Now introducing "haxx", a nonsense hacking generator.
Posted by Beautiful_Crab6670@reddit | linux | View on Reddit | 145 comments

Gives you a bollywood experience right into your terminal, with more than 1000 ips simulated! An INFINITE amount of simulated names! Over 100 different types of glitches! An overly dramatic hack, just like seen in the movies! And more (If you -REALLY- have a lot of time to spend staring at this command.)
Click here to grab the C code, followed by instructions on how to compile it.
uForgot_urFloaties@reddit
IP should have higher numbers lol. 371.3.785.500
SufficientlyAnnoyed@reddit
No joke, I was troubleshooting a newer HP printer on our network. Checked the network settings on the tiny screen and there were several octets reporting as numbers past 300. Un-plug, plug it back in. Worked after that. *shrugs*
Beautiful_Crab6670@reddit (OP)
That's a solid idea... but -something- must make sense out of this. Or else it won't be fun at all. I'd say, 10% relevant and 90% "bunch of gibberish" is a great balance.
Master-Broccoli5737@reddit
Still doesn't make sense, that's a reserved multicast space. No one is tracing you from that.
ButtonExposure@reddit
You could add an easter egg where the program turns the computer off if it by random chance chooses 127.0.0.1.
ScrotsMcGee@reddit
Just watch CSI:Cyber for inspiration. I watched about 10 minutes before I rage quit and tried to destroy my monitor - from the inside.
Pretty sure they used out of range IP addresses, so I think the suggestion by u/uForgot_urFloaties is actually pretty good.
Beautiful_Crab6670@reddit (OP)
Eh, I just updated the code making it less "gibberish nonsense" -- I suppose I can "gibberify" the ip adresses.
ScrotsMcGee@reddit
Only if you want. It's more from a "if you know, you know" perspective.
No-Savings5477@reddit
Can you simulate hacking time?
Beautiful_Crab6670@reddit (OP)
I could add a "failure conditiion" to the command, where the user can "go back in time" by mashing keys nonstop (something like "Warning: You are being counter-hacked! Mash keys to counter hack the conter hack, hacker!" where a progress bar shows The hacker "strength" versus "Your strength". Mashing keys increase your strength, but doing nothing makes the hackers strength grow. If his strength reaches 100%, the hack is considered as "failed".
But then again, that could introduce to input lag and/or a massive increase in cpu usage -- which might make the command less appealing to everyone else. Whiiiiiiich is why I'm kinda "stuck" right now trying to progress further -- one of my latest ideas introduces some massive lag, which I'm trying to circumvent/"dodge" this issue.
-Wylfen-@reddit
I hope you put a flashing and beeping message at the end saying "Mainframe accessed"
santanzchild@reddit
Plot twist it actually is a virus that opens a backdoor in the system to a massive bot ney.
ScrotsMcGee@reddit
Plot twist it actually is ~~a virus~~ malware that opens a backdoor in the system to a massive bot net.
Analog_Account@reddit
Is that not what a virus is?
ScrotsMcGee@reddit
Context is everything.
A virus is a specific type of malware, but it also has a fairly specific definition which doesn't suit the context in which it is being used in.
Virus:
Source: https://csrc.nist.gov/glossary/term/virus
Quote: "Plot twist it actually is a virus that opens a backdoor in the system to a massive bot net."
In this particular context, the word "trojan" or even the more generic term malware would have suited better, because if this particular program had a backdoor, it would actually be a trojan - not a virus.
Trojan:
And
Source: https://csrc.nist.gov/glossary/term/trojan_horse
You really don't see many computer viruses these days, whereas you still see a lot of trojans (particular RATs - Remote Access Trojans).
But why did I use the term "malware"? Just because it's a catchall.
Both viruses and trojans (and worms and ransomware etc) are forms of malware.
My background is in information technology and security, which is why it annoys me when the incorrect term is used (particularly so because of so called cyber security shows like CSI:Cyber).
andreicon11@reddit
that's a worm
ScrotsMcGee@reddit
Quote: "that's a worm"
Actually, a worm is self replicating. It does not infect other files.
Worm:
A self-replicating program that propagates itself through a network onto other computer systems without requiring a host program or any user intervention to replicate.
Source: https://csrc.nist.gov/glossary/term/worm
andreicon11@reddit
you can see for yourself how that and
have the same damn meaning
ScrotsMcGee@reddit
You clearly didn't read the definitions, or you don't understand them.
andreicon11@reddit
and
if the computer wasn't already infected, it means the "copy itself" part isn't from the same computer. hence self-propagation over network
i'm using your definitions
maybe you should find other sources
ScrotsMcGee@reddit
You clearly have a comprehension problem.
Educate yourself.
QuickSilver010@reddit
So a virus is just a subcatagory of a worm
ScrotsMcGee@reddit
Definitely not.
Because of the way that a virus and a worm work and replicate, they are different (albeit, with some commonalities).
They both fall under the category of malware though.
andreicon11@reddit
As per your initial definition of a virus:
Are you mentally challenged?
ScrotsMcGee@reddit
No, but you clearly are.
Firstly, you appear to be arguing that you know more than the actual source that was used, which is actually the National Institute of Standards and Technology, which is part of the US Department of Commerce.
The CSRC element of NIST looks after computer, cyber and information security and privacy.
So, you're effectively claiming that NIST - who also develop cybersecurity standards, guidelines and best practices - know less than you.
That's just delusional of you.
Secondly, you continually only use a small section of the full definition that I posted from NIST, but don't actually appear to comprehend the full definition.
That's on you.
Thirdly, you're fixated on an even smaller subsection of the definition, and claiming that because it shares some commonalities, that it must therefore be something else.
No. It doesn't work like that.
Finally, you continually skip the other key aspects of what makes a worm, a worm. The fact that they are self-propagating, that they are self contained, and that they use networking mechanisms to spread.
Viruses and worms share some commonality - just like a dog has a heart, and a cat has a heart, but a dog is not a cat, and a cat is not a dog.
Your fixation on one small commonality while ignoring everything else is your problem.
The fact that you appear to think that you know more than NIST is just sheer delusion.
But hey, let's run it past ChatGPT:
Me: What is the difference between a computer virus and a worm
Good question โ theyโre similar but different in an important way:
Computer Virus
A virus attaches itself to a legitimate program or file and needs human action to spread (like running an infected file). It can't move on its own โ it needs you to do something first.
Computer Worm
A worm is self-replicating and spreads automatically across networks without needing a host file or any help from a user. Itโs like a virus on autopilot.
In short:
- Virus = needs help to spread.
- Worm = spreads by itself.
In short, you're consistently being proven wrong, but you're so delusional, that you're ignoring fact.
Good luck in life - I get the feeling you're going to need all the help you can get.
You won't be getting another response from me.
andreicon11@reddit
literally on every page, you fuckin muppet
andreicon11@reddit
i'm not reading all that, you're a moron
i_smoke_toenails@reddit
Pedantic, but not wrong.
ScrotsMcGee@reddit
My background is in IT and security, so it one of those little things that just annoys me - more so when it's used incorrectly in TV shows and movies because they teach everyone the incorrect terminology.
2204happy@reddit
Nah, it's pretty clearly safe, take a look at the source.
TheRealItzLegit@reddit
you missed the joke
santanzchild@reddit
Thank you.
TheRealItzLegit@reddit
also happy cake day ๐
TheRealItzLegit@reddit
all good
psaux_grep@reddit
Have you heard about the obfuscated C contest?
bombero_kmn@reddit
You mean Perl?
rfc2549-withQOS@reddit
No. Perl is worn code. Write once, read never
Evantaur@reddit
Perl backwards is lrep... Coincidence?
TheHENOOB@reddit
The source code has a hidden binary in the test files.
2204happy@reddit
Test files? It's just a single c file.
TheHENOOB@reddit
You didn't catch the reference.
2204happy@reddit
XZUtils reference?
dadnothere@reddit
Why C and not CSS?
I'm afraid to use things written in C, my friend.
100GHz@reddit
Is it the floppy emoji usage ?:)
JamesIV4@reddit
Still an actual concern, so thank you
earthman34@reddit
Send it to whoever makes those CSI shows, they'll love it.
SlightComplaint@reddit
Whenever my local news wants to report on 'hackers' or 'scammers' their goto video is someone using Linux in the dark. ...not even Kali, just someone coding in a terminal with the lights off.
immDroidz@reddit
"Im hacking into the mainframe, but the firewall is strong! I need more time!"
while the terminal is running sudo apt update
xanthium_in@reddit
Please download more RAM from the internet
EcstaticHades17@reddit
me when I use google drive as swapspace
Zahpow@reddit
Keyboard mash "I'm in"
GeekoftheWild@reddit
While running neofetch
BleaKrytE@reddit
And htop
hEllOmyfrIEnd785@reddit
And... Nerdfetch
ellis_cake@reddit
Ive seen instances where they show a terminal running a long ls filelisting as 'hacking' :)
earthman34@reddit
Sitting in the dark in front of a terminal gives you stealth +3 and hacking +5.
UntestedMethod@reddit
Neck pain +3
Porntra420@reddit
"The hacker broke into Corporate Inc's servers and stole over 3 exabytes of user data"
shows stock footage of a guy writing HTML
Big-Afternoon-3422@reddit
I'll be more scared of someone using a random Linux distro than someone using Kali 99% of the time.
ScrotsMcGee@reddit
I do my best coding in the dark.
And by coding, I mean looking at porn.
Board_Game_Nut@reddit
Just remember, if you're getting hacked, you can get a friend to help you type on the keyboard faster. Learned that on NCIS :)
Royal-Ninja@reddit
reportedly they put that in because nerds were complaining about how unrealistic the hacking was and decided to make it even dumber
gthing@reddit
I'm not sure how to contact them. I'll create a GUI interface in Visual Basic, see if I can track an IP address.
KenFromBarbie@reddit
Every character appearing on the screen should have a bleep, because that's how these things work.
Psychological-Tap834@reddit
I will sometimes ssh into my server and do some programming on there or general management in class when I am bored or have some free time and people think I am hacking. Guess I should start running this just to fuck with them some more
raelonmasters@reddit
This will be used in movies and TV within the next 3 years.
Rob_W_@reddit
My kids (ages 9 and 16) gave critical commentary, and I was forced to write a clone for myself. Sorry, not a C coder, so I just slapped it together in Perl.
My version (phaxx): https://imgur.com/a/9NacdHC
Thanks for the fun idea!!
Beautiful_Crab6670@reddit (OP)
Hey, that's a pretty nice perl command you've got there. Glad to hear that it made spark on you and your kids some connection -- which is essential these days.
Oh, and it even sparked something on me as well -- a new idea to implement in the code. Think I'll be able to "oneshot" it, so expect a new update soon enough.
RiskyChris@reddit
this is silly. love it. can u provide a list of the infinite names, id like to use them in a project.
CDBurner22@reddit
Tbh, this looks like a pretty nifty tool to generate encryption keyes lol.
pppjurac@reddit
Really, you could sell this to MAGA Administration HQ for pretty penn.. I mean trumpcoin
vainstar23@reddit
you should try
apt install hollywood
gjallerhorns_only@reddit
Initiating Hollywood Protocol
klyith@reddit
haxx | nms
bahmoudd@reddit
my brother already thinks im hacking the white house by installing arch linux
puxx12@reddit
Oo fun
pinapee@reddit
A gigabyte of RAM should do the trick.
AmanoSkullGZ@reddit
Perfect except the people who are supposed to use it only know Python and don't know what a "cumpieler" is
creeper6530@reddit
The filmmakers won't be able to compile C code.
Wu_Fan@reddit
r/VXJunkies
ghendiji@reddit
Still a long way from beating htop
OptimusPower92@reddit
r/masterhacker will love this XD
Jeoshua@reddit
How long until some low budget crime drama flashes this up next to `hollywood` to show how serious the hacking is getting?
Beautiful_Crab6670@reddit (OP)
"Whoa... look at all these people being hacked!..."
(Screen focus on the bunch of nonsensical gibberish appearing on screen)
"OH MY GOD I CAN SEE MY MOMS NAME THERE!"
muvijw@reddit
Reminds me of Rust-Stakeholder: https://github.com/giacomo-b/rust-stakeholder
PixelGamer352@reddit
I think it would be better if was rapidly shooting down the terminal instead of staying in place
DerKnoedel@reddit
Are those emojis in the source?
RectangularLynx@reddit
I've found that it also compiles with Clang if you remove the
-static
argument.What's the license? I've been interested in packaging this in the Arch User Repository
Beautiful_Crab6670@reddit (OP)
Wasn't expecting it to be this popular, to be honest... but feel free to follow the good old Do whatever you want license for this.
Top-Classroom-6994@reddit
Add the license to source code/repository, so it legally applies
githman@reddit
I remember I made something like this for a CP/M university Robotron about 40 years ago, only without the fancy colors because there were none. My excuse is that it was my first year. Girls were agitated appropriately, though.
sciss@reddit
I'm on it https://www.youtube.com/watch?v=8amVbdf3nik
Zeldakina@reddit
This is weak. If you really want to hack this is how.
wildfunctions@reddit
canโt see that one ip that flows off the cmd window. kinda sucks.
grejprr@reddit
that dude stopped posting because he hacked into localhost. the government is after him
SolidKnight@reddit
Localhost is on every computer!
plane-kisser@reddit
my god
Human-Equivalent-154@reddit
The NSA backdoor!
KokiriRapGod@reddit
This really highlights why it's so important to have a good connection. You don't want everyone being able to just see your IP because you cheaped out on your link.
snouz@reddit
"10 people are currently looking at google"
brighton_on_avon@reddit
Do I need to wear a hoodie with the hood up and sit in darkness?
nickthegeek1@reddit
Hoodie is mandatory, but for maximum effect you'll need fingerless gloves and atleast 3 monitors displaying green text on black backgrounds.
I_Arman@reddit
One monitor needs to be displaying quickly rotating black and white images of wars, natural disasters, and/or mug shots. And maybe a line art world map with flashing dots and a line randomly zigzagging between them.
brighton_on_avon@reddit
Microwave close by to fry the SD card
QuriosityProject@reddit
Ah, the monster energy drink themed desktop, to co-ordinate with the cans on the desk/floor.
Littux@reddit
Would've been funny if all the IPs were variations of 127.0.0.1 like 127.12.5.8 or 127.6.23.164
rydan@reddit
Those are technically valid IP addresses. You need to have at least octet be invalid.
Ok_Awareness5517@reddit
Does this launch cybernukes if the trace zeros in close enough?
Beautiful_Crab6670@reddit (OP)
Hm... I could add a small easter egg that does exactly that when all numbers are zeroes. Like a "DEPLOYING CYBERNUKES TO: (Encrypted gibberish followed by an annoying, red flash all over the screen)" for a minute or two. Then it resumes back to the hack.
Ok_Awareness5517@reddit
Here is what I am referencing, just to inspire you more
https://www.youtube.com/watch?v=K7Hn1rPQouU
hEllOmyfrIEnd785@reddit
Windows shell prompt: start counterstrike
Dude this is a PAIN to watch
theheliumkid@reddit
That video was soooo funny!!!
xDannyS_@reddit
Do real nukes instead
monsieurlazarus@reddit
I have gcc(clang) installed on my Windows 11 laptop and successfully compiled the code, but the
-03
parameter wasn't recognizedBeautiful_Crab6670@reddit (OP)
Alright, just updated the code adding a "666 event" (It triggers when ips at "target acquired" and "trace detected" are 6.6.6.6. Just to "spookify" it a bit. In short: Screen goes black, random gibberish text keeps appearing while some letters flickering blood red. Then a small jumpscare happens and the hack resumes.)
Also, added a chance for TERABYTES to change into PETABYTES, EXABYTES, ZETTABYTES or even YOTABYTES. (Yes, they do exist.). Also made the hacking message have more "sense" (It does not change actions "abrutely", matching what a real bollywood hack would perform.)
KokiriRapGod@reddit
How good is it at playing fox?
Organic-Algae-9438@reddit
Reminds me of Genact: https://github.com/svenstaro/genact
Svenstaro@reddit
Yay! :)
kog@reddit
I quite like that font, what is it?
NETkoholik@reddit
Where's the IP out of range?
Arcturas84@reddit
Nice try SkyNet!
goku7770@reddit
How did you get my IP address?
furballsupreme@reddit
I matched all IP addresses to people's internet connections, except yours. So that is how I knew this one was yours!
Zomunieo@reddit
No IPv4 octets above 256, 2.56/10. Plausible but invalid is essential.
Would also work to use the 172.16 or 10.* private networks. Or, IPv6.
trenixjetix@reddit
Thanks, i had a chuckle xD
dsXLII@reddit
Live feed from the Threatbutt NOC, it is
Live_Surround5198@reddit
r/itsaunixsystem
trecv2@reddit
r/masterhacker would be interested, somehow
Beautiful_Crab6670@reddit (OP)
Eh...alright, I've crossposted this there. Should get a few giggles out of em.
furballsupreme@reddit
Hello, you have been infected by Albanian virus. Here we are very poor and could not make real virus. So please be kind and delete your own files and forward the virus to all everyone in your addresses book. Thank you!
reimann_pakoda@reddit
๐๐ฅ๐พ
These have always been default emojis in all those edits that we make for JEE and NEET lol
vesterlay@reddit
Hello your computer has virus
Terrible-Hornet4059@reddit
Hello your computer has urass.
KaTTaRRaST@reddit
Helo, your computr has 476 viru ses Click Here to downlolad our induan antivirus for free .
DoucheEnrique@reddit
Needs moar IPv5 adresses.
RangerNS@reddit
https://hackertyper.net/
M1sterRed@reddit
reminds me of
hollywood
DocumentObvious4647@reddit
Lolz this would be fun to pair with OpenCV and put it all on a bunch of USB sticks with an autorun loop.... lolz
jEG550tm@reddit
Use an invalid IP, you might accidentally compromise some random dude
FutureSuccess2796@reddit
Someone oughta leave this running in front of a friend or family member who's not tech-savvy and capture their reaction. Had family think I was a hacker because they saw me installing packages via the terminal, so this would definitely have them confused. ๐
vaynefox@reddit
I mean, I am compiling some projects in the terminal, and my relatives seeing it while compiling. Then they look at me with a great concern like I just committed a crime....
ThankYouNeutronix_02@reddit
Hollywood 2 Electric Boogaloo
Tim_Buckrue@reddit
Now scammers are going to use this to make their victims think they have a virus
driftless@reddit
CPE1704TKS
dzuczek@reddit
where's the github and unit tests?