Jump to content

Recommended Posts

Gt1984

Καλησπέρα στην κοινότητα.

Ψάχνω έναν τρόπο να ενεργοποιήσω τα Office μου. Λόγο ανεργίας μου είναι δύσκολο να πάω να τα αγοράσω. Ευχαριστώ πολύ για όποια βοήθεια.

Share this post


Link to post
Share on other sites

Δημιουργήστε ένα λογαριασμό ή συνδεθείτε προκειμένου να το δείτε

Πρέπει να είστε μέλος για να μπορέσετε να αφήσετε κάποιο σχόλιο

Δημιουργία λογαριασμού

Κάντε μια δωρεάν εγγραφή στην κοινότητά μας. Η εγγραφές μας είναι εύκολες.!

Εγγραφή τώρα

Σύνδεση

Εάν έχετε ήδη λογαριασμό σε αυτό το Forum; Συνδεθείτε εδώ.

Συνδεθείτε τώρα

  • Μηνύματα

    • Anastasis
      Androguard Reverse engineering, Malware and goodware analysis of Android applications … and more (ninja !) Features Androguard is a full python tool to play with Android files. DEX, ODEX APK Android’s binary xml Android resources Disassemble DEX/ODEX bytecodes Decompiler for DEX/ODEX files Changelog v3.2.1 Small bugfixes Installation Tool androarsc Usage: androarsc.py [options] Options: -h, --help show this help message and exit -i INPUT, --input=INPUT filename input (APK or android resources(arsc)) -p PACKAGE, --package=PACKAGE select the package (optional) -l LOCALE, --locale=LOCALE select the locale (optional) -t TYPE, --type=TYPE select the type (string, interger, public, ...) -o OUTPUT, --output=OUTPUT filename output -v, --version version of the API     androauto Usage: androauto.py [options] Options: -h, --help show this help message and exit -d DIRECTORY, --directory=DIRECTORY directory input -v, --verbose add debug   androaxml Usage: androaxml.py [options] Options: -h, --help show this help message and exit -i INPUT, --input=INPUT filename input (APK or android's binary xml) -o OUTPUT, --output=OUTPUT filename output of the xml -v, --version version of the API   androdd Usage: androdd.py [options] Options: -h, --help show this help message and exit -i INPUT, --input=INPUT file : use this filename -o OUTPUT, --output=OUTPUT base directory to output all files -d DECOMPILER, --decompiler=DECOMPILER choose a decompiler -j, --jar output jar file -f FORMAT, --format=FORMAT write the method in specific format (png, ...) -l LIMIT, --limit=LIMIT limit analysis to specific methods/classes by using a regexp   androdis Usage: androdis.py [options] Options: -h, --help show this help message and exit -i INPUT, --input=INPUT file : use this filename (DEX/ODEX) -o OFFSET, --offset=OFFSET offset to disassemble -s SIZE, --size=SIZE size   androgui usage: androgui.py [-h] [-d] [-i INPUT_FILE] [-p INPUT_PLUGIN] Androguard GUI optional arguments: -h, --help show this help message and exit -d, --debug -i INPUT_FILE, --input_file INPUT_FILE -p INPUT_PLUGIN, --input_plugin INPUT_PLUGIN   androlyze androlyze is a tool that spawns an IPython shell.   Copyright (C) 2012 – 2016, Anthony Desnos (desnos at t0t0.fr) All rights reserved. Source: https://github.com/androguard/
    • Anastasis
      Seeker utilizes HTML5, Javascript, JQuery and PHP to grab Device Information and GeoLocation with High Accuracy. Other tools and services offer IP Geolocation which is not very accurate and does not give location of user. Generally if a user accepts location permsission, Accuracy of the information recieved is accurate to approximately 30 meters. Note : On iPhone due to some reason location accuracy is approximately 65 meters.
      It Hosts a fake website on Apache Server and uses Ngrok to generate a SSL link which asks for Location Permission and if the user allows it, we can get : Longitude Latitude Accuracy Altitude - Not always available Direction - Only available if user is moving Speed - Only available if user is moving Along with Location Information we can also get Device Information without any permissions : Operating System Platform Number of CPU Cores Amount of RAM - Approximate Results Screen Resolution GPU information Browser Name and Version Public IP Address
      Tested On : Kali Linux 2018.2 Ubuntu 18.04
      Requirements
      Supports both Python2 and Python3.
      Seeker uses common standard python modules : os time json requests subprocess
      Installation git clone https://github.com/thewhiteh4t/seeker.git cd seeker/ chmod 777 install.sh ./install.sh #After Installation just type seeker in console
      Screenshots

         
        Download Seeker
    • Anastasis
      Domain Hijacking is a well-known security issue that can be carried in many different ways. In addition to social engineering or unauthorized access to the domain owner’s account, the exploitation of neglected DNS records configured for cloud services is increasingly common. In the latter case, a threat actor (TA) can potentially take control of a subdomain configured for a disused or legacy third party cloud service allowing them to then launch a variety of attacks against your organization. Third party cloud services are an extremely common turnkey solution, used by many organizations, big and small. The configuration is simple: use the cloud service to create the resource you desire and then redirect clients from your subdomain to the third-party cloud service, using records such as CNAME or DNAME.   Abandoned domains or subdomains occur when an organization stops using a cloud service and forget to remove or update the DNS records pointing to them. Additionally, organizations may forget to re-register domain names allowing them to be purchased by anyone.   These abandoned domains and subdomains expose organizations to potential hijacking and takeover attacks.
        ARE YOU VULNERABLE TO DOMAIN HIJACKING?
    • dichvusocks
      Payment Instantly perfectmoney, bitcoin, wmtransfer, wex, ETH (Please click Buy Socks)
      Update Tools Client Dichvusocks.us http://dichvusocks.us/tools.php Link check socks http://check.dichvusocks.us/
      LIVE | 50.63.153.173:24960 | 0.15 | Arizona | 85260 | ip-50-63-153-173.ip.secureserver.net | United States | Blacklist: Yes | Checked at http://dichvusocks.us
      LIVE | 95.110.227.5:53773 | 0.66 | Toscana | 52100 | host5-227-110-95.serverdedicati.aruba.it | Italy | Blacklist: Yes | Checked at http://dichvusocks.us
      LIVE | 27.116.51.76:6667 | 1.01 | Unknow | Unknow | N/A | India | Blacklist: Yes | Checked at http://dichvusocks.us
      LIVE | 91.142.208.125:40045 | 0.61 | Madrid | 28001 | tangerinrestore.vservers.es | Spain | Blacklist: Yes | Checked at http://dichvusocks.us
      LIVE | 37.187.4.181:443 | 0.54 | Unknow | Unknow | ks3367480.kimsufi.com | France | Blacklist: Yes | Checked at http://dichvusocks.us
      LIVE | 103.216.82.30:6667 | 1.02 | Gujarat | 395006 | N/A | India | Blacklist: Yes | Checked at http://dichvusocks.us
      LIVE | 91.122.14.44:57684 | 0.75 | Saint Petersburg City | 190923 | ppp91-122-14-44.pppoe.avangarddsl.ru | Russian Federation | Blacklist: Yes | Checked at http://dichvusocks.us
      LIVE | 188.120.253.251:58832 | 0.67 | Unknow | Unknow | icecream-studio.ru | Russian Federation | Blacklist: Yes | Checked at http://dichvusocks.us
      LIVE | 78.155.219.48:8000 | 0.7 | Moscow City | 102487 | N/A | Russian Federation | Blacklist: Yes | Checked at http://dichvusocks.us
      LIVE | 78.46.140.2:443 | 0.56 | Unknow | Unknow | static.2.140.46.78.clients.your-server.de | Germany | Blacklist: Yes | Checked at http://dichvusocks.us
      LIVE | 46.101.165.185:8124 | 0.6 | Slough | EC2V | N/A | United Kingdom | Blacklist: Yes | Checked at http://dichvusocks.us
      LIVE | 95.110.229.22:44423 | 0.6 | Toscana | 52100 | www.freestyleweb.it | Italy | Blacklist: Yes | Checked at http://dichvusocks.us
      LIVE | 45.76.98.55:443 | 0.47 | Tokyo | 143-0006 | kolegov1.itgmail.com.nbrz.ru | Japan | Blacklist: No | Checked at http://dichvusocks.us
      LIVE | 146.252.241.88:54948 | 0.17 | Virginia | 20149 | N/A | United States | Blacklist: Yes | Checked at http://dichvusocks.us
      LIVE | 150.129.171.51:6667 | 1.16 | Gujarat | 364710 | N/A | India | Blacklist: Yes | Checked at http://dichvusocks.us
      LIVE | 95.110.224.30:13728 | 1.64 | Toscana | 52100 | ecommerce.eniaweb.com | Italy | Blacklist: Yes | Checked at http://dichvusocks.us
      LIVE | 150.129.52.75:6667 | 1.07 | Gujarat | 394601 | N/A | India | Blacklist: Yes | Checked at http://dichvusocks.us
      LIVE | 119.28.191.18:7070 | 0.71 | Beijing | Unknow | N/A | China | Blacklist: Yes | Checked at http://dichvusocks.us
    • vn5socks.net
      LIVE ~ 138.197.150.166:9050 | 0.227 | Wilmington | DE | 19880 | United States | Checked at vn5socks.net
      LIVE ~ 192.169.140.162:12685 | 0.19 | Unknown | Unknown | Unknown | Unknown | Checked at vn5socks.net
      LIVE ~ 91.219.31.254:2018 | 0.297 | Unknown | Unknown | Unknown | Ukraine | Checked at vn5socks.net
      LIVE ~ 192.169.140.74:36280 | 0.194 | Unknown | Unknown | Unknown | Unknown | Checked at vn5socks.net
      LIVE ~ 95.213.130.42:8181 | 0.343 | Unknown | Unknown | Unknown | Russian Federation | Checked at vn5socks.net
      LIVE ~ 132.148.129.183:56938 | 0.391 | Minneapolis | MN | 55488 | United States | Checked at vn5socks.net
      LIVE ~ 23.94.99.87:2018 | 0.264 | Unknown | Unknown | Unknown | Unknown | Checked at vn5socks.net
      LIVE ~ 91.206.30.205:3129 | 0.29 | Unknown | Unknown | Unknown | Ukraine | Checked at vn5socks.net
      LIVE ~ 50.63.153.173:6176 | 0.188 | Scottsdale | AZ | 85260 | United States | Checked at vn5socks.net
      LIVE ~ 216.47.216.113:25856 | 0.258 | Dothan | AL | 36305 | United States | Checked at vn5socks.net
      LIVE ~ 192.169.138.184:35878 | 0.185 | Unknown | Unknown | Unknown | Unknown | Checked at vn5socks.net
      LIVE ~ 23.94.99.85:2018 | 0.235 | Unknown | Unknown | Unknown | Unknown | Checked at vn5socks.net
      LIVE ~ 23.95.90.229:2018 | 0.247 | Unknown | Unknown | Unknown | Unknown | Checked at vn5socks.net
      LIVE ~ 64.90.51.101:46110 | 0.151 | Brea | CA | 92821 | United States | Checked at vn5socks.net
      LIVE ~ 23.95.90.159:2018 | 0.234 | Unknown | Unknown | Unknown | Unknown | Checked at vn5socks.net
      LIVE ~ 69.89.101.16:7936 | 0.224 | Lansing | MI | 48915 | United States | Checked at vn5socks.net
      LIVE ~ 173.199.249.239:45824 | 0.268 | North Miami Beach | FL | 33160 | United States | Checked at vn5socks.net
      LIVE ~ 64.90.51.101:24190 | 0.164 | Brea | CA | 92821 | United States | Checked at vn5socks.net
       
×