background preloader

Msowers

Facebook Twitter

Ha.ckers.org web application security lab. Iwatchedyourhack.org | you hack - we laugh. Welcome to Brownie! — Brownie v0.2+ documentation. Have you ever started a new project and implemented this little function foo or this datastructure bar you already implemented for another project?

Ever wondered why a specific feature is not in the standard library already? Wanted to use that new datastructure but you are still stuck with this ancient Python version or are just not willing or able to switch to Python 3.x, yet? And most importantly were too lazy to implement this datastructure which would be more appropriate to use? Brownie wants to solve these problems by providing all these small things well documented, well tested and most importantly right now when you need it. Take a look at the documentation for further information, visit Github for development or issue tracking or fetch the latest development version. Installation Brownie runs on Python 2.5-2.7 (tested on CPython and PyPy).

If you really need to, you can also install the development version of Brownie with pip install brownie==dev. Development. Browse | Anti-Forensics. List of Useful and Must-Have plugins! (100+) - Minecraft Forums. I'm going to update this soon! See post below. EDIT: Soon means tomorrow, 13 Dec 2010. EDIT2: Today is Dec 13th 2010, and here it is. In my lifetime career, I've used 144+ plugins. That's not all. I just had to write this for 50 minutes in a reply to few people. Keep this up and give me some feedback! For Minecraft) EDIT: HOLY SHIP. 777th post! Quote Subject: Server Plug-Ins Juze said: Welcome to the forums! You don't need a plugin for what you're looking for. For more plugins, I got nearly over 100 of them, PM me if you're interested. Hello Juze. Cheers Mate I'm just looking for plugins that are useful.

Hello, I'm sending this to both of you. CommandHelper - Must be the first plugin in plugin list to work. Clean - Mods are able to peek in inventories with this plugin, remove items from others or clean it completely. Wow, it took me 50 minutes to write this. All these plugins can be found from Hey0's forums here: Or Google "Hey0 plugin-name-here". -Juze. Join Application. Exploitation - it-sec-catalog - References to vulnerability exploitation stuff. - Project Hosting on Google Code. 1. How to use this wiki ... or several advices for beginners 1.1. Required knowledge At least the basic knowledge of assembly, OS internals, C/C++ languages are needed to get the most value from this wiki. 1.2.

Most simple vulnerabilities from the point of view of exploitation are stack-based buffer overflows. Peter Van Eeckhoutte's (corelanc0d3r) series of tutorials are right thing to start with - those structure is well-formed, explained step-by-step and covers most exploitation topics starting from those easy, continuing with more and more complex. Another great reading that definitely will help novice exploit writers to warm up is the "Smashing the stack in 2010" by Andrea Cugliari and Mariano Graziano. And for all those who are assuming long prospective roadmap: "How do I become a Ninja? ". 1.3. Keep in mind that old articles (or new, that focused on old OS) might confuse you. 1.4. As you might have noticed, in table there is a column called Type. 1.5. 2. 2.1. 2.2. 2.3. 2.4. 2.5. 2.6.

Rubberhose cryptographically deniable transparent disk encryption system. Setting up your own SSL VPN | TheXploit | Security Blog. “All I want for Christmas is my own VPN…my own VPN, my own VPN” – Dustin I’ve been wanting to have access to my own secure VPN for quite some time so that when I’m away from home and only have access to insecure networks, I don’t have to use work’s VPN for personal use or worry about someone intercepting my traffic.

I looked into a couple paid VPN solutions but none of them seem to guarantee your privacy as far as I’m concerned. I figured my best option was to setup and manage my own. I chose to do all my setup on Ubuntu Linux but you can easily port these instructions to an alternative Linux distribution with relative ease. Just a quick heads up before we dive in. This article is the first part of a two-part article on setting up your own VPN solution. Creating your own SSL VPN using OpenVPN Start by installing OpenVPN and DNSMasq for local DNS resolution OpenVPN comes with a bunch of scripts called easy-rsa that make generating your keys and certificates painless. Net.ipv4.ip_forward=1. About PlugBot - The PlugBot ~ The PlugBot is a small form factor computer used for Physical Penetration Testing.

PlugBot is a research project and I plan to release the code for free under GPL license. Please help me fund this project by donating via PayPal! PlugBot is a hardware bot. It's a covert penetration testing device designed for use during physical penetration tests. PlugBot is a tiny computer that looks like a power adapter; this small size allows it to go physically undetected all the while powerful enough to scan, collect and deliver test results externally. PlugBot Demo from RedTeam Security on Vimeo. PlugBot Demo: Download & Install Exploit Scripts from RedTeam Security on Vimeo. How do you use it? What's inside? About the Inventor PlugBot was brought to life by security researcher and penetration tester, Jeremiah Talamantes. DISCLAIMER: The researcher, nor any other party involved, does not condone the use of this technology for malicious purposes, such as gaining unauthorized access.

First, you need to get your hands on the PlugBot hardware. Online storage re-imagined. Download CrunchBang Linux 10 "statler" r20101205. Welcome to the download page for CrunchBang Linux Waldorf. Please choose a flavour from below: 32-bit 64-bit This is the download page for the stable branch of CrunchBang. Waldorf is built from Debian Wheezy sources.

Debian Wheezy is the current stable branch of Debian and therefore it should provide excellent stability and security. Good luck with your #! Adventures and happy CrunchBangin'! ♥ CrunchBang? Help keep the electricity running and servers humming! The CrunchBang project is principally funded by (aka corenominal) and supported by community contributions. DEFT Linux - Computer Forensics live cd. GnackTrack - Gnome Based Penetration Distro. Welcome to KXStudio. I2P Anonymous Network. Littleblackbox - Project Hosting on Google Code. LittleBlackBox is a collection of thousands of private SSL and SSH keys extracted from various embedded devices. These private keys are stored in a database where they are correlated with their public certificates as well as the hardware/firmware that are known to use those private keys.

A command line utility is included to aid in the identification of devices or network traffic that use these known private keys. Given a public certificate, the utility will search the database to see if it has a corresponding private key; if so, the private key is displayed and can be used for traffic decryption or MITM attacks. Alternatively, it will also display a table of hardware and firmware that is known to use that private key.

The utility can obtain a public certificate several different ways: You may give it the path to a public SSL certificate file. d0z.me: The Evil URL Shortener « Spare Clock Cycles. I, like many people, have been closely following a lot of the chaos happening around the recent Wikileaks dump, and was particularly fascinated by the DDoS attacks by activists on either side. One tool specifically caught my eye in the midst of the attacks, however: the JS LOIC. The tool works simply by constantly altering an image file's source location, so that the browser is forced to continuously hammer the targeted server with HTTP requests. Not a sophisticated or technically interesting tool by any means, but conceptually interesting in that it only requires a browser to execute one's portion of a DoS attack.

While the concept itself is not all that new, it got me thinking about the implications of such browser based DoS attacks. In addition to these DoS worries, I have also been uncomfortable for awhile now about the increasing use of and reliance upon URL shorteners for sharing links. The concept is quite simple, really. You can find more about mitigating DoS attacks on Google. Bitcoin P2P Virtual Currency | Bitcoin. Ubuntu Security. GNOME Shell: Getting prettier by the day. Gnome-Shell’s UI revamp continues apace and the ‘relayout’ version of GNOME-Shell, first shown off at GUADEC earlier this year, is getting ready to land. With it containing so many visual changes MrMars dropped off screenshots of the ‘relayout’ GIT branch in the OMG! Inbox! And a link to his Italian Ubuntu forum post touching on them.

The ‘Activites’ overlay now looks more akin to Unity’s Dash with categories a-top and icons en-masse below. You can also see that the search button is now placed upper-right and, as with Ubuntu’s Unity, results appear instantaneously. Moving the mouse to the right of the screen invokes buttons to add remove workspaces: With Mutter continuing to improve with each successive update – as mentioned in a previous Gnome-Shell article – a few new visual tricks sit up SHell’s sleeve such as this very pretty Alt+tab effect. 10 things to do after installing Ubuntu 10.04 Lucid Lynx. If you’re going to be installing a freshly minted copy of Ubuntu 10.04 LTS later today or this weekend then the following list of 10 reader submitted post-install must-do’s will help ensure that you’re off to a flying start with your new OS. 1.

Run Update Manager Just because you’ve installed the latest version of Ubuntu doesn’t mean that there won’t already be a handful of bug fixes updates or patches waiting for you. Make sure you run the update manager (if it doesn’t update you first) so that you’re benefitting from the latest fixes and features. 2. Enable graphics card drivers for 3D fun If you want to use advanced desktop effects such as Compiz (3d Cube, wobbly windows) then you will need to enable the “official” drivers for your graphics card. Ubuntu should automatically detect and alert you that 3D drivers are available. 3. It’s a shame this step has to be included at all but sadly Ubuntu aren’t allowed by law to ship certain multimedia codec’s out of the box. 4. 5. 6. 7. 8. 9. 10. Wirewatcher. Godzilla Haiku. Photo 21 Notes Godzilla Haiku turned 4 today! (Source: assets) Photo 83 Notes submitted by Justin Patterson. Shedding Bikes: Programming Culture And Philosophy. By Zed A.

Shaw I have this hypothetical question I've been using periodically to talk about the relevance of ad hominem in evaluating software: What if Hitler gave you a cheese sandwich? It's a pretty simple question. Most normal folks would turn him down, politely most likely but they'd definitely not eat a sandwich from a guy who used to slowly increase his doses of arsenic. Ok, change this up some more, what if you were walking by and there was a box labeled "Cheese Sandwich" and right under that is a Nazi Swastika. Sure, you might open it, look at it, maybe sniff it, but most normal people won't eat it. Let's go one step further, and say you just find a random sandwich in a clear plastic bag on a table. Instinctively, humans have this sense of avoiding things that will poison them, and that involves using their memories, sense of history, and ability to think ahead to predict what could happen.

Let's say I tell you that my software is "language agnostic". P.S. Tf2 Items & Hats Pricing Guide. Index of /27c3-stream/releases/mkv. Dyko - A Lightweight Web Framework.

Jobs

Programming. Wikileaks. High Yield Checking Account from ING DIRECT USA. Forums - Powered by vBulletin. Hack This Site! OpenNIC. Open Letter to Amazon.com. To Customer Service and Jeff Bezos, I’m disgusted by Amazon’s cowardice and servility in abruptly terminating its hosting of the Wikileaks website, in the face of threats from Senator Joe Lieberman and other Congressional right-wingers. I want no further association with any company that encourages legislative and executive officials to aspire to China’s control of information and deterrence of whistle-blowing.

For the last several years, I’ve been spending over $100 a month on new and used books from Amazon. That’s over. I have contacted Customer Service to ask Amazon to terminate immediately my membership in Amazon Prime and my Amazon credit card and account, to delete my contact and credit information from their files and to send me no more notices. I understand that many other regular customers feel as I do and are responding the same way. So far Amazon has spared itself the further embarrassment of trying to explain its action openly. Yours (no longer), Daniel Ellsberg. Human Bagel Web Services. 13 Steps To A Better Wordpress Install. Free Books.

A lot of people keep asking about a good list of programming books. Hence, we are building this list to save your time and to spread the knowledge. Some of these books will definitely help us to evolve our coding skills and thought processes for developing better solutions. We will do our best to keep updating this list, hope you find this list useful, here we go. Meta-List Graphics Programming Language Agnostic: NerdDinner Walkthrough Assembly Language: Bash Advanced Bash-Scripting Guide See .NET below Django Djangobook.com Emacs The Emacs manual Thanks Emacser (October 17, 2010) Forth Git Haskell Dive Into HTML5 Java JavaScript Linux Advanced Linux Programming Lisp Lua Programming In Lua (for v5 but still largely relevant) Maven Mercurial NoSQL CouchDB: The Definitive Guide Objective-C The Objective-C Programming Language Parrot / Perl 6 Perl 6 (Work in progress) Perl PowerShell Mastering PowerShell Prolog PostgreSQL Practical PostgreSQL Python Learn REBOL Thanks Nick (October 19, 2010) Ruby Scala Scheme Smalltalk Subversion Vim.

Allen's Weblog: Unicode in Python, and how to prevent it. [UPDATE 16 Aug 2011] Armin Ronacher has written a nice module called unicode-nazi that provides the Unicode warnings I discuss at the end of this article. Though I can't use Python 3 for any of my projects, it does have a few nice things. One particular behaviour where it improves on Python 2 is forbidding implicit conversions between byte strings and Unicode strings.

For example: Python 3.1.2 (release31-maint, Sep 17 2010, 20:34:23) [GCC 4.4.5] on linux2 Type "help", "copyright", "credits" or "license" for more information. >>> 'foo' + b'baz' Traceback (most recent call last): File "<stdin>", line 1, in <module> TypeError: Can't convert 'bytes' object to str implicitly If you do this in Python 2, it invokes the default encoding to convert between bytes and unicode, leading to manifold unhappinesses. Python 2.6.6 (r266:84292, Sep 15 2010, 15:52:39) [GCC 4.4.5] on linux2 Type "help", "copyright", "credits" or "license" for more information.

>>> u'foo' + b'baz' u'foobaz' Hey! Drupal site building tips - Living Off the Grid: Free Yourself. 10 Cool Ways to Use Nmap. Ubercharged.net - Tales of Team Fortress 2 pwnage and other hilarity. The Secret Life of Chaos Part (1 - 6) GPG Quick Start. GNUPG Windows Setup - Coresecure, Inc. Before it's News. PhilipBrennan.Net. HiR Information Report: Make your own lock picks - Part 1. Body Scanners (and Groping?) Coming To A Train Station Near You? The TSA and America's Turning Point | Scragged. I was just detained by the TSA. 4thamendmentwear. The Death Delusion. How The TSA Legally Circumvents The Fourth Amendment. Ron Paul on ‘Opt-Out Day’: ‘If we tolerate’ the TSA, ‘there’s something wrong with us’ | Raw Story. Anti-earmarker Jon Kyl slips $200 million earmark into bill.

Big Sis Caught Lying To American People. Ty's Search for Truth. Jon and Eric's Blog. To promote flying with dignity. Team Fortress 2 Server List | Search Tf2 Stats, Rankings, and Banners. Zero hedge | on a long enough timeline, the survival rate for everyone drops to zero. A Majority Of Americans Believe The US Government No Longer Operates Within The Constitution | zero hedge.

Overview for afrael. Google Translate. Fraps & VirtualDub: How to save disk space and enjoy good quality, small file size HD video clips | The Don's Craptastic World. View topic - Welcome! (What's all this TOSL stuff about...) Lockpicks by Open Locksport by Schuyler Towne. FreeRangeKids. Ugh fields. Making Your Twitter Followers A Little More Uneasy. I shed a 170-lb monkey off my back in 1.5 years using hardcore prescription drugs (380 --> 210). AMA. : IAmA. The 2fort2furious Forum / Profile. What quote(s) do you live by? : AskReddit. Karmanaut's map of reddit. What are some good, active subreddits that maybe aren't very well known? : AskReddit.

Population - Anno 1404 Wiki. Post Your Farming Builds. Post #1197090. _l0qihvfywy1qb0g7zo1_500.jpg (JPEG Image, 500x294 pixels) 3QRji.jpg (JPEG Image, 500x408 pixels) 10 Things I Learned (Or Unlearned) When I Had Kids | The Evolution of Dad. Make a Simple and Slick Accordion Menu in Photoshop. Welcome to 3DM3.com - World's Computer Graphics Community. 102 things guys need to know about girls.