/* */

pro hacker teaches you how to bypass this!

RunDLL32.exe is used to execute numerous dynamic link libraries for access into the target machine
// Membership //
Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: https://www.youtube.com/channel/UC1szFCBUWXY3ESff8dJjjzw/join

// Courses //
Full Ethical Hacking Course: https://www.udemy.com/course/full-web-ethical-hacking-course/
Full Web Ethical Hacking Course: https://www.udemy.com/course/full-web-ethical-hacking-course/
Full Mobile Hacking Course: https://www.udemy.com/course/full-mobile-hacking-course/

// Books //
Kali Linux Hacking: https://amzn.to/3IUXaJv
Linux Basics for Hackers: https://amzn.to/3EzRPV6
The Ultimate Kali Linux Book: https://amzn.to/3m7cutD

// Social Links //
Website: https://www.loiliangyang.com
Facebook: https://www.facebook.com/Loiliangyang/
Instagram: https://www.instagram.com/loiliangyang/
LinkedIn: https://www.linkedin.com/in/loiliangyang/

// Disclaimer //
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.



  1. can you hack someone for me he stole my account ik his email but not his number i need his number please answer me

  2. Run is usually blocked. Is there any other way?

  3. Hello Mr

    Loi Liang Yang, I have a problem concerning the recovery of my google account, I forgot my passwords so when I click on forgotten passwords I am told that they will send me a code to my number, then they say they will send me another validation code to my recovery Gmail address which is the same Gmail with the problem. I HOPE YOU CAN HELP


  4. we can do that in group policy

  5. "Super simple example here"

    Uh huh.

  6. πŸ‘πŸ‘πŸ‘πŸ‘πŸ‘πŸ‘πŸ‘πŸ‘πŸ‘πŸ‘πŸ‘πŸ‘πŸ‘πŸ‘πŸ‘πŸ‘πŸ‘πŸ‘πŸ‘πŸ‘πŸ‘πŸ‘πŸ‘πŸ‘πŸ‘πŸ‘πŸ‘πŸ‘πŸ‘πŸ‘πŸ‘πŸ‘πŸ‘πŸ‘πŸ‘πŸ‘πŸ‘πŸ‘πŸ‘πŸ‘πŸ‘πŸ‘πŸ‘πŸ‘πŸ‘πŸ‘πŸ‘πŸ‘πŸ‘πŸ‘πŸ‘πŸ‘πŸ‘πŸ‘πŸ‘πŸ‘πŸ‘

  7. Im not gnna lie, I'm beyond confused πŸ₯²

  8. Hacking is illegal if you get caught πŸ˜…

  9. as a student i did smt like this had some help from reddit lmaooo but pretty much what i did was i replaced the ease of assess thing in the windows login thing with cmd so i would have access to admin cmd and then give my acc admin so i went to do just that i put windows 10 in a usb so i could press F10 so i got cmd and then replaced ease if assess with cmd pretty easy well had some down falls like the bios was lock i got rid of that with a bios pass reset online so that was easy then at the very end i got admin but they has 2fa on the main admin acc on the pc that was the first one i tried and in the end i got caught so wouldnt try that kids lmaooo thats my story

  10. This guy is so talented! Also, he's the azn version of Andrew Tate!

  11. ima be the school hacker now XD

  12. I’m dying to know how to do this on a Lenovo chrome book. I bought this used chrome book off of somebody on Kijiji. Little did I know that I would have so much trouble resetting this Chromebook as I didn’t realize that it was a lot to an administrator and I think it’s a school administrator account. I’ve unlocked countless laptops, desktops phones tablets, Google large ones iCloud factory reset protection windows MacBooks doesn’t matter. This is the first time of all things. Damn Chromebook of course actually has me beat, it won’t let me go into developer options. Any suggestions?

    Well, here’s the backstory on how it came about this awful device.
    Frankly I got it for cheap and I buy up used laptops. Generally not chrome books. In fact this is the first Chromebook because I don’t like them. Plus, I can’t believe that they started off so inexpensive as they should be because they’re frankly glorified tablets, in fact, iPad or even a an iPhone 12 pro max let alone 14 when hooked up to a monitor and correctly with a keyboard and mouse connected via Bluetooth will work better than your average Chromebook.

  13. I wish you would make a video on links that require a citation

  14. My phone is hacked may need your help to remove the hacking app off my device

  15. my yahoo was scammed plsss help me😭 I can provide the Convo of the scammer

  16. pls tell the color scheme of youre mousepad

  17. rundll32.exe shell32.dll,ShellExec_RunnDLL cmd.exe

  18. Its pointless having a pic of your face on your profile and then wearing a mask in video. All it does is muffle your speech, English is clearly already a 2nd language and very good by the way but this combined with the muffled talk.
    Then if command prompt has been disabled by a system admin so will the run command be disabled, both in task manager and from the start menu. You do not need to mess around running scripts, all you need is an open policy configuration file on a USB stick or emailed to yourself. This will remove all of the local restrictions on the machine and can be ran from an account of any level. You see local policies are designed to be just that local, a reboot depending on the network may reinstate the policies again as a good system admin will set policies as Windows loads incase they have somehow changed. To use policy editor and make a policy you will need admin privileges but to install a policy does not. You can simply make it on a machine you have admin access on then transfer it. You may loose access to some network services but you can relaunch these once you have admin access from the policy. Windows will still count you as a normal user however you will have admin privileges locally. Microsoft has tried to lock this out several times but due to the need for admins to run policies at system startup the admin requirement to apply them only caused faults and was subsequently removed. Your work/college IT staff if you can figure out what I have said will hate you knowing this. Any attack on their system starts with admin privileges on a local machine or at least the ability to be able to run whatever programs you wish.

Leave a Reply

Your email address will not be published. Required fields are marked *