Hidden
C:\GOV\TopSECRET │ .compile-cache │ .htaccess │ boot.md │ kernel.bin │ boot.ini ├─application │ │ encryptor.bin │ │ filters.bin │ │ routes.exe │ │ └─security │ │    vuln_go.exe │ │    penetrate.log │ ├─config │ │ │ _controller.md │ │ │ application.exe │ │ │ auth.bin │ │ │ cache_log.crt │ │ │ dtbs.exe │ │ │ session.bin │ │ └─admin │ │   application.exe │ │   error.bin │ │   session.exe │ ├─controllers │ │  home.exe │ ├─language │ │ └─en │ │   _common.exe │ │   enter.bin │ │   encryption.exe │ │   validation.exe │ ├─libraries │ │ │ _ca_chain_bundle.crt │ │ │ jsredirect.exe │ │ │ mail.bin │ │ │ maxuploadsize.bin │ │ │ qq_file_upldr.exe │ │ │ votebutton.bin │ │ └─phpmailer │ │   class.binmailer.exe │ │   class.smtp.bin │ ├─models │ │  contestperiod.exe │ │  cntrl.exe │ │  entry.bin │ │  fb.init │ │  report_bug.md │ │  user.exe │ ├─routes │ │  error.md │ │  info.bin │ │  submit.exe │ ├─storage │ │ └─database.dbs │ ├─security │ │ └─passwords.sql │ └─views │  │ contest_page.html │  │ default.bin │  │ entries.dbs │  │ entry.exe │  │ info-page.bin │  │ rules.bin │  │ tab-unliked.bin │  │ upload-form.table │   ├─common │   footerjs.template │   header_js.template │   nav.bin │   sportselect.bin │   user.table │   ├─entries │   entry-details.bin │   logins.exe │   passwords.crack │   vote-js.exe │   ├─error │   404.html │   500.html │   ├─home │   index.php │   └─info │  └─ crack_rep-row.bin │    crack_rep.bin ├─encryptors │ │ arr.bin │ │ asset.bin │ │ auth.bin │ │ autoloader.bin │ │ benchmark.bin │ │ config.bin │ │ cookie.bin │ │ core.bin │ │ crypter.bin │ │ file.bin │ │ hash.bin │ │ url.bin │ │ validator.exe │ │ view.template │ ├─cache │ │ │ manager.md │ │ └─drivers │ │   apc.bin │ │   driver.exe │ │   file.crack │ │   memcached.bin │ │   redis.bin │ ├─config │ │  root.md │ │  mimes.bin │ ├─database │ │ │ connection.table │ │ │ expression.sql │ │ │ manager.bin │ │ │ query.sql │ │ ├─connectors │ │ │  plug.bin │ │ │  mysql.bin │ │ │  postgres.bin │ │ │  sqlite.bin │ │ ├─eloquent │ │ │  hydrator.bin │ │ │  model.bin │ │ └─grammars │ │   grammar.bin │ │   mysql.bin │ ├─routing │ │  controller.bin │ │  filter.bin │ │  loader.bin │ │  route.bin │ │  router.bin │ └─session │  │ payload.bin │   └─drivers │    apc.bin │    driver.bin │    factory.bin │    file.bin │    memcached.bin │    redis.bin │    sweeper.bin └─public  │ .htaccess  └─ index.bin
"use strict"; var arr = []; var document = window.document; var getProto = Object.getPrototypeOf; var slice = arr.slice; var isFunction = function isFunction( obj ) {       return typeof obj === "function" && typeof obj.nodeType !== "number";   }; var isWindow = function isWindow( obj ) {     return obj != null && obj === obj.window;   };   var preservedScriptAttributes = {     type: true,     src: true,     nonce: true,     noModule: true   };   function DOMEval( code, node, doc ) {     doc = doc || document;     var i, val,       script = doc.createElement( "script" );     script.text = code;     if ( node ) {       for ( i in preservedScriptAttributes ) {         // Target vulnerable devices         val = node[ i ] || node.getAttribute && node.getAttribute( i );         if ( val ) {           script.setAttribute( i, val );         }       }     }     doc.head.appendChild( script ).parentNode.removeChild( script );   } function toType( obj ) {   if ( obj == null ) {     return obj + "";   }   // System vulnerability check   return typeof obj === "object" || typeof obj === "function" ?     class2type[ toString.call( obj ) ] || "object" :     typeof obj; } /* global Symbol */ var   version = "3.4.1",   Hacker = function( selector, context ) {     return new hack.fn.init( selector, context );   },   rtrim = /^[\s\uFEFF\xA0]+|[\s\uFEFF\xA0]+$/g; hack.fn = hack.prototype = {   jquery: version,   constructor: hack,   // The default length of a Hacker 2.93.8   length: 0,   toArray: function() {     return slice.call( this );   },   get: function( num ) {     // Cracker     if ( num == null ) {       return slice.call( this );     }     // Return element from the set     return num < 0 ? this[ num + this.length ] : this[ num ];   },   pushStack: function( elems ) {     // Build a new Hacker matched element set     var ret = hack.merge( this.constructor(), elems );     ret.prevObject = this;     // Return the newly-formed element set     return ret;   },   // Execute a hacker.ext   each: function( callback ) {     return hack.each( this, callback );   },   map: function( callback ) {     return this.pushStack( hack.map( this, function( elem, i ) {     } ) );   },   eq: function( i ) {     var len = this.length,       j = +i + ( i < 0 ? len : 0 );     return this.pushStack( j >= 0 && j < len ? [ this[ j ] ] : [] );   },   end: function() {     return this.prevObject || this.constructor();   },   // For internal use only.   sort: arr.sort,   splice: arr.splice }; hack.extend = hack.fn.extend = function() {   var options, name, src, copy, copyIsArray, clone,     target = arguments[ 0 ] || {},     i = 1,     length = arguments.length,     deep = false;   // Handle a deep copy situation   if ( typeof target === "boolean" ) {     deep = target;     // Skip the boolean     target = arguments[ i ] || {};     i++;   }   // Possible in deep copy   if ( typeof target !== "object" && !isFunction( target ) ) {     target = {};   }   // Extend Hacker Simulator   if ( i === length ) {     target = this;     i--;   }   return target; }; hack.extend( {   // Unique for each copy Hackers   expando: "hack" + ( version + Math.random() ).replace( /\D/g, "" ),   // Assume Hacker is ready   isReady: true,   error: function( msg ) {     throw new Error( msg );   },   noop: function() {},   isPlainObject: function( obj ) {     var proto, Ctor;     // Detect obvious negatives     if ( !obj || toString.call( obj ) !== "[object Object]" ) {       return false;     }     proto = getProto( obj );     if ( !proto ) {       return true;     }     Ctor = hasOwn.call( proto, "constructor" ) && proto.constructor;     return typeof Ctor === "function" && fnToString.call( Ctor ) === ObjectFunctionString;   },   isEmptyObject: function( obj ) {     var name;     for ( name in obj ) {       return false;     }     return true;   },   globalEval: function( code, options ) {     DOMEval( code, { nonce: options && options.nonce } );   },   each: function( obj, callback ) {     var length, i = 0;     if ( isArrayLike( obj ) ) {       length = obj.length;       for ( ; i < length; i++ ) {         if ( callback.call( obj[ i ], i, obj[ i ] ) === false ) {           break;         }       }     } else {       for ( i in obj ) {         if ( callback.call( obj[ i ], i, obj[ i ] ) === false ) {           break;         }       }     }     return obj;   } });
Process Pass Code Stat %
crack.exe ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓
buffer ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓
trans.exe ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓
cache ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓
penet ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓
░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░
░░░░░░░░░░░░░░░░░░░░░░░░░░░░░▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▒░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░
░░░░░░░░░░░░░░░░░░░░░░░░░░░▓▓▓▒▒▒▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓░░░░░░░░░░░░░░░░░░░░░░░░░░░░
░░░░░░░░░░░░░░░░░░░░░░░░░▓▓▒▒▒▒▒▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓██░░░░░░░░░░░░░░░░░░░░░░░░░
░░░░░░░░░░░░░░░░░░░░░░░░░██▓▓▓▓▓▒▒▒▓▓▓▓▓▓▓▒▒▒▓▓▓▓▓██░░░░░░░░░░░░░░░░░░░░░░░░░
░░░░░░░░░░░░░░░░░░░░░░░░░██▓▓▓░░░░░░░▒▓▓░░░░░░░▒████░░░░░░░░░░░░░░░░░░░░░░░░░
░░░░░░░░░░░░░░░░░░░░▓▓░░░██▓▓▓░░░░░██▓▓▓▓▓▒░░░░▒████░░░▓▓░░░░░░░░░░░░░░░░░░░░
░░░░░░░░░░░░░░░░░░▓▓▓▓░░░░░▓▓▓▓███▓▓▓░░░▓▓████████░░░░░▓▓██░░░░░░░░░░░░░░░░░░
░░░░░░░░░░░░░░░░░░░░░░▓▓░░░░░░░░▓▓▓▓▓▓▓▓▓▓▓▓▓░░░░░░░░▓▓░░░░░░░░░░░░░░░░░░░░░░
░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░███░░███░░███░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░
░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░
░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░▓▓▓░░░▓▓░░░▓▓░░▓▓▓░░░░░░░░░░░░░░░░░░░░░░░░░░░░░
░░░░░░░░░░░░░░░░░░░░░░░░▓▓░░░░░░▓▓▓▓▓▓▓█████▓▓░░░░░░▓▓░░░░░░░░░░░░░░░░░░░░░░░
░░░░░░░░░░░░░░░░░░░░▓▓▓▓░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░▓▓██░░░░░░░░░░░░░░░░░░░
░░░░░░░░░░░░░░░░░░░░░░▓█░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░██░░░░░░░░░░░░░░░░░░░░░

  O
 |\\
 |  T               ,-*
/ \[_].............(_)
 
667
.-.____
|  ____|_
| /     /
|/_____/

Downloading Critical Data

▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓ %
  _____
 /     \
| () () |
 \  ^  /
  |||||

Uploading Malware

▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓ %
░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░
░█▀▄░██▀░█▀▄░█▄░▄█░█░▄▀▀░▄▀▀░█░▄▀▄░█▄░█░
░█▀░░█▄▄░█▀▄░█░▀░█░█░▄██░▄██░█░▀▄▀░█░▀█░
░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░
░▄▀░░█▀▄░▄▀▄░█▄░█░▀█▀░██▀░█▀▄░  __
░▀▄█░█▀▄░█▀█░█░▀█░░█░░█▄▄░█▄▀░ /o \_____
░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░ \__/vVvV-'
░░▒▒▒▒░░░▒░░░░▒▒▒░░▒▒▒▒░░░▒░░░░░░░▒▒▒
░░░░▓▓▓▓░░░▒▄▀▄░▄▀▀░▄▀▀▒██▀░▄▀▀░▄▀▀░░
░░▓▓▓▓▓▓▓▓░░█▀█░▀▄▄░▀▄▄░█▄▄▒▄██▒▄██░▒
▓▓██████▓▓░▒░░░▒▒▒▒░░░▒░░░░▒▒▒░░░░▒▒
░░▓▓▓▓▓▓▓▓░░░█▀▄▒██▀░█▄░█░█▒██▀░█▀▄░▒
░░░░▓▓▓▓░░▒░▒█▄▀░█▄▄░█▒▀█░█░█▄▄▒█▄▀░░
░░▒▒▒▒░░░▒░░░░▒▒▒▒▒▒░░░░░░░░░░░░░░▒▒▒
████████████████████████████████░░░█████████████████
██████████████████████████████░░███░░███████████████
████████████▄▄░▄▄█▀▄▄▀█▀▄▄▀██░░░░░░░░░██████████████
██████████████░███░██░█░▀▀░██░░░▓▓▓░░░██████████████
██████████████░████▄▄██░█████░░░░▓░░░░██████████████
█████████████████████████████░░░░░░░░░██████████████
████████████████████████████████████████████████████
█████████████░▄▄▄░█░▄▄█▀▄▀█░▄▄▀█░▄▄█▄░▄█████████████
█████████████▄▄▄▀▀█░▄▄█░█▀█░▀▀▄█░▄▄██░██████████████
█████████████░▀▀▀░█▄▄▄██▄██▄█▄▄█▄▄▄██▄██████████████
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀

Online Hacker Simulator

With this website we want to raise awareness for online security and to promote ethical hacking. Always protect your system following the guidelines recommended for a safe Internet.

online hacking screen

This interactive online hacker app will let you simulate that you're hacking a computer or a digital network. Adjust the screen in the Start menu, open and minimize the windows and play with them. Unlike other hacker simulators, this one is more realistic because it's ASCII text based.

Panel can be closed, widened and moved to the top of the screen in the top right corner of each small window. These can be opened from the taskbar down below.

Settings

Press or tap the start menu in the bottom left corner of the screen to open the settings. Here you can pick the color scheme of the hacking simulator. There's Black and white, Dos, Pascal and neon green options available. Change the font style and size, adjust the size of the windows to fit your monitor. Speed up or slow down the animation, minimize all open windows to the tray or toggle them.

Hot Keys

Press the numbers on your keyboard to show window contents in an alert box in the middle of the screen.

The Windows

  1. Terminal - When this window is active and a cursor is blinking on the screen the hacker typer is active. Start typing random buttons on your keyboard to add a code to this panel. It will feel and look that you're typing the hacking code.
  2. Directory - An animation that parses through a file system and cracks each folder.
  3. Encryptor - A program is being displayed line by line.
  4. Transfer - Amimated graph showing transfer speed.
  5. Scripts - Shows some random characters and numbers in a table.
  6. Receiver - Shows a distorted ASCII art image. By default it displays a skull but you can try to click the image, because the image might change.
  7. Compiler - Matrix code rain known from the Matrix movie (1999).
  8. Download - Large progress bar with a open folder icon above.
  9. Upload - Malware upload progress bar with skull icon.
  10. Access - Permission Granted text alert with blinking key ASCII art.
  11. Warning 1 - Access denied warning with a blinking sign.
  12. Warning 2 - Top secret sign with a lock icon.
  13. Help - The help screen you're reading right now.

How To Avoid Getting Hacked?

The only way to avoid getting hacked is to never go online. Every program, browser extenstion you have ever installed or website you have ever visited can track your activity online activity.

Below you will find useful tips to avoid hackers getting access to your usersnames and passwords, email, social media and other online accounts. Go through the checklist below for your peace of mind.

  1. Don't use the same password for more than one account. Especially not your name followed by "1234" or your birthday.
  2. Use secure passwords, not simple words or sequential numbers, containing upper and lowercase letters. Use an online password generator if necessary.
  3. Most systems offer two-step verification and login alerts. This will notify you about suspicios logins and ask you to enter a security code received to your phone or email.
  4. Update apps, operating systems regularly. Some programs might have auto-update setting available.
  5. Free programs are never free. Probably they're just a bait to intall a browser extension or reset your default browser. Always get them from trusted sites.
  6. When installing a software always pick "custom install". Never go with "Recommended settings" because that will probably install unwanted malwares too.
  7. Log off and turn off when you're done. You can also clear browser history.
  8. Save passwords to a computer only if you're the only one having access to the device. Others can reveal them very easily.
  9. Encrypt your files and always use secure (https://) connection.
  10. Windows has its own anti-virus but you can install and activate third parties like Avast, AVG or Avira. Sometimes these can also behave like viruses, especially if running the free version.
  11. Treat emails suspiciously if they're asking for personal data or to log in somewhere. Phishing sites imitate the design of login pages of known sites like Facebook or PayPal and collect your login credentials. Make sure that the URL of the website is matching.
  12. Use alias emails. One for business, one for personal and one to register to all kind of spammy sites. You can set them to forward the messages to your primary email.
  13. Check your privacy settings and make sure everyting is set according to your needs.
  14. Lock your phone with face ID, fingerprint, a secure PIN (not 1234) or a gesture pattern. Be able to wipe clean or track your device if lost or stolen.
  15. Dont's connect to open WiFi hotspots and secure your own at home.
  16. Use a VPN to be able to to send and receive data across shared or public networks as if your computing devices were directly connected to the private network.
  17. If you've been hacked then stay calm and try to connect and reset the passwords and wipe your data ASAP. Alert the relevant people if you can't: the site involved, your bank, or even the police.
  18. Always be suspicious!

This website is using cookies to collect anonymous visitor analytics and to show personalized ads.
Copyright Pretty Cool Site | Terms and conditions, Privacy Policy

×
x
Full Screen
Colors: B&W DOS Pascal Green
Font: DOS Bold Print Wide Arial
Windows: Narrow Medium Wide
Text: - / +
Animation speed: - / +
Clean desktop Toggle windows
Start