tag:blogger.com,1999:blog-47330710695345546442024-03-20T17:48:33.964-07:00GoHakDIY, Hardware, Software, Development, Network Penetration Testing.Unknownnoreply@blogger.comBlogger31125tag:blogger.com,1999:blog-4733071069534554644.post-42203792016231329802023-12-21T05:33:00.000-08:002023-12-21T13:40:31.196-08:00zAnti: Android Penetration testing suite.<p>In the ever-evolving landscape of cybersecurity tools, adaptability is key. With the discontinuation of Dsploit, the search for a reliable successor leads us to the powerful realm of zAnti. As the big brother of Dsploit, zAnti not only inherits its predecessor's capabilities but also introduces a myriad of advanced features, making it the next best choice for aspiring pentest whitehat hackers.</p><h2>The Dsploit Void</h2><p>Once a favorite among cybersecurity enthusiasts, Dsploit's discontinuation left a void in the toolkit of many pentesters. Fortunately, the void is swiftly filled by zAnti, a comprehensive mobile penetration testing toolkit that takes the legacy of Dsploit to new heights.</p><h2>Key Features of zAnti</h2><h3>1. Network Scanning</h3><p>zAnti excels in network reconnaissance. Its robust scanning capabilities empower users to identify vulnerabilities and potential entry points within a network. With zAnti, you can conduct thorough scans to map out the network landscape effectively.</p><h3>2. Man-in-the-Middle (MITM) Attacks</h3><p>One of zAnti's standout features is its prowess in MITM attacks. Whether you're intercepting communication between devices or probing for weak points in a network's security, zAnti provides a seamless and user-friendly experience for MITM attacks.</p><h3>3. Advanced Functionality</h3><p>zAnti goes beyond basic features with a rich set of tools for comprehensive penetration testing. From discovering device information to exploiting vulnerabilities, this toolkit equips you with the arsenal needed to uncover potential threats and fortify defenses.</p><h2>Your Journey to Pentest Whitehat Hacker</h2><p>Embarking on the path to becoming a true pentest whitehat hacker requires tools that are both reliable and versatile. zAnti, with its array of features inherited from Dsploit and its own enhancements, serves as an ideal companion on this journey.</p><h2>Conclusion</h2><p>As Dsploit takes a step back, zAnti emerges as the go-to solution for those seeking a powerful and feature-rich mobile penetration testing toolkit. Equip yourself with zAnti's capabilities, embrace the world of ethical hacking, and take strides towards becoming a true pentest whitehat hacker.</p><p><strong>Keywords: Dsploit, zAnti, Network Security, Pentest Whitehat Hacker, MITM Attacks, Mobile Penetration Testing, Cybersecurity Tools, Ethical Hacking</strong></p><p>Unlock the potential of zAnti and elevate your penetration testing game. Stay secure, stay informed!</p><p></p>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4733071069534554644.post-68027215238928934072023-12-21T04:31:00.000-08:002023-12-21T04:47:22.861-08:00 Fast Network Scanning with Nmap: A Quick and Secure Tutorial for Kali Linux Users<br /><p>Are you a Kali Linux enthusiast looking to efficiently scan your local network using Nmap? You're in the right place! In this tutorial, we'll guide you through creating a Bash script using Nano to perform a lightning-fast network scan, display a menu of alive hosts, and conduct a deep scan on the selected target.</p><h2>Why Network Scanning Matters</h2><p>Network scanning is a crucial step in cybersecurity and network management. Identifying active hosts and their vulnerabilities is essential for maintaining a secure environment. Our tutorial will help you streamline this process with a customized Bash script.</p><h2>Setting Up the Bash Script</h2><p>Let's dive into the steps to create a powerful Bash script for network scanning:</p><h3>Step 1: Open Nano and Create a Script</h3><p>Open your Kali Linux terminal and use the following command to create a new script:</p><pre><div class="bg-black rounded-md"><div class="flex items-center relative text-gray-200 bg-gray-800 dark:bg-token-surface-primary px-4 py-2 text-xs font-sans justify-between rounded-t-md"><span>bash</span></div></div></pre><pre><div class="bg-black rounded-md"><div class="p-4 overflow-y-auto"><code class="!whitespace-pre hljs language-bash">nano network_scanner.sh
</code></div></div></pre><h3>Step 2: Copy and Paste the Script</h3><p>Copy and paste the provided Bash script into Nano. This script performs a fast network scan with Nmap, creates a menu of alive hosts, and conducts a deep scan on the selected target.</p><p> copy everything after this:</p><p> </p><p>#!/bin/bash<br /><br />clear<br /><br />echo "Fast Network Scan with Nmap"<br />echo "---------------------------"<br /><br /># Fast scan to identify alive hosts<br />nmap -sn 192.168.1.0/24 | grep 'Nmap scan report' | cut -d ' ' -f 5 > alive_hosts.txt<br /><br /># Display menu of alive hosts<br />select host in $(cat alive_hosts.txt); do<br /> if [ -n "$host" ]; then<br /> clear<br /> echo "Selected Host: $host"<br /> echo "---------------------------"<br /><br /> # Deep scan on the selected host<br /> nmap -p- -A $host<br /><br /> break<br /> else<br /> echo "Invalid Selection. Please try again."<br /> fi<br />done<br /> </p><p>stop copying after "done" <br /></p><h3>Step 3: Save and Make Executable</h3><p>Save the script by pressing <code>Ctrl + O</code>, then press <code>Enter</code>. Exit Nano with <code>Ctrl + X</code>. Make the script executable with:</p><pre><div class="bg-black rounded-md"><div class="flex items-center relative text-gray-200 bg-gray-800 dark:bg-token-surface-primary px-4 py-2 text-xs font-sans justify-between rounded-t-md"><span>bash</span></div></div></pre><pre><div class="bg-black rounded-md"><div class="p-4 overflow-y-auto"><code class="!whitespace-pre hljs language-bash"><span class="hljs-built_in">chmod</span> +x network_scanner.sh
</code></div></div></pre><h2>Running the Script</h2><p>Now that your script is ready, let's run through the steps to scan your network:</p><ol><li>Execute the script:</li></ol><pre><div class="bg-black rounded-md"><div class="flex items-center relative text-gray-200 bg-gray-800 dark:bg-token-surface-primary px-4 py-2 text-xs font-sans justify-between rounded-t-md"><span>bash</span></div></div></pre><pre><div class="bg-black rounded-md"><div class="p-4 overflow-y-auto"><code class="!whitespace-pre hljs language-bash">./network_scanner.sh
</code></div></div></pre><ol start="2"><li><p>The script will initiate a fast scan to identify alive hosts in your local network.</p></li><li><p>A menu displaying alive hosts will appear. Select your desired host by entering its number and pressing <code>Enter</code>.</p></li><li><p>The script will perform a detailed deep scan on the chosen host using Nmap, revealing open ports and service versions.</p></li><li><p>To exit the script, press <code>Ctrl + C</code>.</p></li></ol><h2>Tips and Customization</h2><ul><li>Ensure you have the necessary permissions to run Nmap.</li><li>Customize the IP range in the script to match your network setup.</li><li>This script provides valuable insights for cybersecurity and network optimization.</li></ul><h2>Conclusion</h2><p>Congratulations! You've successfully created a Bash script for efficient network scanning with Nmap. This quick and secure process empowers Kali Linux users to identify active hosts and potential vulnerabilities within their local networks.</p><p>Stay tuned for more tutorials and cybersecurity insights. Happy scanning!</p>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4733071069534554644.post-3937359348323261052016-05-31T12:57:00.002-07:002016-05-31T12:57:52.132-07:00Privacy for anyone anywhere - Tails, a live operating system. live operating system "Tails" aims to let people use the Internet anonymously and circumvent censorship as all connections are forced to go the the Tor network, the operating system runs live and leaves no trace unless asked explicitly, state-of-the-art cryptographic tools to encrypt your files, emails and text messeges.<br />
<br />
<div style="text-align: center;">
<span style="font-size: x-large;"><a href="https://tails.boum.org/index.en.html">https://tails.boum.org/index.en.html</a></span></div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
<br /></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4733071069534554644.post-83081360326834640012016-05-31T12:50:00.000-07:002016-05-31T12:50:22.520-07:00Are you ready to know how the NSA is spying on you? the internet is in TURMOIL!<h1 class="watch-title-container" style="background: rgb(255, 255, 255); border: 0px; display: table-cell; font-family: Roboto, arial, sans-serif; font-size: 20px; font-weight: normal; margin: 0px; padding: 0px; text-align: center; vertical-align: top; width: 824px; word-wrap: break-word;">
<span class="watch-title" dir="ltr" id="eow-title" style="background: transparent; border: 0px; margin: 0px; padding: 0px;" title="Jacob Appelbaum - To Protect and Infect Part 2 - At 30c3 on Mass Surveillance Tools & Software">Jacob Appelbaum - To Protect and Infect Part 2 - At 30c3 on Mass Surveillance Tools & Software<br /><br />This is a great speech by Jacob Appelbaum at -></span></h1>
<h1 class="firstHeading" id="firstHeading" lang="en" style="background-attachment: initial; background-clip: initial; background-image: none; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border-bottom-color: rgb(170, 170, 170); border-bottom-style: solid; border-bottom-width: 1px; font-family: 'Linux Libertine', Georgia, Times, serif; font-size: 1.8em; font-weight: normal; line-height: 1.3; margin: 0px 0px 0.25em; overflow: visible; padding: 0px;">
<a href="https://en.wikipedia.org/wiki/Chaos_Communication_Congress" target="_blank">Chaos Communication Congress</a></h1>
<div class="separator" style="clear: both; text-align: center;">
<iframe width="320" height="266" class="YOUTUBE-iframe-video" data-thumbnail-src="https://i.ytimg.com/vi/vILAlhwUgIU/0.jpg" src="https://www.youtube.com/embed/vILAlhwUgIU?feature=player_embedded" frameborder="0" allowfullscreen></iframe></div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
oh</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4733071069534554644.post-65307234788914534462015-10-19T05:55:00.001-07:002015-10-19T05:55:45.766-07:00Home - Dexter Industries<a href="http://www.dexterindustries.com/#.ViToFdrXwoo.blogger">Home - Dexter Industries</a>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4733071069534554644.post-74242548290107367432014-02-28T05:10:00.002-08:002014-02-28T05:10:13.726-08:00offensivehacking<div style="text-align: center;">
<b><span style="font-size: x-large;"><a href="http://offensivehacking.wordpress.com/">http://offensivehacking.wordpress.com/</a></span></b></div>
<div style="text-align: center;">
<b><br /></b></div>
<div style="text-align: center;">
<b><a href="http://offensivehacking.wordpress.com/" target="_blank">C</a>heck them out!</b></div>
<div style="text-align: center;">
<b><span style="font-size: x-small;"><a href="http://offensivehacking.wordpress.com/" target="_blank"><br /></a></span></b></div>
<ul style="background-color: #bcc5c1; border: 0px; font-family: Tahoma, Arial, sans-serif; margin: 0px; padding: 0px; vertical-align: baseline;">
<li class="widget wp_widget_tag_cloud" id="wp_tag_cloud-2" style="border: 0px; font-family: inherit; font-style: inherit; line-height: inherit; list-style-image: none; list-style-type: none; margin: 0px 0px 18px; padding: 0px; vertical-align: baseline;"><div style="border: 0px; font-family: inherit; font-style: inherit; line-height: inherit; margin: 0px; overflow: hidden; padding: 0px; vertical-align: baseline;">
<a href="http://offensivehacking.wordpress.com/" target="_blank"><b><span style="font-size: x-small;"><span style="font-family: inherit;"><span style="font-style: inherit; line-height: inherit;">backtrack</span></span> <span style="font-family: inherit;"><span style="font-style: inherit; line-height: inherit;">ba</span></span></span></b><b style="font-family: inherit; font-style: inherit; line-height: inherit;"><span style="font-size: x-small;"><span style="font-family: inherit;"><span style="font-style: inherit; line-height: inherit;">nner grabbingbruteforce</span></span> <span style="font-family: inherit;"><span style="font-style: inherit; line-height: inherit;">bypass</span></span> <span style="font-family: inherit;"><span style="font-style: inherit; line-height: inherit;">computers</span></span> <span style="font-family: inherit;"><span style="font-style: inherit; line-height: inherit;">connectioncracking</span></span> <span style="font-family: inherit;"><span style="font-style: inherit; line-height: inherit;">dictionary</span></span> <span style="font-family: inherit;"><span style="font-style: inherit; line-height: inherit;">dictionary file</span></span> <span style="font-family: inherit;"><span style="font-style: inherit; line-height: inherit;">encryptionexploits</span></span> <span style="font-family: inherit;"><span style="font-style: inherit; line-height: inherit;">fak login page</span></span> <span style="font-family: inherit;"><span style="font-style: inherit; line-height: inherit;">fcrackzip</span></span> <span style="font-family: inherit;"><span style="font-style: inherit; line-height: inherit;">hack</span></span> <span style="font-family: inherit;"><span style="font-style: inherit; line-height: inherit;">HACKERHACKING</span></span> <span style="font-family: inherit;"><span style="font-style: inherit; line-height: inherit;">hashing</span></span> <span style="font-family: inherit;"><span style="font-style: inherit; line-height: inherit;">hosts</span></span> <span style="font-family: inherit;"><span style="font-style: inherit; line-height: inherit;">http</span></span> <span style="font-family: inherit;"><span style="font-style: inherit; line-height: inherit;">identityIdentity theft</span></span> <span style="font-family: inherit;"><span style="font-style: inherit; line-height: inherit;">IIS server</span></span> <span style="font-family: inherit;"><span style="font-style: inherit; line-height: inherit;">imap</span></span> <span style="font-family: inherit;"><span style="font-style: inherit; line-height: inherit;">ip</span></span> <span style="font-family: inherit;"><span style="font-style: inherit; line-height: inherit;">ipv4</span></span> <span style="font-family: inherit;"><span style="font-style: inherit; line-height: inherit;">ipv6</span></span> <span style="font-family: inherit;"><span style="font-style: inherit; line-height: inherit;">layers</span></span> <span style="font-family: inherit;"><span style="font-style: inherit; line-height: inherit;">linuxlinux cracking</span></span> <span style="font-family: inherit;"><span style="font-style: inherit; line-height: inherit;">login</span></span> <span style="font-family: inherit;"><span style="font-style: inherit; line-height: inherit;">mac</span></span> <span style="font-family: inherit;"><span style="font-style: inherit; line-height: inherit;">media</span></span> <span style="font-family: inherit;"><span style="font-style: inherit; line-height: inherit;">medium</span></span> <span style="font-family: inherit;"><span style="font-style: inherit; line-height: inherit;">modelnetwork</span></span> <span style="font-family: inherit;"><span style="font-style: inherit; line-height: inherit;">networking</span></span> <span style="font-family: inherit;"><span style="font-style: inherit; line-height: inherit;">nodes</span></span> <span style="font-family: inherit;"><span style="font-style: inherit; line-height: inherit;">octet</span></span> <span style="font-family: inherit;"><span style="font-style: inherit; line-height: inherit;">password cracking</span></span> <span style="font-family: inherit;"><span style="font-style: inherit; line-height: inherit;">password cracking techniques</span></span> <span style="font-family: inherit;"><span style="font-style: inherit; line-height: inherit;">password protected zip file</span></span> <span style="font-family: inherit;"><span style="font-style: inherit; line-height: inherit;">passwords.pdf hacking.</span></span> <span style="font-family: inherit;"><span style="font-style: inherit; line-height: inherit;">pdfcrack</span></span> <span style="font-family: inherit;"><span style="font-style: inherit; line-height: inherit;">pdf cracking</span></span> <span style="font-family: inherit;"><span style="font-style: inherit; line-height: inherit;">PHASES</span></span> <span style="font-family: inherit;"><span style="font-style: inherit; line-height: inherit;">phishing</span></span> <span style="font-family: inherit;"><span style="font-style: inherit; line-height: inherit;">physical</span></span> <span style="font-family: inherit;"><span style="font-style: inherit; line-height: inherit;">port</span></span> <span style="font-family: inherit;"><span style="font-style: inherit; line-height: inherit;">portsportscanning</span></span> <span style="font-family: inherit;"><span style="font-style: inherit; line-height: inherit;">protocol</span></span> <span style="font-family: inherit;"><span style="font-style: inherit; line-height: inherit;">protocols</span></span> <span style="font-family: inherit;"><span style="font-style: inherit; line-height: inherit;">scanline</span></span> <span style="font-family: inherit;"><span style="font-style: inherit; line-height: inherit;">securesharing</span></span> <span style="font-family: inherit;"><span style="font-style: inherit; line-height: inherit;">spoofing</span></span> <span style="font-family: inherit;"><span style="font-style: inherit; line-height: inherit;">tcp</span></span> <span style="font-family: inherit;"><span style="font-style: inherit; line-height: inherit;">telnet</span></span> <span style="font-family: inherit;"><span style="font-style: inherit; line-height: inherit;">udp</span></span> <span style="font-family: inherit;"><span style="font-style: inherit; line-height: inherit;">unix</span></span> <span style="font-family: inherit;"><span style="font-style: inherit; line-height: inherit;">utilman.exevulnerabilities</span></span> <span style="font-family: inherit;"><span style="font-style: inherit; line-height: inherit;">windows</span></span> <span style="font-family: inherit;"><span style="font-style: inherit; line-height: inherit;">windows8</span></span></span></b></a></div>
</li>
<li class="widget widget_tag_cloud" id="tag_cloud-2" style="border: 0px; font-family: inherit; font-style: inherit; line-height: inherit; list-style-image: none; list-style-type: none; margin: 0px 20px 18px 0px; padding: 0px; vertical-align: baseline;"><h2 class="widgettitle" style="background-image: url(http://s0.wp.com/wp-content/themes/pub/greyzed/images/sidebar-headings.gif); background-position: 0% 0%; border: 0px; font-family: Tahoma, Verdana, sans-serif; font-style: inherit; line-height: 32px; margin: 5px 0px 0px; padding: 2px 0px 0px 47px; text-transform: uppercase; vertical-align: baseline; width: 208px;">
</h2>
<div style="border: 0px; font-family: inherit; font-style: inherit; line-height: inherit; margin: 0px; overflow: hidden; padding: 0px; vertical-align: baseline;">
<b><span style="font-size: x-small;"><a href="http://offensivehacking.wordpress.com/" target="_blank"><span style="font-family: inherit;"><span style="font-style: inherit; line-height: inherit; margin: 1px; padding: 1px;">BANNER GRABBING</span></span> <span style="font-family: inherit;"><span style="font-style: inherit; line-height: inherit; margin: 1px; padding: 1px;">EMAIL HACKINGGAINING ACCESSINTRODUCTIONNETWORKINGPASSWORD CRACKING<span style="font-family: inherit;"><span style="font-style: inherit; line-height: inherit; margin: 1px; padding: 1px;">WINDOWS HACKING</span></span></span></span></a></span></b></div>
</li>
</ul>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4733071069534554644.post-6526805252567001632014-02-28T05:02:00.002-08:002014-02-28T05:03:46.077-08:00Reverse Engineering or Cracking an EXE file<div style="text-align: center;">
This article gives you insite on how to Reverse Engineer or Crack a windows Executable file.</div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
Click below to read the article.</div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
<a href="http://offensivehacking.wordpress.com/hacking-tutorials/reverse-engineering/cracking-an-exe-file/" target="_blank"><span style="color: red; font-size: x-large;"><b>Cracking an Exe file</b></span></a></div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
Happy Cracking!</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4733071069534554644.post-14796383080040516882014-02-28T04:57:00.001-08:002014-02-28T04:57:52.471-08:00Kali Linux - Linux Penetration Testing Distro -<div style="text-align: center;">
From the creators of Backtrack comes</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.kali.org/wp-content/uploads/2013/03/kali-site-logo2.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img alt="Kali Linux" border="0" src="http://www.kali.org/wp-content/uploads/2013/03/kali-site-logo2.png" /></a></div>
<div style="text-align: center;">
<b><br /></b></div>
<div style="text-align: center;">
<b><br /></b></div>
<div style="text-align: center;">
<b>KALI Linux</b><br />
<b>the Rebirth of Backtrack.</b></div>
<div style="text-align: center;">
<b><br /></b></div>
<div style="text-align: center;">
<b>Download here</b></div>
<div style="text-align: center;">
<b><br /></b></div>
<div style="text-align: center;">
<b>64-bit</b></div>
<div style="text-align: center;">
<b><a href="http://cdimage.kali.org/kali-latest/amd64/kali-linux-1.0.6-amd64.iso">http://cdimage.kali.org/kali-latest/amd64/kali-linux-1.0.6-amd64.iso</a></b></div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
<b>32-bit</b></div>
<div style="text-align: center;">
<b><a href="http://cdimage.kali.org/kali-latest/i386/kali-linux-1.0.6-i386.iso">http://cdimage.kali.org/kali-latest/i386/kali-linux-1.0.6-i386.iso</a></b></div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
Kali linux is an open source penetration suit distribution of linux, funded by Offensive Security.</div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
</div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
Heres where the real fun begins!</div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
Enjoy!</div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
<br /></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4733071069534554644.post-46543941262811851382014-02-16T16:27:00.001-08:002014-02-16T16:27:47.852-08:00Free rap beats, and other instrumentals! come freestyle! -gocyberpunk<div style="text-align: center;">
<span style="font-size: x-large;">Presenting: </span></div>
<div style="text-align: center;">
<a href="http://13theunderground.blogspot.com/" target="_blank"><span style="font-size: x-large;">13theunderground</span></a></div>
<div style="text-align: center;">
<span style="font-size: x-large;"> -</span></div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
<span style="font-size: x-large;">Free Rap Beats</span></div>
<div style="text-align: center;">
<span style="font-size: x-large;">composed by <a href="http://mynorthernmind.blogspot.com/" target="_blank">me</a>.</span></div>
<div style="text-align: center;">
<span style="font-size: x-large;"> </span></div>
<div style="text-align: center;">
<br /></div>
Yes its been some time since my last post but hey.. Its another
Michigan winter and its definitely been a hard one. Freezing pipes,
thousand dollar electric bills... You could say I've been busy, Most of
my spare time i've been taking out my frustrations in the soundlab
creating hip-hop instrumentals and posting them to youtube for free, I
love free rap beats and instrumentals.. I love catching a buzz and
sitting around with my homies/family, and spitting a freestyle or two,
or maybe come up with a whole new song!<br />
<br />
We shall push
forward through the winter only 33 more days until spring! (lets hope
this comes with warmer weather). Stir crazy, some would say, caused me
to Invent all kinds of little rigged up doohickeys and gadgets that i've
disassembled and reassembled in my spare time. Spending a lot of time
trying to learn about SEO, and how to get my million views or so..
(being hopeful). I noticed one day that a ton of the instrumentals that I
listen to on youtube have like 8 million views! Thats Insane! well
since I haven't been able to afford a new condenser mic for my sound
lab, I have a ton of instrumentals that I have created and no way to put
the vocals to them, then the idea struck me! Give them away for free!
whats better than free?<br />
lol, well aside from the advertisements that I have set up on my websites, I am asking absolutely nothing for my instrumentals.<br />
<br />
Working third shift has been hell... trying to find rest has been difficult.<br />
my instrumentals sound dark. almost Horror-core, but I love Music either way.<br />
<br />
So
if you are looking to kick a dope freestyle and get your video featured
on my Site then please take the time and visit either our youtube
channel at<br />
<a href="https://www.blogger.com/goog_1828633989"><br /></a>
<a href="http://www.youtube.com/watch?v=xFxXw7vTg1Q&list=PLFJ6Y5AHijRs1ypMBFLf04gIM2KktnqXg">http://www.youtube.com/watch?v=xFxXw7vTg1Q&list=PLFJ6Y5AHijRs1ypMBFLf04gIM2KktnqXg</a><br />
<br />
or check out the instrumentals on our site at <a href="http://13theunderground.blogspot.com/" target="_blank">13TheUnderground</a>.<br />
<br />
thanks for all your support<br />
<br />
-<a href="http://gocyberpunk.blogspot.com/" target="_blank">GCP</a><br />
<div style="text-align: center;">
<br /></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4733071069534554644.post-52019614464360252762014-02-16T16:10:00.003-08:002014-02-16T16:10:43.848-08:00Very interesting! Thanks for your support!<table cellpadding="0" cellspacing="0"><tbody>
<tr><td align="left" style="vertical-align: top;" width="320px"><div>
<h3 class="GFPUSQ2GN GFPUSQ2DN blogg-title" id="topCountriesLabel">
</h3>
<h3 class="GFPUSQ2GN GFPUSQ2DN blogg-title" id="topCountriesLabel">
Pageviews by Countries </h3>
<div>
<div>
<img alt="Graph of most popular countries among blog viewers" class="gwt-Image" role="img" src="https://chart.googleapis.com/chart?chf=bg,s,EAF7FE&chs=320x160&cht=t&chco=F9FFED,E0FFD5,236A13&chld=BRCADEFRHRRSRUUAUSVN&chd=s:EBjCCBTE9B&chtm=world" style="height: 160px; width: 320px;" /></div>
<div class="GFPUSQ2JN">
<div>
<table __gwtcellbasedwidgetimpldispatchingblur="true" __gwtcellbasedwidgetimpldispatchingfocus="true" cellspacing="0" class="GFPUSQ2A1"><thead>
<tr __gwt_header_row="0"><th __gwt_column="column-gwt-uid-246" __gwt_header="header-gwt-uid-247" class="GFPUSQ2P- GFPUSQ2N-" colspan="1">Entry</th><th __gwt_column="column-gwt-uid-248" __gwt_header="header-gwt-uid-249" class="GFPUSQ2P- GFPUSQ2H0" colspan="1">Pageviews</th></tr>
</thead><colgroup><col></col><col></col></colgroup><tbody>
<tr __gwt_row="0" __gwt_subrow="0" class="GFPUSQ2J-"><td class="GFPUSQ2I- GFPUSQ2K- GFPUSQ2L-"><div __gwt_cell="cell-gwt-uid-250" style="outline-style: none;" tabindex="0">
<div class="GFPUSQ2EO">
United States</div>
</div>
</td><td class="GFPUSQ2I- GFPUSQ2K- GFPUSQ2F0"><div __gwt_cell="cell-gwt-uid-251" style="outline-style: none;">
273</div>
</td></tr>
<tr __gwt_row="1" __gwt_subrow="0" class="GFPUSQ2J0"><td class="GFPUSQ2I- GFPUSQ2K0 GFPUSQ2L-"><div __gwt_cell="cell-gwt-uid-250" style="outline-style: none;">
<div class="GFPUSQ2EO">
Germany</div>
</div>
</td><td class="GFPUSQ2I- GFPUSQ2K0 GFPUSQ2F0"><div __gwt_cell="cell-gwt-uid-251" style="outline-style: none;">
156</div>
</td></tr>
<tr __gwt_row="2" __gwt_subrow="0" class="GFPUSQ2J-"><td class="GFPUSQ2I- GFPUSQ2K- GFPUSQ2L-"><div __gwt_cell="cell-gwt-uid-250" style="outline-style: none;">
<div class="GFPUSQ2EO">
Russia</div>
</div>
</td><td class="GFPUSQ2I- GFPUSQ2K- GFPUSQ2F0"><div __gwt_cell="cell-gwt-uid-251" style="outline-style: none;">
87</div>
</td></tr>
<tr __gwt_row="3" __gwt_subrow="0" class="GFPUSQ2J0"><td class="GFPUSQ2I- GFPUSQ2K0 GFPUSQ2L-"><div __gwt_cell="cell-gwt-uid-250" style="outline-style: none;">
<div class="GFPUSQ2EO">
Brazil</div>
</div>
</td><td class="GFPUSQ2I- GFPUSQ2K0 GFPUSQ2F0"><div __gwt_cell="cell-gwt-uid-251" style="outline-style: none;">
20</div>
</td></tr>
<tr __gwt_row="4" __gwt_subrow="0" class="GFPUSQ2J-"><td class="GFPUSQ2I- GFPUSQ2K- GFPUSQ2L-"><div __gwt_cell="cell-gwt-uid-250" style="outline-style: none;">
<div class="GFPUSQ2EO">
Ukraine</div>
</div>
</td><td class="GFPUSQ2I- GFPUSQ2K- GFPUSQ2F0"><div __gwt_cell="cell-gwt-uid-251" style="outline-style: none;">
19</div>
</td></tr>
<tr __gwt_row="5" __gwt_subrow="0" class="GFPUSQ2J0"><td class="GFPUSQ2I- GFPUSQ2K0 GFPUSQ2L-"><div __gwt_cell="cell-gwt-uid-250" style="outline-style: none;">
<div class="GFPUSQ2EO">
Croatia</div>
</div>
</td><td class="GFPUSQ2I- GFPUSQ2K0 GFPUSQ2F0"><div __gwt_cell="cell-gwt-uid-251" style="outline-style: none;">
10</div>
</td></tr>
<tr __gwt_row="6" __gwt_subrow="0" class="GFPUSQ2J-"><td class="GFPUSQ2I- GFPUSQ2K- GFPUSQ2L-"><div __gwt_cell="cell-gwt-uid-250" style="outline-style: none;">
<div class="GFPUSQ2EO">
France</div>
</div>
</td><td class="GFPUSQ2I- GFPUSQ2K- GFPUSQ2F0"><div __gwt_cell="cell-gwt-uid-251" style="outline-style: none;">
9</div>
</td></tr>
<tr __gwt_row="7" __gwt_subrow="0" class="GFPUSQ2J0"><td class="GFPUSQ2I- GFPUSQ2K0 GFPUSQ2L-"><div __gwt_cell="cell-gwt-uid-250" style="outline-style: none;">
<div class="GFPUSQ2EO">
Canada</div>
</div>
</td><td class="GFPUSQ2I- GFPUSQ2K0 GFPUSQ2F0"><div __gwt_cell="cell-gwt-uid-251" style="outline-style: none;">
6</div>
</td></tr>
<tr __gwt_row="8" __gwt_subrow="0" class="GFPUSQ2J-"><td class="GFPUSQ2I- GFPUSQ2K- GFPUSQ2L-"><div __gwt_cell="cell-gwt-uid-250" style="outline-style: none;">
<div class="GFPUSQ2EO">
Serbia</div>
</div>
</td><td class="GFPUSQ2I- GFPUSQ2K- GFPUSQ2F0"><div __gwt_cell="cell-gwt-uid-251" style="outline-style: none;">
6</div>
</td></tr>
<tr __gwt_row="9" __gwt_subrow="0" class="GFPUSQ2J0"><td class="GFPUSQ2I- GFPUSQ2K0 GFPUSQ2L-"><div __gwt_cell="cell-gwt-uid-250" style="outline-style: none;">
<div class="GFPUSQ2EO">
Vietnam</div>
</div>
</td><td class="GFPUSQ2I- GFPUSQ2K0 GFPUSQ2F0"><div __gwt_cell="cell-gwt-uid-251" style="outline-style: none;">
6</div>
</td></tr>
</tbody></table>
</div>
</div>
</div>
</div>
</td><td align="left" style="vertical-align: top;" width="20px"><br /></td><td align="left" style="vertical-align: top;" width="460px"><div>
<h3 class="GFPUSQ2GN GFPUSQ2DN blogg-title" id="topBrowsersLabel">
Pageviews by Browsers </h3>
<div>
<table cellpadding="0" cellspacing="0" style="width: 100%;"><tbody>
<tr><td align="left" style="vertical-align: top;"><div>
<div>
<table __gwtcellbasedwidgetimpldispatchingblur="true" __gwtcellbasedwidgetimpldispatchingfocus="true" cellspacing="0" class="GFPUSQ2A1"><thead>
<tr __gwt_header_row="0"><th __gwt_column="column-gwt-uid-252" __gwt_header="header-gwt-uid-253" class="GFPUSQ2P- GFPUSQ2N-" colspan="1">Entry</th><th __gwt_column="column-gwt-uid-254" __gwt_header="header-gwt-uid-255" class="GFPUSQ2P- GFPUSQ2H0" colspan="1">Pageviews</th></tr>
</thead><colgroup><col></col><col></col></colgroup><tbody>
<tr __gwt_row="0" __gwt_subrow="0" class="GFPUSQ2J-"><td class="GFPUSQ2I- GFPUSQ2K- GFPUSQ2L-"><div __gwt_cell="cell-gwt-uid-256" style="outline-style: none;" tabindex="0">
<div class="GFPUSQ2EO">
Chrome</div>
</div>
</td><td class="GFPUSQ2I- GFPUSQ2K- GFPUSQ2F0"><div __gwt_cell="cell-gwt-uid-257" style="outline-style: none;">
270 (37%)</div>
</td></tr>
<tr __gwt_row="1" __gwt_subrow="0" class="GFPUSQ2J0"><td class="GFPUSQ2I- GFPUSQ2K0 GFPUSQ2L-"><div __gwt_cell="cell-gwt-uid-256" style="outline-style: none;">
<div class="GFPUSQ2EO">
Firefox</div>
</div>
</td><td class="GFPUSQ2I- GFPUSQ2K0 GFPUSQ2F0"><div __gwt_cell="cell-gwt-uid-257" style="outline-style: none;">
191 (26%)</div>
</td></tr>
<tr __gwt_row="2" __gwt_subrow="0" class="GFPUSQ2J- GFPUSQ2A0"><td class="GFPUSQ2I- GFPUSQ2K- GFPUSQ2L- GFPUSQ2B0"><div __gwt_cell="cell-gwt-uid-256" style="outline-style: none;">
<div class="GFPUSQ2EO">
Internet Explorer</div>
</div>
</td><td class="GFPUSQ2I- GFPUSQ2K- GFPUSQ2F0 GFPUSQ2B0"><div __gwt_cell="cell-gwt-uid-257" style="outline-style: none;">
160 (22%)</div>
</td></tr>
<tr __gwt_row="3" __gwt_subrow="0" class="GFPUSQ2J0"><td class="GFPUSQ2I- GFPUSQ2K0 GFPUSQ2L-"><div __gwt_cell="cell-gwt-uid-256" style="outline-style: none;">
<div class="GFPUSQ2EO">
Mobile Safari</div>
</div>
</td><td class="GFPUSQ2I- GFPUSQ2K0 GFPUSQ2F0"><div __gwt_cell="cell-gwt-uid-257" style="outline-style: none;">
31 (4%)</div>
</td></tr>
<tr __gwt_row="4" __gwt_subrow="0" class="GFPUSQ2J-"><td class="GFPUSQ2I- GFPUSQ2K- GFPUSQ2L-"><div __gwt_cell="cell-gwt-uid-256" style="outline-style: none;">
<div class="GFPUSQ2EO">
Opera</div>
</div>
</td><td class="GFPUSQ2I- GFPUSQ2K- GFPUSQ2F0"><div __gwt_cell="cell-gwt-uid-257" style="outline-style: none;">
29 (4%)</div>
</td></tr>
<tr __gwt_row="5" __gwt_subrow="0" class="GFPUSQ2J0"><td class="GFPUSQ2I- GFPUSQ2K0 GFPUSQ2L-"><div __gwt_cell="cell-gwt-uid-256" style="outline-style: none;">
<div class="GFPUSQ2EO">
Safari</div>
</div>
</td><td class="GFPUSQ2I- GFPUSQ2K0 GFPUSQ2F0"><div __gwt_cell="cell-gwt-uid-257" style="outline-style: none;">
21 (2%)</div>
</td></tr>
<tr __gwt_row="6" __gwt_subrow="0" class="GFPUSQ2J-"><td class="GFPUSQ2I- GFPUSQ2K- GFPUSQ2L-"><div __gwt_cell="cell-gwt-uid-256" style="outline-style: none;">
<div class="GFPUSQ2EO">
UniversalFeedParser</div>
</div>
</td><td class="GFPUSQ2I- GFPUSQ2K- GFPUSQ2F0"><div __gwt_cell="cell-gwt-uid-257" style="outline-style: none;">
8 (1%)</div>
</td></tr>
<tr __gwt_row="7" __gwt_subrow="0" class="GFPUSQ2J0"><td class="GFPUSQ2I- GFPUSQ2K0 GFPUSQ2L-"><div __gwt_cell="cell-gwt-uid-256" style="outline-style: none;">
<div class="GFPUSQ2EO">
chromeframe</div>
</div>
</td><td class="GFPUSQ2I- GFPUSQ2K0 GFPUSQ2F0"><div __gwt_cell="cell-gwt-uid-257" style="outline-style: none;">
2 (<1%)</div>
</td></tr>
<tr __gwt_row="8" __gwt_subrow="0" class="GFPUSQ2J-"><td class="GFPUSQ2I- GFPUSQ2K- GFPUSQ2L-"><div __gwt_cell="cell-gwt-uid-256" style="outline-style: none;">
<div class="GFPUSQ2EO">
Maxthon</div>
</div>
</td><td class="GFPUSQ2I- GFPUSQ2K- GFPUSQ2F0"><div __gwt_cell="cell-gwt-uid-257" style="outline-style: none;">
1 (<1%)</div>
</td></tr>
<tr __gwt_row="9" __gwt_subrow="0" class="GFPUSQ2J0"><td class="GFPUSQ2I- GFPUSQ2K0 GFPUSQ2L-"><div __gwt_cell="cell-gwt-uid-256" style="outline-style: none;">
<div class="GFPUSQ2EO">
Silk</div>
</div>
</td><td class="GFPUSQ2I- GFPUSQ2K0 GFPUSQ2F0"><div __gwt_cell="cell-gwt-uid-257" style="outline-style: none;">
1 (<1%)</div>
</td></tr>
</tbody></table>
</div>
</div>
</td><td align="left" style="vertical-align: top;" width="200px"><div>
<img alt="Image displaying most popular browsers" class="gwt-Image" role="img" src="https://chart.googleapis.com/chart?chs=220x110&cht=p&chd=s:9rkHHFC&chl=Chrome%7CFirefox%7CInternet+Explorer%7CMobile+Safari%7COpera%7CSafari%7CUniversalFeedParser" style="height: 110px; width: 220px;" /></div>
</td></tr>
</tbody></table>
</div>
<h3 class="GFPUSQ2GN GFPUSQ2DN blogg-title" id="topPlatformsLabel">
Pageviews by Operating Systems </h3>
<div>
<table cellpadding="0" cellspacing="0" style="width: 100%;"><tbody>
<tr><td align="left" style="vertical-align: top;"><div>
<div>
<table __gwtcellbasedwidgetimpldispatchingblur="true" __gwtcellbasedwidgetimpldispatchingfocus="true" cellspacing="0" class="GFPUSQ2A1"><thead>
<tr __gwt_header_row="0"><th __gwt_column="column-gwt-uid-258" __gwt_header="header-gwt-uid-259" class="GFPUSQ2P- GFPUSQ2N-" colspan="1">Entry</th><th __gwt_column="column-gwt-uid-260" __gwt_header="header-gwt-uid-261" class="GFPUSQ2P- GFPUSQ2H0" colspan="1">Pageviews</th></tr>
</thead><colgroup><col></col><col></col></colgroup><tbody>
<tr __gwt_row="0" __gwt_subrow="0" class="GFPUSQ2J-"><td class="GFPUSQ2I- GFPUSQ2K- GFPUSQ2L-"><div __gwt_cell="cell-gwt-uid-262" style="outline-style: none;" tabindex="0">
<div class="GFPUSQ2EO">
Windows</div>
</div>
</td><td class="GFPUSQ2I- GFPUSQ2K- GFPUSQ2F0"><div __gwt_cell="cell-gwt-uid-263" style="outline-style: none;">
545 (77%)</div>
</td></tr>
<tr __gwt_row="1" __gwt_subrow="0" class="GFPUSQ2J0"><td class="GFPUSQ2I- GFPUSQ2K0 GFPUSQ2L-"><div __gwt_cell="cell-gwt-uid-262" style="outline-style: none;">
<div class="GFPUSQ2EO">
Linux</div>
</div>
</td><td class="GFPUSQ2I- GFPUSQ2K0 GFPUSQ2F0"><div __gwt_cell="cell-gwt-uid-263" style="outline-style: none;">
50 (7%)</div>
</td></tr>
<tr __gwt_row="2" __gwt_subrow="0" class="GFPUSQ2J-"><td class="GFPUSQ2I- GFPUSQ2K- GFPUSQ2L-"><div __gwt_cell="cell-gwt-uid-262" style="outline-style: none;">
<div class="GFPUSQ2EO">
Android</div>
</div>
</td><td class="GFPUSQ2I- GFPUSQ2K- GFPUSQ2F0"><div __gwt_cell="cell-gwt-uid-263" style="outline-style: none;">
43 (6%)</div>
</td></tr>
<tr __gwt_row="3" __gwt_subrow="0" class="GFPUSQ2J0"><td class="GFPUSQ2I- GFPUSQ2K0 GFPUSQ2L-"><div __gwt_cell="cell-gwt-uid-262" style="outline-style: none;">
<div class="GFPUSQ2EO">
Macintosh</div>
</div>
</td><td class="GFPUSQ2I- GFPUSQ2K0 GFPUSQ2F0"><div __gwt_cell="cell-gwt-uid-263" style="outline-style: none;">
42 (5%)</div>
</td></tr>
<tr __gwt_row="4" __gwt_subrow="0" class="GFPUSQ2J-"><td class="GFPUSQ2I- GFPUSQ2K- GFPUSQ2L-"><div __gwt_cell="cell-gwt-uid-262" style="outline-style: none;">
<div class="GFPUSQ2EO">
iPad</div>
</div>
</td><td class="GFPUSQ2I- GFPUSQ2K- GFPUSQ2F0"><div __gwt_cell="cell-gwt-uid-263" style="outline-style: none;">
8 (1%)</div>
</td></tr>
<tr __gwt_row="5" __gwt_subrow="0" class="GFPUSQ2J0"><td class="GFPUSQ2I- GFPUSQ2K0 GFPUSQ2L-"><div __gwt_cell="cell-gwt-uid-262" style="outline-style: none;">
<div class="GFPUSQ2EO">
iPhone</div>
</div>
</td><td class="GFPUSQ2I- GFPUSQ2K0 GFPUSQ2F0"><div __gwt_cell="cell-gwt-uid-263" style="outline-style: none;">
8 (1%)</div>
</td></tr>
<tr __gwt_row="6" __gwt_subrow="0" class="GFPUSQ2J-"><td class="GFPUSQ2I- GFPUSQ2K- GFPUSQ2L-"><div __gwt_cell="cell-gwt-uid-262" style="outline-style: none;">
<div class="GFPUSQ2EO">
Other Unix</div>
</div>
</td><td class="GFPUSQ2I- GFPUSQ2K- GFPUSQ2F0"><div __gwt_cell="cell-gwt-uid-263" style="outline-style: none;">
5 (<1%)</div>
</td></tr>
<tr __gwt_row="7" __gwt_subrow="0" class="GFPUSQ2J0"><td class="GFPUSQ2I- GFPUSQ2K0 GFPUSQ2L-"><div __gwt_cell="cell-gwt-uid-262" style="outline-style: none;">
<div class="GFPUSQ2EO">
Nintendo Wii</div>
</div>
</td><td class="GFPUSQ2I- GFPUSQ2K0 GFPUSQ2F0"><div __gwt_cell="cell-gwt-uid-263" style="outline-style: none;">
3 (<1%) </div>
</td></tr>
</tbody></table>
</div>
</div>
</td><td align="left" style="vertical-align: top;" width="200px"><div>
<img alt="Image displaying most popular platforms" class="gwt-Image" role="img" src="https://chart.googleapis.com/chart?chs=220x110&cht=p&chd=s:9GFFBB&chl=Windows%7CLinux%7CAndroid%7CMacintosh%7CiPad%7CiPhone" style="height: 110px; width: 220px;" /></div>
</td></tr>
</tbody></table>
</div>
</div>
</td></tr>
</tbody></table>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4733071069534554644.post-13270654350359529832013-07-26T16:27:00.001-07:002013-07-26T16:27:19.597-07:00goCyberPunkVisit my daily weblog, Pictures and Videos from my daily life, instructions, inventions, random ideas and ramblings of a modern day Cyberpunk madman.<br />
<br />
<a href="http://www.blogger.com/goog_1664819898"><br /></a>
<div style="text-align: center;">
<a href="http://gocyberpunk.blogspot.com/">http://goCyberPunk.blogspot.com/</a></div>
<div style="text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjABhZS_1omOMFNgBPu9GpUyeVZBmk2UgVITEhoCQsqiF_-e3ZdXAOIQRQfOyeIVee1UciWnEOvcAzYBPEbGCeu58hIU4-Mby9HS_c0w9sGJz_QVNisbM6260NFUIk6zWyntUUKtQD9v_o/s1600/OrgFantasy-Island-Palm-Trees-HD-Wallpaper201109100639117982000.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="180" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjABhZS_1omOMFNgBPu9GpUyeVZBmk2UgVITEhoCQsqiF_-e3ZdXAOIQRQfOyeIVee1UciWnEOvcAzYBPEbGCeu58hIU4-Mby9HS_c0w9sGJz_QVNisbM6260NFUIk6zWyntUUKtQD9v_o/s320/OrgFantasy-Island-Palm-Trees-HD-Wallpaper201109100639117982000.jpg" width="320" /> </a></div>
<br />
<br />
<div style="text-align: center;">
2013</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4733071069534554644.post-15643233396882181262013-07-25T20:28:00.003-07:002013-07-25T20:28:55.365-07:00http://www.offensivecomputing.net/<div style="text-align: center;">
<span style="font-size: x-large;"><a href="http://www.offensivecomputing.net/">http://www.offensivecomputing.net/</a></span></div>
<div style="text-align: center;">
<br /></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4733071069534554644.post-65839238593936250362013-07-25T20:15:00.001-07:002013-07-25T20:15:33.982-07:00Remote Administration Tools<div style="text-align: center;">
<span style="font-size: x-large;"><a href="http://knowyourmeme.com/memes/remote-administration-tools">http://knowyourmeme.com/memes/remote-administration-tools</a></span></div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
featuring:</div>
<h4 style="text-align: center;">
<span style="font-size: large;">Back Orifice</span></h4>
<h4 style="text-align: center;">
<span style="font-size: large;"> Bandook</span></h4>
<h4 style="text-align: center;">
<span style="font-size: large;"> CyberGate</span></h4>
<h4 style="text-align: center;">
<span style="font-size: large;"> DarkComet</span></h4>
<h4>
</h4>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4733071069534554644.post-57963397012039195822013-07-25T20:09:00.000-07:002013-07-25T20:09:00.056-07:00Cult of the dead cow<div style="text-align: center;">
<span style="font-size: x-large;"><span style="color: red;">Cult of the dead Cow </span></span></div>
<div style="text-align: center;">
<span style="font-size: x-large;"><a href="http://www.cultdeadcow.com/">http://www.cultdeadcow.com/</a></span></div>
<br />
"This site may contain explicit descriptions of or advocate one or more of the following:<br />
<br />
<span class="desc">adultery, murder, morbid violence, bad grammar,
deviant sexual conduct in violent contexts, or the consumption of
alcohol and illegal drugs.</span>
<br />
<br />
Then again, it may not.<br />
<br />
Who knows?"<br />
<br />
-cultdeadcow.com <br />
<br />
<br />Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4733071069534554644.post-69087152617434831402013-07-17T12:43:00.000-07:002013-07-17T12:43:05.708-07:00LiveChatFeed - Network.<span style="color: lime;"><a href="http://livechatfeed.blogspot.com/"><span style="font-size: x-large;">LiveChatFeed</span></a>, </span><br />
come join this free live chatroom, set in retro.<br />
<br />
<br />
<br />Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4733071069534554644.post-13661695066255738922013-07-17T11:58:00.004-07:002013-07-17T11:58:58.062-07:00DEF CON® 2013!Starting August 1st, through the 4th the Rio Hotel and Casino will be holding the 2013 DEF CON® confrence.<br />
<br />
<br />
<br />
-<a href="http://www.defcon.org/">DEF CON® </a>Since 1993.<br />
<br />Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4733071069534554644.post-56324642234228524062013-07-17T11:43:00.003-07:002013-07-17T11:43:45.989-07:00Network Penetration Testing Tools<b>Must Have! Network Penetration Testing Tools</b>.<br />
<br />
<br />
Here is a nice list of a few network pen testing tools that every home hacker must have in there arsenal, (note: a lot of these tools come within linux distro's like backtrack.)<br />
<br />
<br />
<a href="http://www.stumbler.net/">Net Stumbler</a><br />
<a href="http://www.thc.org/thc-hydra/">THC-HYDRA</a><br />
<a href="http://www.secdev.org/projects/scapy/">SCAPY</a><br />
<a href="http://sectools.org/tool/ettercap/">Ettercap</a>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4733071069534554644.post-12034473509905774862013-07-17T11:35:00.003-07:002013-07-17T11:35:15.180-07:00Hak5<b><span style="font-size: x-large;"><a href="http://revision3.com/hak5">Hack5</a></span></b><br />
<br />
<br />
Internet television at its finest.<br />
<br />
<br />
Hack5 - hacking, modding, homebrew, network security and more!<br />
<br />
Hak5 is one of many internet shows from<a href="http://revision3.com/hak5"> http://revision3.com/</a><br />
<br />
Live to learn! Learn to live!<br />
<br />
<a href="http://gohak.blogspot.com/">-GoHak</a><br />
<br />
<br />
<br />Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4733071069534554644.post-48357496447753870892013-04-24T15:10:00.001-07:002013-04-24T15:10:19.826-07:0010 Infamous Computer Hackershttp://adf.ly/NeHNv
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4733071069534554644.post-85923067295295767112013-04-12T16:20:00.000-07:002013-04-12T16:20:30.300-07:00Poison Ivy - Remote Administration Tool (RAT)<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<span style="font-size: large;"><b>Poison Ivy - Remote Administration Tool (RAT)</b></span></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
Have you ever wondered how a compromised computer stays under hacker control? </div>
<div class="separator" style="clear: both; text-align: center;">
or If you simply want to keep control of all of the computers in your network. <a href="http://www.poisonivy-rat.com/images/ss/build2.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://www.poisonivy-rat.com/images/ss/build2.png" /></a></div>
<div class="" style="clear: both; text-align: center;">
Create Servers for client / server RAT</div>
<div class="separator" style="clear: both; text-align: center;">
You can make the Server, Look for the client and connect automatically.</div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
Another must have for network penetration testers everywhere.</div>
<br /><div>
<br /></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4733071069534554644.post-41645896641978603342013-03-21T06:39:00.000-07:002013-03-21T06:40:54.693-07:00Phrack Magazine<div style="text-align: center;">
</div>
<div style="text-align: center;">
</div>
<div style="text-align: center;">
</div>
<div style="text-align: center;">
"<span style="font-size: large;"><b>Phrack Magazine</b></span>"</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.phrack.org/img/phrack-logo.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img alt="..[ Phrack Magazine ].." border="0" height="150" src="http://www.phrack.org/img/phrack-logo.jpg" width="200" /></a></div>
<div style="text-align: center;">
<a href="http://www.phrack.org/">http://www.phrack.org/</a></div>
<div style="text-align: left;">
<br /></div>
<div style="text-align: left;">
Phrack is a for Hackers-by-hackers, e-zine, it was first published November 17th, 1985, and continues to run till this very day.</div>
<div style="text-align: left;">
The magazine is open for anyone to publish works or express original ideas on topics of interest. </div>
<div style="text-align: left;">
This e-zine, Originally covered subjects that were related to phone phreaking, and telephone system hacking, anarchy and software cracking, computer security, cryptography and most importantly, hacking, as well as international news. </div>
<div style="text-align: left;">
<br /></div>
<div style="text-align: center;">
<br /></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4733071069534554644.post-28645203170919871612013-03-21T06:26:00.001-07:002013-03-21T06:26:39.098-07:00Open Source: Metasploit® Penetration Testing Software<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.metasploit.com/images/global/logo.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img alt="http://www.metasploit.com/images/global/logo.png" border="0" class="decoded" src="http://www.metasploit.com/images/global/logo.png" /></a></div>
<div style="text-align: center;">
<span style="font-size: large;"><a href="http://www.metasploit.com/"><b>http://www.metasploit.com/</b></a></span></div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
<span style="font-size: large;"><b><span style="font-size: large;">Open Source: </span>Metasploit</b></span><span style="font-size: large;"><b>® Penetration Testing Software.</b></span></div>
<div style="text-align: center;">
<span style="font-size: large;"><b>A Mu<span style="font-size: large;">st Have<span style="font-size: large;">.</span></span> </b></span></div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
<span style="font-size: large;"><b> </b></span></div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
<br /></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4733071069534554644.post-90314971303736495532013-03-21T06:15:00.001-07:002013-03-21T06:17:17.609-07:00Captain Crunch<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
<span style="background-color: black;"><span style="color: white;"><span style="font-size: large;">John T Draper - Captain Crunch</span></span></span></div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: left;">
I remember reading about this guy when I was younger, in many [whitepapers] like <i><b>phrack</b></i> and misc. e-zines of the past which can still be found floating around random file-servers everywhere worldwide.</div>
<div style="text-align: left;">
<br /></div>
<div style="text-align: left;">
<br />
Born in 1943, John Draper, a.k.a "<b><i>Captain Crunch</i></b>", a legendary "<b><i>Phone Phreak</i></b>" and computer programmer, was driving his Volkswagen Microbus. Testing his new pirate radio transmitter, he broadcasted a telephone number to his listeners to gauge the stations reception, this resulted in a phone call from Denny Terisi. Terisi, and fellow phreaks wanted John to build a multifrequency tone generator, which later became known as the "blue box". The blue box was used to gain entry into AT&T Telephone System which was then at the time, controlled by tones.</div>
<div style="text-align: left;">
<br /></div>
<div style="text-align: left;">
<br /></div>
<div style="text-align: left;">
<i>Read more about Captain Crunch at</i>: <a href="http://en.wikipedia.org/wiki/John_Draper">http://en.wikipedia.org/wiki/John_Draper</a></div>
<div style="text-align: left;">
<br /></div>
<div style="text-align: left;">
<br /></div>
<div style="text-align: left;">
. </div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4733071069534554644.post-89013186607625422202013-03-21T02:08:00.002-07:002013-03-21T02:08:45.979-07:00Hack a day --Fresh hacks everyday!<div style="text-align: center;">
<a href="http://hackaday.com/"><b><span style="color: black; font-size: large;">http://hackaday.com/</span></b></a></div>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://hackadaycom.files.wordpress.com/2013/03/2nd-grade-steam-engine.png?w=580&h=348" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="192" src="http://hackadaycom.files.wordpress.com/2013/03/2nd-grade-steam-engine.png?w=580&h=348" width="320" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://hackaday.com/2013/03/20/second-grade-science-project-a-steam-engine/">"2nd Grade Science project Steam Engine" </a></div>
<br />
<br />
By far one of my most beloved sites on the web. Hack a day offers up some fresh hacks everyday, from hardware DIYers to software DIYers, Hacks for everything from A to Z, Cellphones, Game Consoles, Tesla Coils, and way way more! so much more I don't have the time to go through the half of it.<br />
But I will definitely recommend this website to anyone.<br />
<br />Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4733071069534554644.post-27395728745756313262013-03-21T02:01:00.001-07:002013-03-21T02:02:52.031-07:00Root-The-Box<a href="http://rootthebox.com/">http://rootthebox.com/</a><br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://rootthebox.com/static/img/rtb-logo.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://rootthebox.com/static/img/rtb-logo.png" /></a></div>
<br />
<span style="font-family: DIN-Regular, Arial, serif; line-height: 32.125px; text-align: center;">Root the Box is a computer hacking (CTF) game that requires </span><b style="font-family: DIN-Medium, Arial, serif; line-height: 32.125px; text-align: center;">skill</b><span style="font-family: DIN-Regular, Arial, serif; line-height: 32.125px; text-align: center;">, </span><b style="font-family: DIN-Medium, Arial, serif; line-height: 32.125px; text-align: center;">speed</b><span style="font-family: DIN-Regular, Arial, serif; line-height: 32.125px; text-align: center;"> and </span><b style="font-family: DIN-Medium, Arial, serif; line-height: 32.125px; text-align: center;">teamwork</b><b style="line-height: 32.125px; text-align: center;"><span style="font-family: DIN-Regular, Arial, serif;">. </span></b><br />
<b style="line-height: 32.125px; text-align: center;"><span style="font-family: DIN-Regular, Arial, serif;">-roothebox.com</span></b><br />
<b style="line-height: 32.125px; text-align: center;"><span style="font-family: DIN-Regular, Arial, serif;"><br /></span></b>
<br />
<div style="text-align: center;">
<span style="font-family: DIN-Regular, Arial, serif;"><span style="line-height: 32.125px;"><b>Participate in a hacking challenge!</b></span></span></div>
<div style="text-align: center;">
<span style="font-family: DIN-Regular, Arial, serif;"><span style="line-height: 32.125px;"><b>prizes are awarded for things like "worst password" and "best psychological meltdown". </b></span></span></div>
<div style="text-align: center;">
<span style="font-family: DIN-Regular, Arial, serif;"><span style="line-height: 32.125px;"><b><br /></b></span></span></div>
<div style="text-align: center;">
<span style="font-family: DIN-Regular, Arial, serif;"><span style="line-height: 32.125px;">For some legal hacking fun. go play some Capture the Flag!</span></span></div>
<div style="text-align: center;">
<span style="font-family: DIN-Regular, Arial, serif;"><span style="line-height: 32.125px;"><br /></span></span></div>
<div style="text-align: center;">
<a href="http://rootthebox.com/" style="text-align: start;"><b><span style="font-size: large;">http://rootthebox.com/</span></b></a></div>
<span style="color: red;"><b style="font-size: 24px; line-height: 32.125px; text-align: center;"><span style="font-family: DIN-Regular, Arial, serif;"><br /></span></b></span>Unknownnoreply@blogger.com0