- How To Make Your Mac Look Like A Hacker
- How To Look Like A Hacker On Mac Pc
- How To Look Like A Hacker On Cmd
Created in 2011, Hacker Typer arose from a simple desire to look like the stereotypical hacker in movies and pop culture. Since that time, it has brought smiles to millions of people across the globe. The Nessus installer is GUI based like other Mac OS X applications, so there are no special instructions to document. I hope you found this article useful and I hope you enjoy setting up your Mac OS X hacker toolbox as much as I did. With Macs increasing in popularity, I can only imagine that they will become more widely used in pen testing. Introduction: Look Like a Hacker! (Batch File) By BatchProgrammer Follow. More by the author: In this quick and easy Instructable you can trick your friends into thinking that you hack! Add Tip Ask Question Comment Download. Step 1: Copy and Paste. Copy this code and put it into preferably Notepad, but any text editor will work. Oct 17, 2018 If you like the Mac look, but you prefer (or afford) Windows, here is how you can make the Microsoft OS have a Mac OS appearance by making the appropriate configurations. FILES TO DOWNLOAD - Thank.
How To Make Your Mac Look Like A Hacker
1) log into macosx as your admin-level user.
2) install developer tools absolutely required
3) download http://www.asty.org/cmatrix/dist/cmatrix-1.1b.tar.gz this file
4) in the terminal:
kick ass!
PS: My friends allready thought I was a 'crazy hacker dude' but this will only add to it. For fuller effect, buy 20 usb --> serial adaptors, and take all your old macs, install linux or NetBSD on them, and connect them all to your G4. Sorround your self with the screens, and run cmatrix in various colors on them all. Then go to macosx.com and yell 'Moohooohooohooohaahaahaa I'm the ultimate hacker dude'.
enjoy.
ignore the compile errors - I don't know what they mean, and nobody else does
here's the url for the webpage - check out the screenshots
http://www.asty.org/cmatrix/
Introduction: How to Look Like a Hacker (not Actual Hacking)
Rules - you can only change the ___ parts otherwise it wont work
Commands:
@echo off - looks better
echo ____ - how to communicate through your batch file
pause - stops movement and asks user to press any key to continue
cls - clears the screen
tree - looks hackerish
ping -n 2 127.0.0.1>nul - delay between revealing echo's
set /p question=_________?: - sets an answerable question. EG: do you want to hack?
if %question%___ goto :_ - this is how you answer your question. EG: if %question%yes goto :A
:_ - this is how you control different outcomes. EG: :a
Color:
Letter - Text
Number - Background
0 - Balck
1 - Blue
2 - Green
3 - Aqua
4 - Red
5 - Purple
6 - Yellow
7 - White
8 - Grey
9 - Light Blue
A - Light Green
B - Light Blue
C - Light Red
D - Light Purple
E - Light Yellow
F - Bright white
Usage: color 0a
Step 1: Method
How To Look Like A Hacker On Mac Pc
1. Open a text document - Not Microsoft word
2. begin your code with:
@echo off
color ___
3. add any commands you want
4. when saving your file, always save it as a .bat. Meaning to add the file extension .bat after the name of the file
5. Open it up. i am telling you now, it wont work perfectly the first time so keep editing until you have it at where you want
Step 2: My Code
@echo off
color 0a
set /p question=Would you like to hack?:
if %question%yes goto yes1
if %question%no goto e
:e
exit
:no
cls
ping -n 2 127.0.0.1>nul
echo Harddrive Disengaged
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
goto e
:yes1
cls
echo Destination harddrive located
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
echo pinging localhost network...
ping -n 2 127.0.0.1>nul
echo responce found in 33...
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
echo locating System Intel...
ping -n 2 127.0.0.1>nul
echo Extracting files...
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
echo Locating Storage database
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
echo Database found
ping -n 2 127.0.0.1>nul
echo Extracting files...
Set /p question=Retrieve Passwords?:
if %question% yes goto yes2
if %question% no goto no
:yes2
echo -------------------------------
ping -n 2 127.0.0.1>nul
echo 'ENTER WEBSITE HERE' targeted
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
Echo Scanning cookies and data
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
echo Username and password retrieved
ping -n 2 127.0.0.1>nul
echo Username and password sent to harddrive
ping -n 2 127.0.0.1>nul
echo -------------------------------
echo 'ENTER WEBSITE HERE' targeted
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
echo Scanning cookies and data
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
echo Username and password retrieved
ping -n 2 127.0.0.1>nul
echo Username and password sent to harddrive
ping -n 2 127.0.0.1>nul
echo --------------------------------
set /p question=Override System Operations?:
if %question%yes goto yes3
if %question% no goto no
:yes3
tree C:Users
echo Manual Override Complete
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
cls
set /p question=Extract all files?:
if %question%yes goto yes4
if %question%no goto no
:yes4
cls
ping -n 2 127.0.0.1>nul
echo Destination Harddrive located
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
echo Preparing to Commence File Download
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
tree C:
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
echo All files Dowloaded
ping -n 2 127.0.0.1>nul
echo Safe to remove harddrive
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
pause
goto no
-------------------------------------------
The way to complete it is to say 'yes' at every intersection - note the lowercase
Feel free to comment/ask questions or if you have made a better code, share that too...
-Moonicornian
Be the First to Share
Recommendations
How To Look Like A Hacker On Cmd
Pocket-Sized Speed Challenge
Audio Challenge 2020
Maps Challenge