Wow this video is worth its weight in gold. Initially having typed in the "ESTABLISHED" part I nearly died there where 20 foreign connections. But having followed your simple instruction using Task Manager I quickly realised that most of them were Bitdefender processes. And the rest were browser processes Firefox & Edge. So I'm pretty sure at least for now nobody is remotely accessing my computer. Thanks for an amazing video. You've got a like from me and just gained another sub. Thanks again. And thanks for putting my mind at ease. This is a must see video for any computer user. Much appreciated 😀👍
The only thing your videos are lacking is you sharing the commands and scripts. It would be nice if the commands and scripts you use were shared on Github so we can test in our own labs. Thank you.
Great video. Questioning new IP cameras that are made in China. Files created on memory card are in Chinese. Wanted to know if they can be converted into English. The cameras force you to format the memory card. Also evertime it update it doesn’t recognize the old card.
Your videos are awesome, truly amazing 🙂😀😄🤩,knowledge is power. Hey, here's a quick QUESTION how can we check and do the same for/with ios and android mobile device's? I must repeat this message to make sure that you're reading it, sorry for being persistent 😅
Hey, here's a quick QUESTION how can we check and do the same for/with ios and android mobile device's? I must repeat this message to make sure that you're reading it, sorry for being persistent 😅
I wonder if you can get a virus without running the executable or even without starting it, just by sitting inside the registry or getting analysed by the scheduler etc.
Can I use quasar to remote control my own pc and hear my sound? The idea is that I'm a professionall video editor and want to use my workstation to edit videos remotely, but all the other tools for remote access are expensive or laging a lot. Can quasar forward sound also ?
I did the command prompt One as it’s the easiest one I could think of it’s also the only one I could really get through at the time if all I see is just the mandatory stuff does that mean that I’m safe
cmd is launching automatically for just 0.5 sec it get off immediately when I running windows 11 on my Laptop 💻 ( After Turn ON first time ). Is it's Hacked ? I Think some unusal activity or something else running in background Laptop is Fan Running fast Hanging. How to check?
I was roaming through discord and found a server which gave free hacks i was dumb enough to install it and...they said to turn off antivirus i did it.after few minutes i was afk and when i came back i saw my cursor moving...a guy got into my pc read all my chats tried to install anydesk and transfer files but i was quick and i had a tech friend he helped me and gave me antivirus i am sure that he couldn't transfer my files but he installed some sus dll file
hey sometimes i see my run panel is on... and icon moved... and when i log in my window .or go to edge browser it shows Indian languages... what should i do?
is there going to be an Ai-ish tool which grows in "intelligence" coperatively (amongst us all) such that for example many of the "hacks" you show can be run automatically (so the Ai connected tool would take control i.e. a version of "you") and any vulnerability spotted and then passed thru to the analytical side of the Ai database, (I mean Ai is another form of database?) so could be run locally on a suspect computer and all the swept data pooled from many of us, i am not a hacker i am an rf specialist so computer hacking is very interesting allied trade but i am a bit (or byte) too old to learn new tricks well some of these tricks you show have enlightened me today (good to be enlightened in thailand :-) kop kun kup) thanks for the videos I am recording all of them in case you are dissed by a uhoocrap algolithm
Hey man how’s it going! I installed a program and the hacker put a virus into my pc and he was able to get all my emails and even my moms. Please I need help
Wow this video is worth its weight in gold.
Initially having typed in the "ESTABLISHED" part I nearly died there where 20 foreign connections.
But having followed your simple instruction using Task Manager I quickly realised that most of them were Bitdefender processes.
And the rest were browser processes Firefox & Edge.
So I'm pretty sure at least for now nobody is remotely accessing my computer.
Thanks for an amazing video.
You've got a like from me and just gained another sub.
Thanks again.
And thanks for putting my mind at ease.
This is a must see video for any computer user.
Much appreciated 😀👍
Soo deserved 1 Million subscribers!!!🥳🎉 I have been watching you for 3 years and it's crazy how much you have grown.
How does one get the vertical slash after the space ano? I simply can't find it.
Like the video. You should address how to resolve the hack so that the hacker cant get an established connection, once more.
Agreed
Thanks! Got the windows applications you listed and I felt like a Blue Team/SOC when I was checking my processes for suspicious TCP connections. 😂
"One word" you are fucking amazing bro, thanks for all these tutorials.
🤓 that's more then one
That's a sentence, but ignore the hateful comments. Proceed 😊
@@amongusboi2032 lol do you really think, that i give a fuck what others think
@@chevaliernoir5549 That's the spirit, lad! Be not mindful of the attention seekers.
@@musicguy-z6r yeah that was like 3 or something , idk I lost count
Kudos to you Sir! 5 stars deserved!
salute from Italy
Love it! Congragulations on 1m!! You deserve it!
Amazing tutorial and very informative, Mr. Loi can you make a series on this topic?
The only thing your videos are lacking is you sharing the commands and scripts. It would be nice if the commands and scripts you use were shared on Github so we can test in our own labs. Thank you.
Thank you so much
Would love a Mac equivalent
Like the hard endings, with no goodbye. Like he was hacked
is it normal if i dont have any?
Congratulations 🎉 1M subscribers ❤❤
Is there a similar technique for macos?
Perfect! Thank you, this is easy way to understand.
Thank you!
Excellent video, thank you.
Could you make a video detailing how to essentially do this same thing using PowerShell?
Congrachulation 1M subscribe🥊
Damn I knew about sysinternal tools but those were some cool cmd tools
Have you made same video for a Mac? Thanks in advance
Yes, but dont Tell the Hacker that ist der Them.
Ah deutsches Auto korrekt
so enlightening bro....that was really cool.
Dude You OWN!!!! ur amazing !!!!!! big up 👍👍👍
This video is pure gold.
Great video. Questioning new IP cameras that are made in China. Files created on memory card are in Chinese. Wanted to know if they can be converted into English. The cameras force you to format the memory card. Also evertime it update it doesn’t recognize the old card.
It would be great if you also make a tutorial for Linux (unless Linux is unhackable) and for Android smartphone!
Linux is not unhackable...... but it is extremely difficult to do so.
Congratulations for 1 million
studied cyber security and never seen anything like that. didnt finished the program anyway.
Wow thank you! Is there a way to do this on a Google pixel or Android?
Thank you so much!!!
You are the one of beast 😄 thank you professor 🤡😁
Thanks you so much sir you saved my life
Your videos are awesome, truly amazing 🙂😀😄🤩,knowledge is power. Hey, here's a quick QUESTION how can we check and do the same for/with ios and android mobile device's? I must repeat this message to make sure that you're reading it, sorry for being persistent 😅
Hey, here's a quick QUESTION how can we check and do the same for/with ios and android mobile device's? I must repeat this message to make sure that you're reading it, sorry for being persistent 😅
why didn't you show ppl the you have to add '' >wmic process where'' before the 5052,... they might be a beginner like me
Bro, you laugh like Beavis and butthead 😅.
go deeper in the rabbit hole, love your vids
I wonder if you can get a virus without running the executable or even without starting it, just by sitting inside the registry or getting analysed by the scheduler etc.
dont forget to change the speed at 0.75 because this guy speaks to quickly
is it a bad sign if there are like 20-30 connections established in the netstat??
but most of them begin with the same 3 numbers.
what if I use arch BTW
Very useful information.
I like this vid. Good insight and interesting.
Can I use quasar to remote control my own pc and hear my sound? The idea is that I'm a professionall video editor and want to use my workstation to edit videos remotely, but all the other tools for remote access are expensive or laging a lot. Can quasar forward sound also ?
Great video. Thanks
From which pharmacist we can grab this medicine please?
I did the command prompt One as it’s the easiest one I could think of it’s also the only one I could really get through at the time if all I see is just the mandatory stuff does that mean that I’m safe
I have more netstat things than you . is it ok to have many ?
How do I remove "Login Options" on the login screen? (Below the windows password entry box). Thank you and best regards.
Hey, could you show how to merge to exe files into 1? Thx
good video, but should probably leave some room at the end to close out the video. otherwise its a bit abrupt
Please mr hackerloi wireless attacks tutorial
Hi, so i runned the get ExecutablePath from and if and it appeared blank but said"ExecutablePath " and then just blank, please tell me what do i do
I had the same thing... these tutorials are brief they don't explain stuff like this :/
This is all good for windows and PC but what about Mac users?????????????
Something similar for Mac?
What if after doing wmic process where processid=5052 get ExecutablePath, it says "No instances Available" ?
Thank you
Yes.
Thanks sir
Congratulations bro you got 1m subscriber 🎉❤😊
Do a real hacking tutorial how you get access to their server pc etc…. Then infect more devices
Can you teach how the person who is hacked somehow takes over the attackers computer? Or is that not possible
When i search the path of the executable, it doesn't appear, at 4:09 ?
Very good content
How tell if my wathsapp application on phone is hacked ?????
This is amazing bro thanks for these tutorials ...RESPECT!
Simpel. every gadget, device is hacked. No worry.
How can I be a member to get access to others videos?
I couldn't locate it so I just deleted it will this achieve the same results?
OK video but better to type text and not write freehand for clarity
cmd is launching automatically for just 0.5 sec it get off immediately when I running windows 11 on my Laptop 💻 ( After Turn ON first time ). Is it's Hacked ? I Think some unusal activity or something else running in background Laptop is Fan Running fast Hanging. How to check?
This won't work for stealth RATs.
you are a GENIUS
Hello Sir Next Video how to encrypt undetectable quasar paylpad please❤
Hey, How do we check for mac 😅
I was roaming through discord and found a server which gave free hacks i was dumb enough to install it and...they said to turn off antivirus i did it.after few minutes i was afk and when i came back i saw my cursor moving...a guy got into my pc read all my chats tried to install anydesk and transfer files but i was quick and i had a tech friend he helped me and gave me antivirus i am sure that he couldn't transfer my files but he installed some sus dll file
hey
sometimes i see my run panel is on... and icon moved... and when i log in my window .or go to edge browser it shows Indian languages... what should i do?
You need to slow down much too fast to follow.
Playback video at -0.75 X.
I like this dude lmao
talked to fast and this isn,t for beginners
Super Loi.
Could you also make a similar one for macOS and linux as well and also finding out IoC in a firewall.
Thanks 😊
Hello sir my pc is hacked by linux how can i remove this?
Really important for all.مهم جدا للجميع
is there going to be an Ai-ish tool which grows in "intelligence" coperatively (amongst us all) such that for example many of the "hacks" you show can be run automatically (so the Ai connected tool would take control i.e. a version of "you") and any vulnerability spotted and then passed thru to the analytical side of the Ai database, (I mean Ai is another form of database?) so could be run locally on a suspect computer and all the swept data pooled from many of us, i am not a hacker i am an rf specialist so computer hacking is very interesting allied trade but i am a bit (or byte) too old to learn new tricks well some of these tricks you show have enlightened me today (good to be enlightened in thailand :-) kop kun kup) thanks for the videos I am recording all of them in case you are dissed by a uhoocrap algolithm
I am doing this with my brother hope he doesn't see this video😂
😂😂😂
Do you 5 finger shuffle to his porn?
He can take legal action against you 😂
with my mom❤😅😂😂
Why’d you comment?
Nice work
Nothing even show up in my netstat same thing as you
If a hacker hacked my PC can they see, my wifi password and my other devices online.?
Happy one million🎉🎉
You have a mainstream operating system, you're already hacked. 🙃
Solved.
suddenly with different hair style
!,,,😢😢😢pls reply !! Ihave only ipad how can i use kali linux on it ❤❤
Hey man how’s it going! I installed a program and the hacker put a virus into my pc and he was able to get all my emails and even my moms. Please I need help
i still need help
Great video
Startup item: YourePwned
Publisher: YourMommaFat
What to do?
You are awaited in Valhalla
can u help me my some problem
how does a paying customer get a hold of you.
By default. Just like yours.