Forwarded from Exploiting Crew (Pr1vAt3)
🦑Create your own Wordlist:
The tool Crunch is a wordlist generator used for creating custom wordlists based on specific parameters:
Basic Usage:
For example:
This command generates all combinations of characters
### Options Overview:
- -b: Limit the output file size (in bytes). For example,
- -c: Limit the number of lines per file, useful when splitting large wordlists.
- -d: Avoid sequences with too many duplicate characters. E.g.,
- -e: Stop at a specific string (useful for large datasets).
- -f: Use predefined character sets from a file (e.g.,
- -i: Invert the order of character changes (useful for some cracking methodologies).
- -l: Use literal characters in patterns.
- -o: Specify an output file for the generated list.
- -p: Generate all permutations without repeating characters.
- -t: Use patterns to control string structure (e.g.,
- -z: Compress the output directly into formats like gzip, bzip, lzma, or 7z.
### Advanced Examples:
1. Generate a list of passwords with a fixed structure:
Output contains 8-character passwords starting with
2. Limit to 100 lines per file:
3. Create a compressed output:
4. Avoid adjacent duplicates:
Excludes passwords like
Crunch is powerful and highly configurable, making it ideal for creating targeted wordlists for penetration testing or other tasks. For detailed documentation, visit the [Crunch SourceForge page](https://sourceforge.net/projects/crunch-wordlist/).
The tool Crunch is a wordlist generator used for creating custom wordlists based on specific parameters:
Basic Usage:
./crunch <min-len> <max-len> [charset]
For example:
./crunch 3 7 abcdef
This command generates all combinations of characters
abcdef between lengths 3 and 7.### Options Overview:
- -b: Limit the output file size (in bytes). For example,
-b 10MB will stop each file at 10MB.- -c: Limit the number of lines per file, useful when splitting large wordlists.
- -d: Avoid sequences with too many duplicate characters. E.g.,
-d 2@ suppresses more than 2 adjacent identical letters.- -e: Stop at a specific string (useful for large datasets).
- -f: Use predefined character sets from a file (e.g.,
charset.lst).- -i: Invert the order of character changes (useful for some cracking methodologies).
- -l: Use literal characters in patterns.
- -o: Specify an output file for the generated list.
- -p: Generate all permutations without repeating characters.
- -t: Use patterns to control string structure (e.g.,
@@god@@ where @ is replaced with lowercase letters).- -z: Compress the output directly into formats like gzip, bzip, lzma, or 7z.
### Advanced Examples:
1. Generate a list of passwords with a fixed structure:
./crunch 8 8 -t abcd@@@@ -o passwords.txt
Output contains 8-character passwords starting with
abcd.2. Limit to 100 lines per file:
./crunch 5 5 abcdef -o START -c 100
3. Create a compressed output:
./crunch 4 6 1234 -o wordlist.gz -z gzip
4. Avoid adjacent duplicates:
./crunch 5 5 abc -d 2@
Excludes passwords like
aabbc.Crunch is powerful and highly configurable, making it ideal for creating targeted wordlists for penetration testing or other tasks. For detailed documentation, visit the [Crunch SourceForge page](https://sourceforge.net/projects/crunch-wordlist/).
sitename
crunch - wordlist generator
Download crunch - wordlist generator for free. Crunch is a wordlist generator where you can specify a standard character set or a character set you specify. crunch can generate all possible combinations and permutations.
🦑ALL Mr. ROBOT TOOLS IN 1
Key Categories & Tools
1. Information Gathering
- Nmap: Network scanning and vulnerability analysis.
- Setoolkit: Social engineering framework.
- WPScan: WordPress vulnerability scanner.
- CMS Scanner: Identify CMS-specific weaknesses.
- XSStrike: Cross-site scripting (XSS) scanner.
- Dork: Google dorks for passive auditing.
#### 2. Password Attacks
- Cupp: Custom wordlist generation.
- Ncrack: Network authentication cracking.
#### 3. Wireless Testing
- Reaver: WPA/WPA2 key recovery.
- Pixiewps: Offline WPS brute-forcing.
- Bluetooth Honeypot: Bluetooth security testing.
#### 4. Exploitation Tools
- sqlmap: Automated SQL injection.
- Commix: Command injection.
- Shellnoob: Shellcode generator.
#### 5. Sniffing & Spoofing
- SSLtrip: SSL stripping attacks.
- pyPISHER: Phishing attacks.
#### 6. Web Hacking
- Scanners for WordPress, Joomla, Gravity Forms, and file upload vulnerabilities.
- Exploitation scripts for CMS and frameworks like Drupal and Vbulletin.
#### 7. Private Web Hacking
- Tools to locate websites, control panels, zip files, and server users.
- Cloudflare bypass techniques.
#### 8. Post Exploitation
- Tools like Shell Checker, POET, and Weeman for maintaining access and collecting information.
---
### Installation
- Linux:
- Windows: Install a Linux-like environment (e.g., Cygwin) and Python.
- Termux (Android): Same Linux command applies.
- Cloud Services: Use Google Cloud Console or free Ubuntu VPS (e.g., c9.io).
---
### Additional Notes
- Python Compatibility: Works with Python 2. For Python 3, check the updated repository:
- License: MIT License, open-source and free to use.
Would you like help setting it up or exploring specific tools?
Key Categories & Tools
1. Information Gathering
- Nmap: Network scanning and vulnerability analysis.
- Setoolkit: Social engineering framework.
- WPScan: WordPress vulnerability scanner.
- CMS Scanner: Identify CMS-specific weaknesses.
- XSStrike: Cross-site scripting (XSS) scanner.
- Dork: Google dorks for passive auditing.
#### 2. Password Attacks
- Cupp: Custom wordlist generation.
- Ncrack: Network authentication cracking.
#### 3. Wireless Testing
- Reaver: WPA/WPA2 key recovery.
- Pixiewps: Offline WPS brute-forcing.
- Bluetooth Honeypot: Bluetooth security testing.
#### 4. Exploitation Tools
- sqlmap: Automated SQL injection.
- Commix: Command injection.
- Shellnoob: Shellcode generator.
#### 5. Sniffing & Spoofing
- SSLtrip: SSL stripping attacks.
- pyPISHER: Phishing attacks.
#### 6. Web Hacking
- Scanners for WordPress, Joomla, Gravity Forms, and file upload vulnerabilities.
- Exploitation scripts for CMS and frameworks like Drupal and Vbulletin.
#### 7. Private Web Hacking
- Tools to locate websites, control panels, zip files, and server users.
- Cloudflare bypass techniques.
#### 8. Post Exploitation
- Tools like Shell Checker, POET, and Weeman for maintaining access and collecting information.
---
### Installation
- Linux:
bash <(wget -qO- https://git.io/vAtmB)
- Windows: Install a Linux-like environment (e.g., Cygwin) and Python.
- Termux (Android): Same Linux command applies.
- Cloud Services: Use Google Cloud Console or free Ubuntu VPS (e.g., c9.io).
---
### Additional Notes
- Python Compatibility: Works with Python 2. For Python 3, check the updated repository:
fsociety-team/fsociety.- License: MIT License, open-source and free to use.
Would you like help setting it up or exploring specific tools?
🦑 Fix Any Broken Package Using Aptitude
Aptitude is a powerful command-line tool for managing packages on Debian-based systems. One of its key features is the ability to identify and resolve issues with broken packages. Broken packages can cause problems with system updates, installations, or removals, making it essential to fix them promptly.
### Steps to Fix Broken Packages Using Aptitude
1. Install Aptitude (if not already installed):
If you don’t have Aptitude on your system, you can install it using:
2. Check for Broken Packages:
To identify issues, run the following command:
This will list all broken packages currently installed on your system.
3. Attempt to Automatically Fix Broken Packages:
Use the following command to let Aptitude automatically resolve issues:
Aptitude will analyze the dependency tree and propose solutions, such as installing missing dependencies or removing conflicting packages. You can review and approve these solutions interactively.
4. Handle Manual Interventions (if needed):
If Aptitude cannot resolve an issue automatically, it may offer multiple options for resolution. Carefully read the options and choose the one that best fits your needs.
Use:
This opens a text-based interface where you can navigate and manage packages interactively.
5. Verify and Clean Up:
After fixing broken packages, update and clean your package list to ensure everything is in order:
### Benefits of Using Aptitude
- Interactive Interface: Aptitude provides a user-friendly text UI for resolving package conflicts.
- Better Dependency Handling: It offers smarter solutions for complex package dependency issues.
- Robust Options: Aptitude allows in-depth package management compared to
By using Aptitude, you can effectively fix any broken package and maintain a stable system.
Aptitude is a powerful command-line tool for managing packages on Debian-based systems. One of its key features is the ability to identify and resolve issues with broken packages. Broken packages can cause problems with system updates, installations, or removals, making it essential to fix them promptly.
### Steps to Fix Broken Packages Using Aptitude
1. Install Aptitude (if not already installed):
If you don’t have Aptitude on your system, you can install it using:
sudo apt update
sudo apt install aptitude
2. Check for Broken Packages:
To identify issues, run the following command:
sudo aptitude search ~b
This will list all broken packages currently installed on your system.
3. Attempt to Automatically Fix Broken Packages:
Use the following command to let Aptitude automatically resolve issues:
sudo aptitude --fix-broken install
Aptitude will analyze the dependency tree and propose solutions, such as installing missing dependencies or removing conflicting packages. You can review and approve these solutions interactively.
4. Handle Manual Interventions (if needed):
If Aptitude cannot resolve an issue automatically, it may offer multiple options for resolution. Carefully read the options and choose the one that best fits your needs.
Use:
sudo aptitude
This opens a text-based interface where you can navigate and manage packages interactively.
5. Verify and Clean Up:
After fixing broken packages, update and clean your package list to ensure everything is in order:
sudo apt update
sudo apt autoremove
sudo apt clean
### Benefits of Using Aptitude
- Interactive Interface: Aptitude provides a user-friendly text UI for resolving package conflicts.
- Better Dependency Handling: It offers smarter solutions for complex package dependency issues.
- Robust Options: Aptitude allows in-depth package management compared to
apt or dpkg. By using Aptitude, you can effectively fix any broken package and maintain a stable system.
🦑Reverse Engineering with Ghidra :
https://youtu.be/d4Pgi5XML8E (Part 1)
https://youtu.be/uyWVztMHWtk (Part 2)
https://youtu.be/RFG5FuqY0CE (Part 3)
https://youtu.be/5QBXNF7FKxM (Part 4)
https://youtu.be/d4Pgi5XML8E (Part 1)
https://youtu.be/uyWVztMHWtk (Part 2)
https://youtu.be/RFG5FuqY0CE (Part 3)
https://youtu.be/5QBXNF7FKxM (Part 4)
YouTube
HackadayU: Reverse Engineering with Ghidra Class 1
This is Class 1 in Reverse Engineering with Ghidra taught by Matthew Alt.
Learn with us: https://www.hackaday.io/u
Playlist for the Reverse Engineering with Ghidra series:
https://www.youtube.com/playlist?list=PL_tws4AXg7auglkFo6ZRoWGXnWL0FHAEi
0:00 - Presentation…
Learn with us: https://www.hackaday.io/u
Playlist for the Reverse Engineering with Ghidra series:
https://www.youtube.com/playlist?list=PL_tws4AXg7auglkFo6ZRoWGXnWL0FHAEi
0:00 - Presentation…
🦑Evaluating and comparing machine learning (ML) and artificial intelligence (AI) algorithms at scale.
- Custom evaluation protocols: Supports different evaluation phases, dataset splits, and metrics, with both public and private leaderboards.
- Remote evaluation: For large-scale challenges requiring special compute capabilities, EvalAI allows organizers to add worker nodes to process submissions.
- Evaluation inside environments: Submissions are evaluated in Docker containers, ensuring a consistent environment.
- CLI support: The
- Portability and scalability: Built on open-source technologies like Docker, Django, Node.js, and PostgreSQL for easy deployment and scalability.
- Faster evaluation: Optimization techniques like dataset chunking and multi-core processing speed up evaluations.
For installation, EvalAI can be set up using Docker with the following steps:
1. Install Docker and Docker Compose.
2. Clone the source code from the repository:
3. Build and run the Docker containers:
4. Access the platform at
Default users include:
- SUPERUSER: username: admin, password: password
- HOST USER: username: host, password: password
- PARTICIPANT USER: username: participant, password: password
- Custom evaluation protocols: Supports different evaluation phases, dataset splits, and metrics, with both public and private leaderboards.
- Remote evaluation: For large-scale challenges requiring special compute capabilities, EvalAI allows organizers to add worker nodes to process submissions.
- Evaluation inside environments: Submissions are evaluated in Docker containers, ensuring a consistent environment.
- CLI support: The
evalai-cli tool extends the platform’s capabilities to the command line.- Portability and scalability: Built on open-source technologies like Docker, Django, Node.js, and PostgreSQL for easy deployment and scalability.
- Faster evaluation: Optimization techniques like dataset chunking and multi-core processing speed up evaluations.
For installation, EvalAI can be set up using Docker with the following steps:
1. Install Docker and Docker Compose.
2. Clone the source code from the repository:
git clone https://github.com/Cloud-CV/EvalAI.git evalai && cd evalai
3. Build and run the Docker containers:
docker-compose up --build
4. Access the platform at
http://127.0.0.1:8888.Default users include:
- SUPERUSER: username: admin, password: password
- HOST USER: username: host, password: password
- PARTICIPANT USER: username: participant, password: password
🦑Legit Win 11 Activator:
@ECHO off
cls
:: Prompt for the product key
set /p productKey="Enter your Windows 11 product key: "
:: Set the product key and install it
cscript slmgr.vbs /ipk %productKey%
:: Activate Windows with the Microsoft servers
cscript slmgr.vbs /ato
:: Check activation status
cscript slmgr.vbs /dli
pause
@ECHO off
cls
:: Prompt for the product key
set /p productKey="Enter your Windows 11 product key: "
:: Set the product key and install it
cscript slmgr.vbs /ipk %productKey%
:: Activate Windows with the Microsoft servers
cscript slmgr.vbs /ato
:: Check activation status
cscript slmgr.vbs /dli
pause