. Please
www.up-4ever.org
Download domminos txt
Download File domminos txt
๐ฐ HULU ๐ฐ
๐ All accounts are working and fresh.
โ If these accounts have guard then sorry we can't help.
==========================
โญ๏ธ Link to Accounts :
๐ฅ https://www.up-4ever.org/8tdkgzohehqp
==========================
๐ Don't change the password else account will stop soon
โโโโโโโโโโโโ
ENJOY โค๏ธ๐
Send Screenshot To @Coder_chat_bot ๐๐
๐ซ Send S.S. Please
๐ All accounts are working and fresh.
โ If these accounts have guard then sorry we can't help.
==========================
โญ๏ธ Link to Accounts :
๐ฅ https://www.up-4ever.org/8tdkgzohehqp
==========================
๐ Don't change the password else account will stop soon
โโโโโโโโโโโโ
ENJOY โค๏ธ๐
Send Screenshot To @Coder_chat_bot ๐๐
๐ซ Send S.S. Please
www.up-4ever.org
Download hulu txt
Download File hulu txt
๐ฐ NORDVPN ๐ฐ
๐ All accounts are working and fresh.
โ If these accounts have guard then sorry we can't help.
==========================
โญ๏ธ Link to Accounts :
๐ฅ https://www.up-4ever.org/chyw87shizyf
==========================
๐ Don't change the password else account will stop soon
โโโโโโโโโโโโ
ENJOY โค๏ธ๐
Send Screenshot To @Coder_chat_bot ๐๐
๐ซ Send S.S. Please
๐ All accounts are working and fresh.
โ If these accounts have guard then sorry we can't help.
==========================
โญ๏ธ Link to Accounts :
๐ฅ https://www.up-4ever.org/chyw87shizyf
==========================
๐ Don't change the password else account will stop soon
โโโโโโโโโโโโ
ENJOY โค๏ธ๐
Send Screenshot To @Coder_chat_bot ๐๐
๐ซ Send S.S. Please
www.up-4ever.org
Download nordvpn txt
Download File nordvpn txt