/r/AssHatHackers

Photograph via snooOG

One day in Comp Sci class I created an infinite loop program that ran on my friend's computer while he was in the bathroom. He promptly called me an Ass Hat. Thus Ass Hat Hackers was born.

For hacking to have fun and mess with people.

You've heard of Black Hat and White Hat, now there's Ass Hat Hacking.

One day in Comp Sci class I created an infinite loop program that ran on my friend's computer while he was in the bathroom. He promptly called me an Ass Hat. Thus Ass Hat Hackers was born.

For hacking to have fun and mess with people.


Note: Things posted here should be for fun and learning purposes. Run the things you find here at your own risk.

Guidelines:

  • Post the OS and or the language your hack is designed for in the title

For example: [UNIX][bash], [iOS], [Windows], [PHP]

Tag meta posts with [META]

Tag posts asking for help with [HELP]

  • Refrain from posting malicious hacks intended to steal private information. These posts will be removed.

  • Excercise caution when downloading .exe or other pre-compiled programs users have posted. When posting, try to stick to source code so that people are aware of what they are running.


  • Check out our friends: /r/HowToHack

    Other Useful resources from Zempirians


    Come chat with us on irc:

    irc.zempirians.com #asshathackers

    /r/AssHatHackers

    4,867 Subscribers

    2

    Variable cursor speed depending on position on screen

    My plan is to create a msgbox and slow down the cursor more and more the closer it gets, effectively stopping it from moving closer at all.

    0 Comments
    2024/02/01
    11:13 UTC

    1

    How do i make a clipboard bomb?

    How do I make the computer copy so much text that the ram simply cannot handle it?

    2 Comments
    2023/09/24
    02:58 UTC

    2

    I think my work is accessing my personal accounts

    For the past several months now my work computer and my personal one drive and cloud accounts have been acting very strangely, as if someone was hacked into them. When I say hacked, I mean accounts that would reactivate themselves or autofill on all my passwords, secondary teams accounts, etc, that I didn't initiate. I took this concern to my IT department. I did a remote session with them that provided little insight as to the issues i was experiencing. At this point i started to consider that it may be my work that was causing all these problems. I know it's perfectly legal for them to do whatever they want with their computer because they own it, but that doesn't give them the right to my cloud and google accounts, does it? Articulating everything that has happened is difficult because its almost like they are using my own accounts to spy on me on my devices. It seems like they are creating accounts for me or identifying accounts that I've created in the past and taking them over or to gain access to my cloud information as in the case of my Xbox live account. For this example, I was not receiving authentication requests to my phone, which is listed as the authentication number. I was also not receiving any emails as it related to authentication making it impossible to regain control. . Finally my account was locked due to 'someone attempting my password too many times or the account being a work/school account and I cannot get anyone from microsoft on the phone to assist Again, this was my personal email address. Something else to note here, when I would open up my authenticator an azure account would populate tied to me created by someone at my company. I appears as if they managed to get access to my personal outlook account. Upon, securing this access they set up a family account for me that included myself, my husband (who wad designated under age by whoever created it) and my minor son. I don't know what the purpose of this was but its something that happened that I did not do. Another means of entry to my calls, texts, etc on my phone was through a samsung app on My device, which appears to have taken over my whole operating system. There are many apps included that could be used nefariously. Like the keylogger and a 'work profile' listed that i can assure you i did not download. Anyhow, I ended up calling samsung and expressing my concerns and ended up asking them to cancel my account which was a lot harder than I anticipated. There is much more to this story if you need me to clarify anything. I know you may be asking why would they want to hack into your stuff and I was asking myself the same thing. The only thing I could come up with was tip sheets that I had saved to my personal one drive that are related to my job. Hoping this was the root to all my issues, I brought this to the attention of my boss and he assured me this was not a problem and that it was done all the time. So I guess my question is how could i confirm it is actually them? Ive already quit my job related to this and i want the whole thing to end. Thanks in advance.

    Just for information sake, I did see a keylogger downloaded to my work computer as well as my phone.

    6 Comments
    2023/06/08
    16:59 UTC

    2

    How can a hacker be immune to administrators securing and resetting passwords?

    My account was hacked because the hacker tricked me by sending me a link pretending to be looking for support for a new business (it came from my friend who was also hacked).

    After speaking two different contacts at Meta, they "secured" the account twice and sent me a link to rest my password twice. However, both times, I didn't receive the email and my account continues to follow new accounts everyday so it doesn't seem secure. I tried different emails and I checked all spam and different folders. How can this be possible? Is this hacker advanced enough to be intercepting Meta employees attempts to secure the account? Any ideas what might be happening?

    12 Comments
    2023/04/17
    06:16 UTC

    0

    How does Marcus Theater receive there movies?...

    0 Comments
    2023/02/07
    00:54 UTC

    4

    resources and learning material for Spam bots and alike

    Hello Ass Hatters,

    I recently took up on coding and figured I would make it interesting for myself by learning something immature. I was thinking of starting with a spam bot I could send attacking all the spam emails/cons I might receive. For example those txt messages asking for my personal info because I "won something" or "my bank account stopped working''. At the same time I might to do a communal service by spamming the spammers.

    I know the basics of Python, but coud you share some resources on this type of coding. How do I extract the info from the web page and fill the proper input fields with spam? How does code get exported onto the internet?

    Note: I am not looking for finished spam bots but rather info on how to create one. Of course I could use a finished product for reference but mostly I am intrested in these conceptual and concrete advice how this type of coding works.

    cheers

    2 Comments
    2022/07/18
    11:12 UTC

    0

    halp plz

    Hi all. Slightly maybe computer literate millennial here. Windows update fucked my ish up! Basically I’m a dummy and accepted the update without reading up. Now my shit is barely functional but it’s a super powerful laptop hp 17z-ak000 if that means anything lol. I am trying to get back into school and basically the update hid all of my previous word docs and just basically years of academic writing (eek i’m a dummy should have backed it up/ might have on usb but can’t really figure out how to access it) I have adhd i’m talking in circles. I hate microsoft at this point and i’m desperately trying to restore or rebuild or any advice is so very appreciated. I want to be hackerman but mostly I am barely remembering the html I learned at 12….

    8 Comments
    2022/05/04
    23:35 UTC

    3

    Review Spam bot

    moving company helped my parents get stuff into our storage....one of the movers looked in the jewelry box and stole $2000+ in gold and posted it on his facebook...we are going to court and i want a review bot to let other google users know about how bad the company is

    1 Comment
    2022/04/26
    01:18 UTC

    3

    dego

    Anyone has an idea about a program called dego system info changer?

    I've tried to google it but got nothing!

    If anyone knows about it or how it works, or at least knows n alternatives for it ?

    0 Comments
    2022/04/04
    21:36 UTC

    3

    Linux v UNIX: Welcome to *NIX

    1 Comment
    2021/10/05
    02:27 UTC

    6

    University Research & Development Project. !!Help Please!!

    Hi All, I've taken on a research & development project In Cybersecurity at Edge Hill University, the title of my project is "Cybersecurity & COVID-19"

    I am doing research to identify if cybercrime increased due to the pandemic! I have created a survey to get some results from users who may have suffered a cyberattack!

    The survey is multiple choice, bar 1 question.

    I thank you all in advance!

    https://forms.gle/7WEVDHqdXAwPPEJ5A

    1 Comment
    2021/06/25
    08:12 UTC

    3

    Victim's Files Stealer [File Transfer Trojan]?

    Hi Hackers,

    I'm new here & a little bit n00b, the thing that I want to do is hacking another machine (windows 10), for just one thing: (File Transfer Download/Upload Files), I searched on google for viruses/malwares types which can do this function, but all I've found is RATs/Trojan, I know that RATs actually can do this function, but the issue there is that RATs are giving me full control of victim's machine & it has too many many tools, ransomware & functionalities, I think (But I'm not sure) that all of these tools like ransomware for an example making my payload more harm & detectable by anti-viruses, (But I'm not sure about this opinion, it's mine as a n00b). So I thought that if I found some viruses/malwares that very light & give me stability & only my required function (Files Transfer), so it will be less detectable, fast, reliable for my target.

    Actually I searched for google, and I've found another Trojan called FTP/Trojan, but I don't know if it's the right one of what I'm looking for or no! also, I don't even know how to create them..

    & If the answer for FTP/Trojan is NO! & the only method is using RAT/Trojan, So what do you recommend for me to do? (What is the best RAT, Undetectable mainly for windows defender, & Crypters to use with it - also I want to know if there are some crypters make the payload as PDF/doc files).

    All of them to just one thing (File Transfer Function).

    I don't even need anything else.

    Thank You.

    7 Comments
    2021/04/26
    08:41 UTC

    6

    Need help tracking ip.

    User is sending death threats and when blocked makes new profile to harass. Authorities won't help because there's no real name attached. They delete the new profiles after the harassing message is sent. Im not sure what to do but I would really appreciate any help

    7 Comments
    2021/01/30
    02:29 UTC

    16

    Can anyone teach me to text bomb?

    Just learned about this and want to send my wife a couple hundred texts saying i love you to annoy the hell out of her. Been trying to google for a few hours and one of the links I found from 6 years ago had this sub reddit mentioned when someone posted a text bomber they created. Cant get it to work and the apps I have found dont allow custom texts. My wife ended up getting spammed with messages about activation codes for tinder and other random things lol. Thanks in advance

    7 Comments
    2020/05/31
    15:01 UTC

    21

    I'm making a game called HackRack where where you make viruses and hack networks. Here is the progress so far.

    1 Comment
    2020/01/13
    02:50 UTC

    3

    Senior prank?

    What’s a lighthearted senior prank that I could do that involves hacking and how can I pull it off? I’m thinking I could do something that would force all the computers to play a particular video or song at a certain time. Imagine how cool it would be if patd’s Nine in the afternoon played at 9am to embarass all the stoners and vape addicts

    5 Comments
    2019/12/03
    16:38 UTC

    27

    How to hack HP printers in random places to print anything you want it to

    If you use public WiFi on your phone often, you may also find a HP printer in the list of WiFi networks. Now, you can use your phone to make it print anything you want. I originally did this to print "Subscribe to PewDiePie" on over 50 printers in random places such as office buildings, shopping malls, school, etc., but you can really just print anything.

    First, connect to the printer that you have found as a WiFi network. It will be named something like "DIRECT HP ENVY", "HP Laserjet Color Pro 1234", "DIRECT HP Print Deskjet 54321", etc. Now, there is often a password (on some older models, there is by default no password). But thankfully, most people don't change the password and keep the default password. Guess what, the default password does not have the printer's serial number or anything, it's the same with all HP printers. It's "12345678" (without the quotes). No, I'm not joking.

    Next, open a photo or document (or anything you can print) on your phone. Now, press the print button, and you should see the printer in the list of printers discovered. Select that one.

    Now, click print. If you can see where the printer actually is, then great, as you can also see an employee's reaction and with them wondering "who printed this". If you can't see where it is, hopefully you can at least hear the printer's motors spinning to confirm that it printed.

    5 Comments
    2019/08/24
    02:34 UTC

    10

    Looking for advice for stolen laptop & potentially compromised data

    Hi, looking for advice regarding compromised data.

    Early this morning one of my coworkers had their laptop stolen. I do still have the ability to remote in (once it's on - though it hasn't connected to wifi yet.) Is there anything such as a .bat bomb that you folks can think to do that would be doable with what (possibly little) time available to mess with the local file-system so as to make as much user data as possible (or the computer itself) unusable to the greatest degree possible? Unfortunately, there was not a security policy in place to find my laptop and create a remote wipe.

    Thanks for your tips.

    5 Comments
    2019/03/06
    16:55 UTC

    16

    GTA V "Modders" can now mess with you in different sessions, or even in your singleplayer.

    1 Comment
    2018/10/19
    20:15 UTC

    71

    I added this to my room mate's bashrc

    2 Comments
    2018/09/29
    15:41 UTC

    71

    Kids these days.

    2 Comments
    2018/05/15
    12:51 UTC

    2

    Discord Server about hacking, the Darknet and more!

    https://discord.gg/9uh7W7X This Discord Server is the „Invisible Web“. The server is about the Darknet, Hacking (with Social Engineering and programming) and more. We make weekly hacking challenges and try to be as active ad possible! The server is always growing and thats why you should join aswell

    1 Comment
    2018/03/21
    21:51 UTC

    16

    Chrome Extension Idea

    a chrome extension that will randomly turn off music to either the right channel or left channel

    3 Comments
    2018/02/12
    16:47 UTC

    1

    BUFFER OVERFLOW! | LET'S HACK #9

    0 Comments
    2018/01/12
    23:06 UTC

    7

    I need assistance with defeating map protection on bsp files. [HELP]

    I require assistance in reverse engineering a map protection for Gmod map files (BSP). the said map protection is called IID Nodraw Hack.

    http://www.tophattwaffle.com/protecting-a-map-from-decompiling/

    It's #5 on that list.

    5 Comments
    2017/10/19
    20:19 UTC

    7

    Looking for fun **new** rubber ducky payloads

    Any ideas? Not really malicious, but annoying. It'd be even better if it would keep working when USB is removed.

    2 Comments
    2017/10/05
    04:56 UTC

    Back To Top