Best notepad hacks and tricks

notepad-tricks-hacksNotepad Is Just A Simple Text Editor Provided By Every OS. It Is A Program That Is Pre-Installed In The Operating System To Create Text Files. It Almost Supports All Extension Like Html, JavaScript, JQuery, Batch Files Etc. Mostly The Programmers Use Notepad For Coding Because It Is The Best Way To Improve Programming Skills. It Has A Simple Graphical User Interface And Very Easy To Use. But If You Think That Notepad Is Only Use For This Stuff Then You Are Wrong. There Are Many Notepad Tricks And Hacks, With This You Can Make Fun With Your Friends In The School And College. The Notepad Tricks Are Just Simple Commands To Use To Run Small Programs. You Just Have To Copy The Code And Paste In Your Notepad And Then Save With The Extension Of That File. It Will Create A Simple Icon On Your Desktop Or Where Ever You Save The File. Run The File And You Will See The Effect Of That File. So Here I Am Going To Discuss You Notepad Tricks And The Features That Make Notepad Very Famous.

 

Notepad Tricks And Hacks 2016

#1. Falling Matrix Code Effect

This Is The Cool And Best Notepad Trick Ever. In This Trick You Will See The Green Code Falling Continuously. This Trick Is Inspired By The Matrix Movie.

  • Open Your Notepad
  • Copy The Below Given Code And Paste In Your Notepad.
  • Then Save The File With Name.Bat Extension. You Can Place The Name Whatever You Want To But .Bat Is Must.
@Echo Off
Color 02
:Start
Echo %Random% %Random% %Random% %Random% %Random% %Random% %Random% %Random% %Random% %Random%
 Goto Start

#2. Create Your Own Diary

This Is The Another Best Notepad Trick. In This Trick  I Will Show  You How You Can Create Your Own Diary So Whenever You Write Something On Notepad And Save It Will Automatically Save Your File With Date And Time.

  • Open Notepad
  • Now Type .LOG In Notepad
  • Then Save The File As A Log.Txt
  • Then Open The Program And Type Anything In The Notepad Then Save It And You Will See It Will Automatically Save With The Date And Time.

#3. Computer Speaking Your Message

With The Help Of  This Cool Notepad Trick Your Computer Will Be Able To Speak Whatever You Want To Speak From Your Computer.

  • Open Notepad.
  • Copy The Below Given Code And Paste In Your Notepad.
  • Then Save The File With Name.Vbs Extension Then Double Click On The Icon To Run It.
  • You Can Replace Text “Welcome To Mytrickscorner.Com” With Your Own Message.
Dim Speaks, Speech
Speaks="Welcome To Mytrickscorner.Com"
Set Speech=CreateObject("Sapi.Spvoice")
Speech.Speak Speaks

#4. Dancing Keyboard LED

This Notepad Trick Make Your Computer’s LEDs Dancing.

  • Open Notepad.
  • Copy The Given Code And Paste In Yout Notepad.
  • Then Save The File With Name.Vbs Extension Then Double Click To Run It.
Set WshShell =Wscript.CreateObject("WScript.Shell")
 Do
 Wscript.Sleep 100
 Wshshell.Sendkeys "{CAPSLOCK}"
 Wshshell.Sendkeys "{NUMLOCK}"
 Wshshell.Sendkeys "{SCROLLLOCK}"
 Loop

#5. Disable The Mouse

This One Is The Funny Notepad Trick With The Help Of This Trick You Can Disable Your Computer’s Mouse Just With The Help Of This Simple Code.

  • Open Notepad.
  • Copy The Given Code And Paste In Notepad.
  • Then Save The File With Name.Vbs Extension.
Rem Disable Mouse
 Set Key="HKEY_LOCAL_MACHINEsystemCurrentControlSetServicesMouclass"
 Reg Delete %Key%
 Reg Add %Key% /V Start /T REG_DWORD /D 4

#6. Eject CD Drive Continuously

With The Help Of This Notepad Trick Your Computer’s CD/DVD Drive Will Move Continuously Until You Stop The Script. You Can Amaze Your Friends With This Amazing Notepad Trick.

  • Open Notepad.
  • Copy The Given Code And Paste In Notepad.
  • Then Save The Name.Vbs Extension.
Set OWMP = CreateObject("WMPlayer.OCX.7")
 Set ColCDROMs = OWMP.CdromCollection
 Do
 If ColCDROMs.Count >= 1 Then
 For I = 0 To ColCDROMs.Count - 1
 ColCDROMs.Item(I).Eject
 Next
 For I = 0 To ColCDROMs.Count - 1
 ColCDROMs.Item(I).Eject
 Next
 End If
 Wscript.Sleep 5000
 Loop

#7. Shut Down PC

Here Is Another Best Notepad Trick With This You Will Be Able To Shut Down Your PC Laptop Direct By Double Clicking On The Program Created With The Given Code.

  • Open Notepad.
  • Copt The Code And Paste In Notepad.
  • Then Save The File Name.Bat Extension.
@Echo Off
 Shutdown.Exe -S -T 10
 Cls
 Msg * I Don’t Like You SHIT!

#8. Create Password Protected Folder Lock

With This Amazing Trick You Can Create A Folder With Password Protected.

  • Open Notepad.
  • Copy The Given Code And Paste In Notepad.
  • Now Save The File With Locker.Bat.
  • The Password Of The Folder Is Mytrickscorener.
  • You Can Change The Password By Replacing Mytrickscorener From The Code With Your Own Text.
@ECHO OFF
 Title Folder Locker
 If EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Goto UNLOCK
 If NOT EXIST Locker Goto MDLOCKER
 :CONFIRM
 Echo Are You Sure U Want To Lock The Folder (Y/N)
 Set/P "Cho=>"
 If %Cho%==Y Goto LOCK
 If %Cho%==Y Goto LOCK
 If %Cho%==N Goto END
 If %Cho%==N Goto END
 Echo Invalid Choice.
 Goto CONFIRM
 :LOCK
 Ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
 Attrib +H +S "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
 Echo Folder Locked
 Goto End
 :UNLOCK
 Echo Enter Password To Unlock Folder
 Set/P "Pass=>"
 If NOT %Pass%==Mytrickscorener Goto FAIL
 Attrib -H -S "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
 Ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker
 Echo Folder Unlocked Successfully
 Goto End
 :FAIL
 Echo Invalid Password
 Goto End
 :MDLOCKER
 Md Locker
 Echo Locker Created Successfully
 Goto End
 :End

#9. Convey Your Friend A Lil’ Message And Shut Down His / Her Computer

  • Open Notepad.
  • Copy The Given Code And Paste In Notepad.
  • Now Save The File With Name.Bat Extension And Run It.
@Echo Off
 Msg * I Don’t Like You
 Shutdown -C “Error! You Are Stupid!” -S

#10. Open Notepad Continually In Your Friend’s Computer

With This Cool Trick You Can Make Fun Of Your Friends. Simple Create A File With The Given Code And Send It To Your Friends. When Your Friend Open This File The Notepad Will Continually Open In Their Computer Until They Stop The Program.

  • Open Notepad.
  • Copy The Given Code And Paste In Notepad.
  • Now Save The File With Name.Bat Extension And Send It To Your Friend.
@ECHO Off
 :Top
 START %SystemRoot%System32notepad.Exe
 GOTO Top

 

 

If you like our posts please like us on facebook and support us.

Please let us know about your views in comments.

10 Powerful hacking tools for Kali linux

maxresdefault

Kali Linux, the hacker’s operating system is very powerful Linux distro and it is my favorite OS, not only my favorite but also many Hackers and pentesters choosing Kali Linux as their favorite hacking tool. The main reason hackers and newbies like Kali is because it is blessed with 300+ hacking tools and it has developed by Offencive Security team, so today i want to introduce you the top 10 tools i like most in kali linux. Here i am giving tutorials for each hacking tools so everybody can understand it well.

1. Metasploit

Metasploit has become over the years the best framework to conduct penetration testing on network systems and IT infrastructure. The Metasploit Project, or better known as simply ” is a hugely popular pentesting or hacking tool that is used by cyber security professionals and ethical hackers. Metasploit is essentially a computer security project that supplies information about known security vulnerabilities and helps to formulate penetration testing and IDS testing.

Metasploit is in fact a sub-project of the Metasploit Framework. This hacker tool and framework is best known for its anti-forensic and evasion tools, some of which are built into the Metasploit Framework.

2. THC Hydra

Although often considered as yet another password cracker, THC Hydra is hugely popular and has a very active and experienced development team. Essentially THC Hydra is a fast and stable Network Login Hacking Tool that will use dictionary or brute-force attacks to try various password and login combinations against an log in page. This hacking tool supports a wide set of protocols including Mail (POP3, IMAP, etc.), Databases, LDAP, SMB, VNC, and SSH.

 
 

3. Sqlmap

Basically its just a tool to make Sql Injection easier. Their official website introduces the tool as -“sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections.”

 

4. Nikto

There are a number of tools and applications to find vulnerabilities in websites, but one of the simplest (and one of my favorites) is nikto.

This small and simple tool examines a website and reports back to you the potential vulnerabilities that it found that you could use to exploit or hack the site. In addition, it’s one of the most widely used website vulnerabilities tools in the industry and in many circles considered the industry standard.

 

5. Ettercap

Ettercap has a huge following and is widely used by cybersecurity professionals. Ettercap works by placing the users network interface into promiscuous mode and by ARP poisoning the target machines, i.e. facilitating a ‘Main In The Middle’ or MITM attack. Once successfull Ettercap (and the hacker) can deploy various attacks on the victims. A popular feature about Ettercap is its’ ability to support various plugins.

 
 

6. BeEF

 

BeEF was developed by a group of developers led by Wade Alcorn. Built on the familiar Ruby on Rails platform, BeEF was developed to explore the vulnerabilities in browsers and test them. In particular, BeEF is an excellent platform for testing a browser’s vulnerability to cross-site scripting (XSS) and other injection attacks.

 

7. Wireshark

Wireshark, formerly known as Ethereal, is one of the mostpowerful tools in a network security analyst’s toolkit. As a network packet analyzer, Wireshark can peer inside the network and examine the details of traffic at a variety of levels, ranging from connection-level information to the bits comprising a single packet. This flexibility and depth of inspection allows the valuable tool to analyze security events and troubleshoot network security device issues. It’s also priced right: it’s free!

 

 
 

8. Maltego

 

Maltego is capable of gathering information about either a network or an individual; here we will focus on the former and leave individual information gathering for another time. We will be looking at gathering info on all the subdomains, the IP address range, the WHOIS info, all of the email addresses, and the relationship between the target domain and others.

 

 
 

9. Msfvenom

From 8th june 2015 we will no longer receive the services of msfpayload and msfencode. They are going to retire permanently. Yeah! Permanently off course this is a bad news. These both tools are serving us since ten years but the time has come to say good bye. Thank you msfpayload and msfencode for serving us in every level of hacking or penetration testing we will never forget you.

But the good news is msfpayload and msfencode are being replaced by a new tool called msfvenom. This is the combination of both the tools, almost from three and half years this new tool is being tested and the time has come to use it.

 

10. Wireless Auditing

In this Section i am introducing you to the 3 wireless hacking tools, Aircrack-ng, Reaver, and Pixiewps. PicaTesHackZ do not condone the illicit activities of wireless auditing on unauthorized systems. We do however encourage you to use this knowledge to your benefit to learn and practice exploitation using the latest in Wireless Auditing. Although I did do a write up about using reaver and pixiewps, there has been updates, I have more tests, and more knowledge on the tools. Please keep in mind it is illegal to penetrate networks that are not your own without proper permission. This falls on you, so do what you will but we will hold no liability for your actions.
If you have some of your own favorites please let us know in comments.

The Top Hacker Tools you need to know!!!

blackhat

Every task requires a good set of tools.This because having right tools in hand one can save much of its energy and time.In the world of Cyber Hacking (“Cyber Security” formally) there are millions of tools which are available on the Internet either as Freewares or as Sharewares.

If you are security researcher, pentester or a system admin, you need to have this on your PCs/laptops to find the vulnerabilities and plug them. Concise Courses conducted an online poll to determine top ten hacking tools out of some of the famous ones. Here is the list which came out the winner on the poll.

1. Nmap:  Network Mapper

Abbreviated as nmap is a versatile tool for Network Security, plus it is free and open source.It  is largely used by network administrators for network discovery and security auditing. System admins use nmap for network inventory, determining open ports, managing service upgrade schedules, and monitoring host(A term used for “a computer on a network”) or service uptime. The tool uses raw IP packets in many creative ways to determine what hosts are available on the network, what services (application name and version) they offer,which type of protocols are being used for providing the services,what operating systems (and OS versions and possible patches) and what type and version of packet filters/ firewalls are being used by the target.

2. Metasploit:

A tool for exploiting (Utilising network weakness for making a “backdoor”) vulnerabilities (Weak Points) on Network. This tool is neither free nor open source. But when it comes to features offered it deserves the price it claims. The Metasploit Project is a hugely popular pentesting (penetration testing) or hacking tool that is used by cybersecurity professionals and ethical hackers. Metasploit is essentially a computer security project that supplies information about known security vulnerabilities and helps to formulate penetration testing and IDS testing.

3. Cain and Abel:

Cain & Abel is a password recovery tool that is mostly used for Microsoft Operating Systems. This popular hacking tool allows the user to seek the recovery of various kind of passwords by sniffing the network(capturing some of the data packets), cracking encrypted passwords using Dictionary, Brute-Force(Generation of hashes out of words and then comparison of encrypted hash with the generated one,this method takes less time than dictionary attack method) and Cryptanalysis attacks. Cain, as it is often referred to, can also record VoIP(Voice over IP protocol,used for making calls over using internet) conversations, decode hashed scrambled passwords, recover wireless network keys and more.It can crack various types of hashes including NTLM,MD2,MD5,SHA-1,SHA-2 and many more.These functionalities make Cain and Abel one of the best password recovery tool.

4. Angry IP Scanner: 

Angry IP Scanner, also known as ‘ipscan’ is a freely available (open-source and cross-platform) hacking network scanner that is both fast and easy to use. The main purpose of this hacking tool is to scan IP addresses and ports to find open doors and ports. Worth noting that Angry IP Scanner also has a bunch of other uses as well. Common users of this hacking tool include network administrators and system engineers.

5.John The Ripper: 

John the Ripper is a popular password cracking pentesting tool that is most commonly used to perform dictionary attacks. John the Ripper takes text string samples (from a text file, referred to as a wordlist, containing popular and complex words found in a dictionary or real passwords cracked before), encrypting it in the same way as the password being cracked (including both the encryption algorithm and key), and comparing the output to the encrypted string. This tool can also be used to perform a variety of alterations to dictionary attacks.Including Brute Force and Rainbow attacks.

6. THC Hydra:

Although often considered as yet another password cracker, THC Hydra is hugely popular and has a very active and experienced development team. Essentially THC Hydra is a fast and stable Network Login Hacking Tool that will use dictionary or brute-force attacks to try various password and login combinations against an log in page. This hacking tool supports a wide set of protocols including Mail (POP3, IMAP, etc.), Databases, LDAP(Lightweight Directory Access Protocol),SMB, VNC, and SSH(Secure Shell,used by VPN Softwares).

7. Burp Suite:

A pentesting tool,Burp Suite has several features that can help the penetration tester or ethical hacker. Two commonly used applications used within this tool include the ‘Burp Suite Spider’ which can enumerate and map out the various pages and parameters of a web site by examining cookies and initiates connections with these web applications, and the ‘Intruder’ which performs automated attacks on web applications.

8. Nessus Remote Security Scanner

Recently went closed source, but is still essentially free. Works with a client-server framework. Nessus is the worlds Nessus Remote Security Scanner most popular vulnerability scanner used in over 75,000 organizations world-wide. Many of the worlds largest organizations are realizing significant cost savings by using Nessus to audit business-critical enterprise devices and applications. (This tool is not in the Concise list)

9. Ettercap:

Ettercap has a huge following and is widely used by cyber security professionals. Ettercap works by placing the user’s network interface into promiscuous mode and by ARP poisoning(ARP : Address resolution protocol is used to determine a host’s MAC address (address of its Network Interface Card) by knowing its IP address. ARP poisoning is a process where a hacker gives wrong information of either its MAC or IP address to the network.) the target machines, i.e. facilitating a ‘Man In The Middle’ or MITM attack. Once successful Ettercap (and the hacker) can deploy various attacks on the victims. A popular feature about Ettercap is its’ ability to support various plugins.

10. Wapiti:

Wapiti has a very loyal following. As a pentesting tool (or framework) Wapiti is able to scan and detect hundreds of possible vulnerabilities. Essentially this Multi Purpose Hacker Tools can audit the security of web applications by performing “black-box” scans, i.e. it does not study the source code of the application but will scan the HTML pages of the application seeking scripts and forms where it can inject data.

 

source: Techworm,Concise

 

If you have any favorite tool of your own which we have not mentioned in the article, kindly mention it in the comments so that we can include it in our next list.