WindowsSpyBlocker:-- #Block #spying and #tracking on #Windows
#WindowsSpyBlocker is an #application written in #Go and delivered as a single #executable to block spying and tracking on Windows #systems.
The approach of this project is to capture and interpret #network #traffic based on a set of #tools. Depending on the interactions between services and source or #destination of traffic, rules are created and sorted by #assignment.
#Downlaod #Link:-
https://github.com/crazy-max/WindowsSpyBlocker
WindowsSpyBlocker:-- #Block #spying and #tracking on #Windows
#WindowsSpyBlocker is an #application written in #Go and delivered as a single #executable to block spying and tracking on Windows #systems.
The approach of this project is to capture and interpret #network #traffic based on a set of #tools. Depending on the interactions between services and source or #destination of traffic, rules are created and sorted by #assignment.
#Downlaod #Link:-
https://github.com/crazy-max/WindowsSpyBlocker
#WindowsSpyBlocker is an #application written in #Go and delivered as a single #executable to block spying and tracking on Windows #systems.
The approach of this project is to capture and interpret #network #traffic based on a set of #tools. Depending on the interactions between services and source or #destination of traffic, rules are created and sorted by #assignment.
#Downlaod #Link:-
https://github.com/crazy-max/WindowsSpyBlocker
WindowsSpyBlocker:-- #Block #spying and #tracking on #Windows
#WindowsSpyBlocker is an #application written in #Go and delivered as a single #executable to block spying and tracking on Windows #systems.
The approach of this project is to capture and interpret #network #traffic based on a set of #tools. Depending on the interactions between services and source or #destination of traffic, rules are created and sorted by #assignment.
#Downlaod #Link:-
https://github.com/crazy-max/WindowsSpyBlocker
MifareClassicTool:-- An #Android #NFC app for reading, writing, #analyzing, etc. MIFARE Classic #RFID tags.
Features:--
1. Read MIFARE Classic tags
2. Save, edit and share the tag #data you read
3. Write to MIFARE Classic tags (block-wise)
4. Clone MIFARE Classic tags
(Write #dump of a tag to another tag; write 'dump-wise')
5. Key #management based on dictionary-attack
(Write the keys you know in a file (dictionary).
MCT will try to authenticate with these
keys against all sectors and read as much as possible.
See chapter Getting Started.)
6. Format a tag back to the factory/delivery state
7. Write the manufacturer block of special MIFARE Classic tags
8. Use external NFC readers like ACR 122U
(See the Help & Info section for more information.)
9. Create, edit, save and share key files (dictionaries)
10. Decode & Encode MIFARE Classic Value Blocks
11. Decode & Encode MIFARE Classic Access Conditions
12. Compare dumps (Diff Tool)
13. Display generic tag information
14. Display the tag data as highlighted hex
15. Display the tag data as 7-Bit US-ASCII
16. Display the MIFARE Classic Access Conditions as a table
17. Display MIFARE Classic Value Blocks as an integer
18. In-App (offline) help and #information
19. It's free #software (#opensource). ;)
#Download #Link:-
https://github.com/ikarus23/MifareClassicTool
MifareClassicTool:-- An #Android #NFC app for reading, writing, #analyzing, etc. MIFARE Classic #RFID tags.
Features:--
1. Read MIFARE Classic tags
2. Save, edit and share the tag #data you read
3. Write to MIFARE Classic tags (block-wise)
4. Clone MIFARE Classic tags
(Write #dump of a tag to another tag; write 'dump-wise')
5. Key #management based on dictionary-attack
(Write the keys you know in a file (dictionary).
MCT will try to authenticate with these
keys against all sectors and read as much as possible.
See chapter Getting Started.)
6. Format a tag back to the factory/delivery state
7. Write the manufacturer block of special MIFARE Classic tags
8. Use external NFC readers like ACR 122U
(See the Help & Info section for more information.)
9. Create, edit, save and share key files (dictionaries)
10. Decode & Encode MIFARE Classic Value Blocks
11. Decode & Encode MIFARE Classic Access Conditions
12. Compare dumps (Diff Tool)
13. Display generic tag information
14. Display the tag data as highlighted hex
15. Display the tag data as 7-Bit US-ASCII
16. Display the MIFARE Classic Access Conditions as a table
17. Display MIFARE Classic Value Blocks as an integer
18. In-App (offline) help and #information
19. It's free #software (#opensource). ;)
#Download #Link:-
https://github.com/ikarus23/MifareClassicTool
Features:--
1. Read MIFARE Classic tags
2. Save, edit and share the tag #data you read
3. Write to MIFARE Classic tags (block-wise)
4. Clone MIFARE Classic tags
(Write #dump of a tag to another tag; write 'dump-wise')
5. Key #management based on dictionary-attack
(Write the keys you know in a file (dictionary).
MCT will try to authenticate with these
keys against all sectors and read as much as possible.
See chapter Getting Started.)
6. Format a tag back to the factory/delivery state
7. Write the manufacturer block of special MIFARE Classic tags
8. Use external NFC readers like ACR 122U
(See the Help & Info section for more information.)
9. Create, edit, save and share key files (dictionaries)
10. Decode & Encode MIFARE Classic Value Blocks
11. Decode & Encode MIFARE Classic Access Conditions
12. Compare dumps (Diff Tool)
13. Display generic tag information
14. Display the tag data as highlighted hex
15. Display the tag data as 7-Bit US-ASCII
16. Display the MIFARE Classic Access Conditions as a table
17. Display MIFARE Classic Value Blocks as an integer
18. In-App (offline) help and #information
19. It's free #software (#opensource). ;)
#Download #Link:-
https://github.com/ikarus23/MifareClassicTool
MifareClassicTool:-- An #Android #NFC app for reading, writing, #analyzing, etc. MIFARE Classic #RFID tags.
Features:--
1. Read MIFARE Classic tags
2. Save, edit and share the tag #data you read
3. Write to MIFARE Classic tags (block-wise)
4. Clone MIFARE Classic tags
(Write #dump of a tag to another tag; write 'dump-wise')
5. Key #management based on dictionary-attack
(Write the keys you know in a file (dictionary).
MCT will try to authenticate with these
keys against all sectors and read as much as possible.
See chapter Getting Started.)
6. Format a tag back to the factory/delivery state
7. Write the manufacturer block of special MIFARE Classic tags
8. Use external NFC readers like ACR 122U
(See the Help & Info section for more information.)
9. Create, edit, save and share key files (dictionaries)
10. Decode & Encode MIFARE Classic Value Blocks
11. Decode & Encode MIFARE Classic Access Conditions
12. Compare dumps (Diff Tool)
13. Display generic tag information
14. Display the tag data as highlighted hex
15. Display the tag data as 7-Bit US-ASCII
16. Display the MIFARE Classic Access Conditions as a table
17. Display MIFARE Classic Value Blocks as an integer
18. In-App (offline) help and #information
19. It's free #software (#opensource). ;)
#Download #Link:-
https://github.com/ikarus23/MifareClassicTool
نرحب بكم للإنضمام الى مجموعة الدردشة العامة في الديب ويب
#Arab_Hack_Chat
http://tzpioaxj726d6mtr.onion/
http://lbvm7gf6n532tkfdcoi46wjmhqeb45z57f7elma5jqyb7qwidzhasyad.onion
#Arab_Hack_Chat
http://tzpioaxj726d6mtr.onion/
http://lbvm7gf6n532tkfdcoi46wjmhqeb45z57f7elma5jqyb7qwidzhasyad.onion
Lockwise-ios:-- #Firefox's #Lockwise #app for #iOS and #Android.
#Securely access the #passwords you’ve saved in Firefox from anywhere — even outside of the #browser.
Features:-
1. 256-bit #encryption protects you while synchronizing
2. Get to your passwords securely with Face or Touch ID
3. Your #privacy comes first. We keep your #data safe, never sold.
#Download #Link:-
https://www.mozilla.org/en-GB/firefox/lockwise/
Lockwise-ios:-- #Firefox's #Lockwise #app for #iOS and #Android.
#Securely access the #passwords you’ve saved in Firefox from anywhere — even outside of the #browser.
Features:-
1. 256-bit #encryption protects you while synchronizing
2. Get to your passwords securely with Face or Touch ID
3. Your #privacy comes first. We keep your #data safe, never sold.
#Download #Link:-
https://www.mozilla.org/en-GB/firefox/lockwise/
#Securely access the #passwords you’ve saved in Firefox from anywhere — even outside of the #browser.
Features:-
1. 256-bit #encryption protects you while synchronizing
2. Get to your passwords securely with Face or Touch ID
3. Your #privacy comes first. We keep your #data safe, never sold.
#Download #Link:-
https://www.mozilla.org/en-GB/firefox/lockwise/
Lockwise-ios:-- #Firefox's #Lockwise #app for #iOS and #Android.
#Securely access the #passwords you’ve saved in Firefox from anywhere — even outside of the #browser.
Features:-
1. 256-bit #encryption protects you while synchronizing
2. Get to your passwords securely with Face or Touch ID
3. Your #privacy comes first. We keep your #data safe, never sold.
#Download #Link:-
https://www.mozilla.org/en-GB/firefox/lockwise/
Photos from National Cyber Security Services's post
Faceswap:-- A #tool that #utilizes #deep #learning to #recognize and #swap #faces in #pictures and #videos.
#FaceSwap has #ethical uses.
1. FaceSwap is not for #creating #inappropriate #content.
2. FaceSwap is not for changing faces without consent or
with the intent of hiding its use.
3. FaceSwap is not for any illicit, #unethical, or
questionable purposes.
4. FaceSwap exists to #experiment and #discovers #AI
#techniques, for #social or #political commentary, for
#movies, and for any number of ethical and reasonable
uses.
#Download #Link:-
https://github.com/deepfakes/faceswap
Faceswap:-- A #tool that #utilizes #deep #learning to #recognize and #swap #faces in #pictures and #videos.
#FaceSwap has #ethical uses.
1. FaceSwap is not for #creating #inappropriate #content.
2. FaceSwap is not for changing faces without consent or
with the intent of hiding its use.
3. FaceSwap is not for any illicit, #unethical, or
questionable purposes.
4. FaceSwap exists to #experiment and #discovers #AI
#techniques, for #social or #political commentary, for
#movies, and for any number of ethical and reasonable
uses.
#Download #Link:-
https://github.com/deepfakes/faceswap
Disable-Control-Panel:-- Example of disabling the #control panel via #registry #manipulation.
#Access to the #controlpanel is dictated by a #flag in the registry. An incredible obtrusive way to disable it is by modifying the value of the key.
The key in question resides at
Key Location: SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer
with
Key Name: NoControlPanel
Setting this to 1 should prevent access to the control panel
#Download #Link:-
https://github.com/ThomasThelen/Disable-Control-Panel
Disable-Control-Panel:-- Example of disabling the #control panel via #registry #manipulation.
#Access to the #controlpanel is dictated by a #flag in the registry. An incredible obtrusive way to disable it is by modifying the value of the key.
The key in question resides at
Key Location: SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer
with
Key Name: NoControlPanel
Setting this to 1 should prevent access to the control panel
#Download #Link:-
https://github.com/ThomasThelen/Disable-Control-Panel
#Access to the #controlpanel is dictated by a #flag in the registry. An incredible obtrusive way to disable it is by modifying the value of the key.
The key in question resides at
Key Location: SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer
with
Key Name: NoControlPanel
Setting this to 1 should prevent access to the control panel
#Download #Link:-
https://github.com/ThomasThelen/Disable-Control-Panel
Disable-Control-Panel:-- Example of disabling the #control panel via #registry #manipulation.
#Access to the #controlpanel is dictated by a #flag in the registry. An incredible obtrusive way to disable it is by modifying the value of the key.
The key in question resides at
Key Location: SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer
with
Key Name: NoControlPanel
Setting this to 1 should prevent access to the control panel
#Download #Link:-
https://github.com/ThomasThelen/Disable-Control-Panel