background preloader

Linux Tools Listing

Linux Tools Listing

SEES - Social Engineering Email Sender - Attack and Audit Most of the companies nowadays have their firewalls, threat monitoring and prevention security appliances setup. With these mechanisms in place, security precautions are taken and incidents are monitored. Inbound traffic being restricted, SEES on the other hand is developed for sending targeted phishing emails in order to carry sophisticated social engineering attacks/audits. SEES aims to increase the success rate of phishing attacks by sending emails to company users as if they are coming from the very same company’s domain. A Social Engineering Attack/Audit Tool for SpearPhishing Example SMTP Service Configuration It is possible to send emails with or without attachments with SEES. # apt-get install postfix After the installation the configuration of SMTP server is needed. After the installation and configuration postfix is re/started. # /etc/init.d/postfix start A simple netstat command can be executed to check if the service is up and running. Downloading & Configuring SEES SEES Use Cases

Penetration Testing | My Juiced Up WiFi Pineapple Configurator Script | SANS Institute By Chris Crowley I recently acquired a WiFi Pineapple Mark V to replace my Mark IV, and I've got a config script to help folks simplify the config and use of this amazing product. For those of you unfamiliar with the WiFi Pineapple, it is a wireless attack platform in a box, excellent for penetration testers. It collects a variety of tools into a pen test specific device, a convenient single portable appliance for all kinds of wonderful Wifi hacks. One guy I know turned on a device in the airport to check to be sure that it was working for a demonstration he was on his way to deliver, and he was frustrated that he wasn't able to get his client to connect. In this article, I'd like to share a modified WiFi Pineapple configuration script (wp4.sh) that I created, which should really help simplify and improve your configuration. In this case, my setup is a Linux system wired upstream of the Pineapple. I threw a few tweaks into my script that I'll discuss briefly: ### and #! #! if [[ "$wai" !

Hacking Airwaves with Fruit Part 1: WiFi Pineapple Mark IV Basics If you’re doing any wireless penetration testing these days, odds are you have a WiFi Pineapple Mark IV from Hak5 in your toolkit. If you’re not a professional penetration tester or are just starting out with wireless hacking, the Pineapple is a device that will save you a considerable amount of headaches and is easily the best “all-in-one” tool for the job. This first article in a series of three tutorials is all about walking you through those first baby steps of configuration to get your new toy up and running. Part 1 starts with the Mark IV since many shops have this device already. Part 2 of this series covers the new Mark V, and Part 3 will show the device in action on a real pen test. The first step to being successful in any endeavor is preparation, and the pineapple is no different. Figure 1: WiFi Pineapple Mark IV Hardware Basics of the WiFi Pineapple Mark IV Figure 2: Ethernet Ports on the Pineapple Host Configuration Let’s get this baby running! IP Address: 172.16.42.42 Setup

THS|OS RTL - Beta Since this morning, I have added a few more tools, currently here is a list of tools that have been installed. Cryptography = steghide Forensics = exiftool / photorec / scalpel Network Exploitation = Armitage / Metasploit / Veil Packet Analysis = driftnet / dsniff / etherape / sslsniff / sslstrip / tcpdump / wireshark Password Attacks = AgainstSSH / aircrack / chntpw / fcrackzip / hashcat / jtr & johnny / pdfcrack / xhydra Proxy & VPN = openvpn / proxychains / tor / veepeenee Recon = amap / cloudip / fgscanner / foca / hping3 / nmap / scapy / wafw00f / zenmap Reverse Engineering = Bokken / Immunity Stress Testing = Davoset / Goldeneye / LOIC / RUDY / slowhttptest / Torshammer Vulnerability Analysis = Arachni / Maltego / Nessus 5 / nikto / Vega Web Exploitation = beef / burp suite / sqlmap / websploit / weevely Wireless = aircrack / easycreds / reaver I will be adding more to the wireless section as TAPE would like to add to it along with myself which will probably add WepWap.

The Horrible Anger You Feel at Hearing Someone Chewing Is Called Misophonia There's nothing more gruesome than hearing someone eat an apple, carrot, or sandwich featuring even a moderately crunchy filling. Ugh. The shivers are running down my spine just thinking about it. I'm know I'm not alone. Misophonia, which means "hatred of sound," is rarely diagnosed. The AMC describes the reviled sounds as typically innocent ones like chewing or heavy breathing, but I truly don't understand the use of the word "innocent" here. Isn't that the most ghastly thing you've ever heard? If a Google search is anything to go by, mine is far from a rare aversion. But the ubiquity of these sites is contrasted sharply by a lack of scientific consensus on whether or not misophonia is an actual psychological disorder, and not just a shared annoyance. More from Motherboard: ​The Mystery of the Creepiest Television Hack Worldwide, there are only a handful of institutions that that take misophonia seriously enough to do empirical research, which includes the AMC.

Zoklet, the forum of bad ideas, has shuttered SWIM plans is to suitcase the essential items in SWIMS butt. SWIM will carefully triple wrap the drugs, as well as using 2 condoms. SWIM is aware of the dangers of putting drugs in SWIMS ass. It seems only natural that this post comes from a forum called “Bad Ideas,” a database of discussions on ill-advised activities such as PayPal fraud, car-hopping and shoplifting. Popular right around the time Jackass first debuted on TV screens, Bad Ideas was part of Zoklet.net, a forum dedicated to sharing unusual or difficult-to-find information. This month, Zoklet finally closed its doors, with its owner, known as Zok, citing health concerns, mounting surveillance, and legal fees as the cause. Zoklet was heir to a series of websites which retained the same community over 20 years, starting in 1990 with the BBS file-sharing network NIRVANAnet, then later Totse (an acronym for the psychedelic “& the Temple of the Screaming Electron”), and after that Zoklet. No one replies.

TOTSE i/ˈtɒtsi/,[1] commonly mispronounced as "toot-see," "toat-see," or "toats") was a San Francisco Bay Area website and former BBS dedicated to storing text files on a variety of subjects and viewpoints, many of which were unusual or controversial. The name is an acronym for Temple of the Screaming Electron. History[edit] TOTSE was started by Jeff Hunter, real name unknown (a founding member of NIRVANAnet)[1] in 1989 as a dial-up BBS originally named "& the Temple of the Screaming Electron". TOTSE became available on the Internet in 1997, and the dial-up BBS system was discontinued in the spring of 1998. Media attention[edit] The site also appears on a 2006 Australian anti-terrorism poster[6] and a television advertisement. A number of TOTSE members placed prank telephone calls to Live Prayer with Bill Keller starting on November 21, 2006. Community[edit] The community of TOTSE was an Internet forum and IRC channel. References[edit] External links[edit]

Kirlian Photography Equipment | Future of Kirlian - Contact Us Today! What does a Kirlian Photography capture? Kirlian photography equipment captures a subtle field of electromagnetic energy that radiates from all living things, otherwise known as an aura. In Western religious traditions, you can often see it portrayed in art as a halo surrounding saints or Deity. For centuries, specialists who have been able to “see” auras without the help of an aura photo have explained that the colors exhibited in the aura have specific meanings. How does Kirlian Photography work? In earlier years, to create a Kirlian Photograph an electric current is sent through an object to capture an aura image on a photographic plate. Using a sensor, Inneractive’s energy technology equipment measures the electrical conductance and temperature of your skin. Learn more about energy technology. See it in Action Contact us today to set up a live demonstration.

Kirlian effect- scientific tool to study mind body functions by READING AURA It was found, that objects which are not alive, do not change parameters of their "aura" more than 2%. LIVING objects, however can change their aura field dramatically and quickly. This provides scientists with unique tools to study physics of LIFE and consciousness using bio-electrography. For example, Prof Bunzen in Russia found that the response in Kirlian Aura seems to precede (appear as soon or earlier than) electric processes in the brain during a decision making process. From his research, presented in 2001 at the International Congress "Science Information, Spirit" in St Petersburg, it seems that a thought "appears" in the aura before any electrical activity can be detected in the brain. Is our consciousness electro-photonic to begin with? Two Kirlian Aura images of seemingly identical drops of water, kindly provided by Prof Korotkov, are shown.

Alchemy Websites: Hundreds of Internet Sites Devoted to Ancient and Modern Alchemy. The Emerald Tablet The origin of the tablet is lost in legends that go back more than 10,000 years. But its words have survived. The Emerald Tablet web page contains a translation and recounts how the original tablet was placed in the King's Chamber of the Great Pyramid of Cheops.Synesius' Epilogue on the Emerald Tablet is from an ancient text reprinted in Basil Valentine's Triumphant Chariot of Antimony. The Emerald Tablet of Isaac Newton is the Father of Physics' personal translation of the tablet. We now know that Newton was more an alchemist than a physicist.Various Pieces on the Emerald Tablet includes eight original translations and interpretations dating from the Middle Ages to modern times.The Emerald Tablet is a translation of the document that reflects the beliefs and dogma of the Freemasons. Back to Top Egyptian Alchemy The roots of alchemy go back at least 3,500 years to Egypt and Phoenicia. European Alchemy Jewish Alchemy Christian Alchemy Gnostic Alchemy Islamic Alchemy

Related: