Friday, 2 January 2015
Just type the following codes
Troll face: [[171108522930776]]
ARE YOU FUCKING KIDDING ME: [[143220739082110]]
Not bad Obama: [[169919399735055]]
Me Gusta: [[211782832186415]]
Mother of God: [[142670085793927]]
Cereal Guy: [[170815706323196]]
LOL Face: [[168456309878025]]
NO Guy: [[167359756658519]]
Yao Ming: [[218595638164996]]
Derp: [[224812970902314]]
Derpina: [[192644604154319]]
Forever Alone: [[177903015598419]]
Not Bad: [[NotBaad]]
Fuck yeah: [[105387672833401]]
Challenge accepted: [[100002727365206]]
Okay face: [[100002752520227]]
Dumb bitch: [[218595638164996]]
Poker face: [[129627277060203]]
Okay face: [[224812970902314]]
Socially awkward penguin: [[98438140742]]
Rage face: [[FUUUOFFICIAL]]
Lamp: [[100001256102462]]
No: [[167359756658519]]
MOG: [[142670085793927]]
Feel like a sir: [[168040846586189]]
Forever alone christmas: [[125038607580286]]
NOTE:- You have to type [[ ]] also either it can't work
Subscribe to:
Post Comments (Atom)
Search
Followers
Popular Posts
-
Bypassing UAC with PowerShell Recently during a Red Team engagement, I got shell access to some user machines using Client Side Att...
-
Note: This Article Is Not For Noobs! Learners Are Welcomed! This Article Is For Educational Purposes Only, Any Misuse Of Information Give...
-
Just follow the steps as given below :- First copy any Image to your C: directory Open cmd by going Start-Run program- type cmd (A...
-
SyntaxNet: Neural Models of Syntax. Installation Running and training SyntaxNet models requires building this package from source. Yo...
-
You Have To Follow These STEPS: 1. Open notepad and paste the following code in it. 2. Change the password in place of (qwe...
-
Go to Start > Run > type " regedit ". Once in regedit go to [HKEY_CURRENT_USER\Software\Microsoft\Window...
-
So Here Is A Trick Now U Can Chat With Your Friend Through Command Prompt.. You need only your friend IP address.. Open Notepad and ...
-
Today our tutorial will talk about Kali Linux Man in the Middle Attack. How to perform man in the middle attack using Kali Linux?we will ...
-
This article is a quick, comprehensive guide on setting up your newly installed KaliLinux2.0 (very attractive new GUI by the way) for secu...
Blog Archive
-
▼
2015
(72)
-
▼
January
(38)
- Posting your Facebook Status Upside Down...
- Is Free Antivirus Really Good?
- QUESTIONS THAT CAN COME IN YOUR C PROGRAMMING TEST.
- Basic C PROGRAMMING LPU
- Create Facebook Page without Name-How to Guide
- Refresh Your Full Computer By Just One Click
- Making own Simple Port Scanner
- Hacking With PRORAT...
- Use Google as A proxy..?
- Hacking A Iphone Passcode....
- How to Create folder named CON?
- Skip the Annoying "Use the Web service to find the...
- HOW HACKERS GET CAUGHT.
- HACK A WEBSITE WITH HTML CODING...
- Magic In Windows..
- Compress 1 GB into 10 mb
- Online chat tricks..
- Make Your own speaking programme with Batch file a...
- Programme to annoy anyone one..
- DDOS ATTACK MANUALL
- HOW TO BLOCK YOUR ENEMY'S SIM CARD
- HOW TO CHANGE THE ICON OF YOUR PEN DRIVE
- Disable the “Send To” Folder on the Windows Explor...
- WMIC commands for Auditor and Hacker
- How to "Delete administrator Password" without any...
- How To Use Mobile Camara As A Webcam
- Setting A Video As Desktop Wallpaper..
- Send Coloured Message on Facebook...
- How To Stop Someone's Internet Access..
- Facebook Hacking
- How To Hide Drives in Windows?
- Advance Matrix Efect Using Notepad...
- How To Grab Your Friend IP
- HAVE YOU DOWNLOADED TORRENT FILE WITH IDM
- Want to crack BIOS PASSWORD...
- Some Windows Amazing Tricks
- Chat With Friends Through Command Prompt(CMD)..
- Shutdown Your PC by Timer...
-
▼
January
(38)
Text Widget
Powered by Blogger.
0 comments:
Post a Comment