Showing posts with label di. Show all posts
Showing posts with label di. Show all posts
Wednesday, September 27, 2017
Tutorial Cara Multyplayer Online PPSSPP Menggunakan Server HunsterVerse Di PC
Tutorial Cara Multyplayer Online PPSSPP Menggunakan Server HunsterVerse Di PC
Osueta its a simple Python2 script to exploit the OpenSSH User Enumeration Timing Attack, present in OpenSSH versions 5.* and 6.*. The script has the ability to make variations of the username employed in the bruteforce attack, and the possibility to establish a DOS condition in the OpenSSH server.
usage: osueta.py [-h] [-H HOST] [-k HFILE] [-f FQDN] [-p PORT] [-L UFILE]
[-U USER] [-d DELAY] [-v VARI] [-o OUTP] [-l LENGTH]
[-c VERS] [--dos DOS] [-t THREADS]
OpenSSH User Enumeration Time-Based Attack Python script
optional arguments:
-h, --help show this help message and exit
-H HOST Host Ip or CIDR netblock.
-k HFILE Host list in a file.
-f FQDN FQDN to attack.
-p PORT Host port.
-L UFILE Username list file.
-U USER Only use a single username.
-d DELAY Time delay fixed in seconds. If not, delay time is calculated.
-v VARI Make variations of the username (default yes).
-o OUTP Output file with positive results.
-l LENGTH Length of the password in characters (x1000) (default 40).
-c VERS Check or not the OpenSSH version (default yes).
--dos DOS Try to make a DOS attack (default no).
-t THREADS Threads for the DOS attack (default 5).
Download Osueta
download file now
Labels:
cara,
di,
hunsterverse,
menggunakan,
multyplayer,
online,
pc,
ppsspp,
server,
tutorial
Tuesday, September 26, 2017
Tutorial Cara Multyplayer Online PPSSPP Menggunakan Evolve Di PC
Tutorial Cara Multyplayer Online PPSSPP Menggunakan Evolve Di PC

Hash Compare is the FREE File Hash comparison tool. It performs Hash based Integrity Comparison using any of the the popular hash algorthms such as MD5, SHA1 or SHA256.
To make the task easier and quicker, it also supports the File Drag & Drop feature. That means you can just drag & drop one or both files directly without wasting much time in selecting them.
Hash based method is the standard way of verifying the integrity of files. Often it is used to check the Integrity of Download Files downloaded from the internet. It is also used to compare two versions of the same file. In such cases HashCompare comes handy in performing quick comparison of the files.
It is fully portable and works on all Windows platforms starting from Windows XP to Windows 8.
Features
- Performs File Integrity Comparison using popular Hash algorithms such as MD5, SHA1 & SHA256.
- Drag & Drop feature to quickly drag one or both files.
- Save the file comparison report to HTML/TEXT/XML file
- Displays detailed status during the operation.
- Auto copy the Hash data to clipboard on successful comparison
- Simple, easy to use GUI Interface.
- Completely Portable Tool, can be run from anywhere.
Download Hash Compare
download file now
Labels:
cara,
di,
evolve,
menggunakan,
multyplayer,
online,
pc,
ppsspp,
tutorial
Friday, September 22, 2017
Tutorial Cara Multyplayer Online PPSSPP Menggunakan Logmein Hamachi Di PC
Tutorial Cara Multyplayer Online PPSSPP Menggunakan Logmein Hamachi Di PC

The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked.
The Tor Browser lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained.
Here is the complete changelog:
- All Platforms
- Update Firefox to 24.7.0esr
- Update obfsproxy to 0.2.12
- Update FTE to 0.2.17
- Update NoScript to 2.6.8.33
- Update HTTPS Everywhere to 3.5.3
- Bug 12673: Update FTE bridges
- Update Torbutton to 1.6.11.0
- Bug 12221: Remove obsolete Javascript components from the toggle era
- Bug 10819: Bind new third party isolation pref to Torbutton security UI
- Bug 9268: Fix some window resizing corner cases with DPI and taskbar size.
- Linux:
- Bug 11102: Set Window Class to "Tor Browser" to aid in Desktop navigation
- Bug 12249: Dont create PT debug files anymore
Download Tor Browser 3.6.3
download file now
Labels:
cara,
di,
hamachi,
logmein,
menggunakan,
multyplayer,
online,
pc,
ppsspp,
tutorial
Thursday, September 21, 2017
Tutorial Cara Mod Texture Game PSP Menggunakan Emulator PPSSPP Di Android
Tutorial Cara Mod Texture Game PSP Menggunakan Emulator PPSSPP Di Android

Lynis is an open source security auditing tool. Primary goal is to help users with auditing and hardening of Unix and Linux based systems. The software is very flexible and runs on almost every Unix based system (including Mac). Even the installation of the software itself is optional!
How it works
Lynis will perform hundreds of individual tests to determine the security state of the system. Many of these tests are also part of common security guidelines and standards. Examples include searching for installed software and determine possible configuration flaws. Lynis goes further and does also test individual software components, checks related configuration files and measures performance. After these tests, a scan report will be displayed with all discovered findings.
Typical use cases for Lynis:
- Security auditing
- Vulnerability scanning
- System hardening
Why open source?
Open source software provides trust by having people look into the code. Adjustments are easily made, providing you with a flexible solution for your business. But can you trust systems and software with your data? Lynis provides you this confidence. It does so with extensive auditing of your systems. This way you can verify and stay in control of your security needs.
System Auditing
Auditing made easy
With IT departments already under pressure, the demand for securing systems is only getting higher. This is why regular system auditing is required.
Unfortunately, manual checking is too much work and most solutions only present the issues. With Lynis Enterprise auditing is quick, easy and affordable.
Extensive
Audits performed by Lynis are extensive. From the bootloader up to the last piece of software, it all gets checked. Any vulnerable package, weak configuration value or unneeded daemon will show up sooner or later.
System Hardening
Limiting the weak spots
To increase the defenses of a system, additional security measures have to be implemented. This process of fortification is named system hardening. It consists of removing unnecessary parts, limit default access and tighten up the permissions of processes and users. While Unix based systems are fairly secure by default, the need of system hardening will always exist.
Hardening systems without the right tools, can take a lot of time. Besides investigating, the changes have to be planned, implemented and tested at several stages.
Auditing and Hardening
Our solution performs an in-depth audit, to determine the applicable hardening controls. Together with these controls the right suggestions are selected for your environment. A customized plan will be part of your system hardening efforts. To simplify the process of system hardening, hardening snippets are provided. Almost as simple as a copy-paste, you can harden the system of your workstations and servers.
Technical details
The hardening snippets used are depending on the related control. Usually there is a piece of shell script available to test for a specific control, or to implement the related control. Where possible and applicable, also snippets are provided for configuration management tools like cfengine, Chef and Puppet.
Vulnerability Scanning
Weaknesses
Discovering weaknesses in IT security is named vulnerability scanning. It is the art of finding weaknesses, before malicious people do. These vulnerabilities may exist in essential parts of the operating system, software, or even configuration files.
Best of all worlds
Our solution focuses on host based scanning, combined with scanning via the network. This way more ground is covered and better insights can be provided. Solutions only using network scanning are nowadays not extensive enough.
Most of the vulnerability tests are already built-in. With the help of plugins, additional tests are performed to discover vulnerabilities. Also information is collected, which can be used to determine weaknesses in unexpected areas.
Download Lynis 1.5.9
download file now
Saturday, September 16, 2017
Gintama akan hadir lagi di musim gugur 2017
Gintama akan hadir lagi di musim gugur 2017
wehh pasti dah pada tau semua nih tentang gintama? yoi anime kocak & seru ini merupakan anime yang wajib anda saksikan karena banyak kisah kisah menarik dari petualangan ketiga yorozuya ini..
Setelah mengakhiri penayangannya pada bulan Maret tahun lalu di acara perayaan ulang tahun ke-10 nya, serial anime populer dari Jepang, Gintama akan kembali tayang di musim gugur tahun 2017.

Dilansir oleh Crunchyroll dari situs TV Tokyo, info mengenai anime Gintama telah diperbarui, dan diumumkan bahwa anime adaptasi manga komedi yang ditulis dan diiliustrasikan oleh Hideaki Sorachi akan kembali tayang di musim gugur, tepatnya pada bulan Oktober dengan adaptasi dari arc Porori.

Selain serial anime-nya, film live-action dan juga serial drama yang diangkat dari judul yang sama juga akan tayang pada tanggal 14 dan 15 Juli mendatang.
download file now
Friday, September 15, 2017
Tutorial Cara Multyplayer Wifi Hotspot LAN PPSSPP Di PC
Tutorial Cara Multyplayer Wifi Hotspot LAN PPSSPP Di PC

MultiMonitorTool is a small tool that allows you to do some actions related to working with multiple monitors. With MultiMonitorTool, you can disable/enable monitors, set the primary monitor, save and load the configuration of all monitors, and move windows from one monitor to another. You can do these actions from the user interface or from command-line, without displaying user interface. MultiMonitorTool also provides a preview window, which allows you to watch a preview of every monitor on your system.
Using MultiMonitorTool
MultiMonitorTool doesnt require any installation process or additional dll files. In order to start using it, simply run the executable file - MultiMonitorTool.exe
The main window of MultiMonitorTool contains 2 panes: The upper pane displays the list of all monitors detected on your system. When you select a monitor in the upper pane, the lower pane displays the details of all visible windows on the selected monitor.
You can select one or more monitors in the upper pane, and then use the following options: Disable Selected Monitors (Ctrl+F6), Enable Selected Monitors (Ctrl+F7), Disable/Enable Switch (Ctrl+F8), or Set As Primary Monitor (Ctrl+F9)
You can also select one or more Windows in the lower pane, and then use the Move Window To Next Monitor and Move Window To Primary Monitor options in order to easily move Windows from one monitor to the other.
Save/Load Monitors Configuration
MultiMonitorTool allows you to save the current configuration of all monitors on your system, including the screen resolution, colors depth, and monitor position of every monitor, by using the Save Monitors Configuration option (Ctrl+Shift+S).You can restore back the saved monitors configuration by using the Load Monitors Configuration option (Ctrl+Shift+L).
You can also save/load the monitors configuration from command-line, by using the /SaveConfig and /LoadConfig command-line options.
Preview Window
The preview window shows you a preview of the monitor you select in the upper pane. It might be useful if non-primary monitors are turned off and you want to view the windows displayed in the other monitors. In order to enable/disable the monitor preview window, simply press F2. You can also resize the preview window to any size you like.
Command-Line Options
You can use the following command-line options to change the monitor configuration or to move windows automatically without displaying any user interface.The <Monitor> parameter in all command-line options may contain the following values:
- Primary - Specifies that you want to do the action on the primary monitor.
- Monitor Name, as it appears in the Name column, for example: .DISPLAY1 , .DISPLAY2, .DISPLAY3
- Monitor Number - The number that appears in the monitor name. (1 for .DISPLAY1, 2 for .DISPLAY2, and so on...)
/disable <Monitors> | Disables the specified monitors. You can specify a single monitor or multiple monitors. Examples: MultiMonitorTool.exe /disable 1 MultiMonitorTool.exe /disable .DISPLAY3 MultiMonitorTool.exe /disable 1 2 3 |
/enable <Monitors> | Enables the specified monitors. Examples: MultiMonitorTool.exe /enable 3 MultiMonitorTool.exe /enable .DISPLAY1 MultiMonitorTool.exe /enable 3 2 |
/switch <Monitors> | Switches the specified monitors between enabled and disabled state. Examples: MultiMonitorTool.exe /switch 3 MultiMonitorTool.exe /switch .DISPLAY1 MultiMonitorTool.exe /switch .DISPLAY2 .DISPLAY3 |
/setmax <Monitors> | Set the maximum resolution on the specified monitors. Examples: MultiMonitorTool.exe /setmax 3 MultiMonitorTool.exe /setmax .DISPLAY2 .DISPLAY3 |
/SetOrientation <Monitor> <Orientation [0, 90, 180, 270] > | Set the orientation of the specified monitor. Examples: MultiMonitorTool.exe /SetOrientation 2 270 MultiMonitorTool.exe /SetOrientation .DISPLAY2 180 .DISPLAY3 90 MultiMonitorTool.exe /SetOrientation 1 0 2 0 |
/SetPrimary <Monitor> | Set the primary monitor. Examples: MultiMonitorTool.exe /SetPrimary 2 MultiMonitorTool.exe /SetPrimary .DISPLAY2 |
/SetNextPrimary | Set the next available monitor as the primary monitor. For example, if you have a system with 3 monitors and the first monitor is the primary, running this command will set the second monitor as the primary. running this command again will set the third monitor as the primary. And... running this command again will set (again) the first monitor as the primary. |
/PreviewOnly <Monitor> {x} {y} {width} {height} | Allows you to run MultiMonitorTool in monitor preview only mode. In this mode, only the monitor preview window is displayed. You must specify the monitor name to display in the preview window. Optionally, you can also specify the position and size to set the preview window. Examples: MultiMonitorTool.exe /PreviewOnly .DISPLAY2 MultiMonitorTool.exe /PreviewOnly .DISPLAY1 10 10 300 200 |
/SaveConfig <Filename> | Saves the current configuration of all your monitors into the specified filename, including the screen resolution, colors depth, and monitor position. You can load the saved configuration back into the system by using the /LoadConfig command-line option. Example: MultiMonitorTool.exe /SaveConfig "c: empmonitors1.cfg" |
/LoadConfig <Filename> | Loads the monitors configuration that you previouly saved with /SaveConfig Example: MultiMonitorTool.exe /LoadConfig "c: empmonitors1.cfg" |
/MoveWindow <To Monitor> Process <Process Name> /MoveWindow <To Monitor> Title <Title Text> /MoveWindow <To Monitor> Class <Window Class> /MoveWindow <To Monitor> All <From Monitor> | This command-line allows you to move windows from one monitor to the other, according to the specified conditions. You can also use this command-line option with /WindowLeft, /WindowTop, /WindowWidth, and /WindowHeight, in order to set the width/size of the moved window. (See examples below) Heres some example:
|
/MonitorPreviewWindow <0 | 1> | Specifies whether to display the monitor preview window. 0 = No, 1 = Yes. |
/PreviewMode <1 | 2> | Specifies the preview mode. 1 = Fast and Low Quality, 2 = Slow and High Quality. |
/DrawCursorPreview <0 | 1> | Specifies whether to draw the cursor inside the preview window. 0 = No, 1 = Yes. |
/HideInactiveMonitors <0 | 1> | Specifies whether to hide inactive monitors. 0 = No, 1 = Yes. |
/TrayIcon <0 | 1> | Specifies whether to put an icon on the system tray. 0 = No, 1 = Yes. |
/StartAsHidden <0 | 1> | Specifies whether to start the main window as hidden. 0 = No, 1 = Yes. Ths command-line option works only when TrayIcon option is turned on. |
/AutoRefresh <0 | 1> | Specifies whether to automatically refresh the monitors/windows information. 0 = No, 1 = Yes. |
/stext <Filename> | Save the monitors list into a regular text file. |
/stab <Filename> | Save the monitors list into a tab-delimited text file. |
/scomma <Filename> | Save the monitors list into a comma-delimited text file (csv). |
/stabular <Filename> | Save the monitors list into a tabular text file. |
/shtml <Filename> | Save the monitors list into HTML file (Horizontal). |
/sverhtml <Filename> | Save the monitors list into HTML file (Vertical). |
/sxml <Filename> | Save the monitors list to XML file. |
Download MultiMonitorTool v1.63
download file now
Wednesday, September 13, 2017
Tutorial Cara Multyplayer Online PPSSPP Menggunakan VPN Neotouter Di Android
Tutorial Cara Multyplayer Online PPSSPP Menggunakan VPN Neotouter Di Android

Sandcat is a lightweight multi-tabbed web browser that combines the speed and power of Chromium and Lua. Sandcat comes with built-in live headers, an extensible user interface and command line console, resource viewer, and many other features that are useful for web developers and pen-testers.
Here is what changed in version 5.0 beta 1:
- Faster startup and responsiveness.
- Huge refactoring and cleanup of the current code.
- The Chromium library was upgraded to the latest release (incredibly fast!).
- Improved compatibility with 64-bit Windows editions.
- Improved source code editor.
- Available as free, open source/community edition (under a BSD-3-Clause license).
- Built using components and libraries from the Catarinka toolkit (also made open source at the same time with this release and under the same license).
- Includes the Selenite Lua library - a multi-purpose set of Lua extensions developed to make the development of Lua extensions easier in Sandcat. The code for Selenite is now open source, under the MIT license. The library documentation is available here.
- Fixed: output of the SHA1 and the full URL encoders that come with the pen-tester pack.
Download Sandcat Browser 5
download file now
Labels:
android,
cara,
di,
menggunakan,
multyplayer,
neotouter,
online,
ppsspp,
tutorial,
vpn
Tuesday, September 12, 2017
Tutorial Cara Multyplayer Online PPSSPP Menggunakan VPN Neotouter Di PC
Tutorial Cara Multyplayer Online PPSSPP Menggunakan VPN Neotouter Di PC

SlowHTTPTest is a highly configurable tool that simulates some Application Layer Denial of Service attacks. It works on majority of Linux platforms, OSX and Cygwin - a Unix-like environment and command-line interface for Microsoft Windows.
It implements most common low-bandwidth Application Layer DoS attacks, such as slowloris, Slow HTTP POST, Slow Read attack (based on TCP persist timer exploit) by draining concurrent connections pool, as well as Apache Range Header attack by causing very significant memory and CPU usage on the server.
Slowloris and Slow HTTP POST DoS attacks rely on the fact that the HTTP protocol, by design, requires requests to be completely received by the server before they are processed. If an HTTP request is not complete, or if the transfer rate is very low, the server keeps its resources busy waiting for the rest of the data. If the server keeps too many resources busy, this creates a denial of service. This tool is sending partial HTTP requests, trying to get denial of service from target HTTP server.
Download SlowHTTPTest
download file now
Labels:
cara,
di,
menggunakan,
multyplayer,
neotouter,
online,
pc,
ppsspp,
tutorial,
vpn
Monday, September 11, 2017
Tutorial Cara Multyplayer Online PPSSPP Menggunakan Logmein Hamachi Di Android
Tutorial Cara Multyplayer Online PPSSPP Menggunakan Logmein Hamachi Di Android

Nmap is one of the most improtant tools for every cracker (white, grey black hat "hacker"). Nmap is a legendary hack tool and probably the prevelent networt security port scanner tool over the last 10 years on all major Operating Systems. So far it was available in windows, linux and Mac OS X. But now its available at android platform too. It is compiled from real Nmap source code by some developers to provide the support for android devices.
Download aNmap
download file now
Labels:
android,
cara,
di,
hamachi,
logmein,
menggunakan,
multyplayer,
online,
ppsspp,
tutorial
Friday, September 8, 2017
Tutorial Cara Multyplayer Online PPSSPP Menggunakan Server Coldbird Di Android
Tutorial Cara Multyplayer Online PPSSPP Menggunakan Server Coldbird Di Android

PwnPi is a Linux-based penetration testing dropbox distribution for the Raspberry Pi. It currently has 200+ network security tools pre-installed to aid the penetration tester. It is built a stripped down version of the Debian Wheezy image from the Raspberry Pi foundations website and uses Openbox as the window manager. PwnPi can be easily setup to send reverse connections from inside a target network by editing a simple configuration file.
Tools:
6tunnel - TCP proxy for non-IPv6 applications
aircrack-ng - WEP/WPA cracking program
amap - a powerful application mapper
arp-scan - arp scanning and fingerprinting tool
bfbtester - Brute Force Binary Tester
bing-ip2hosts - Enumerate hostnames for an IP using bing
bsqlbf - Blind SQL injection brute forcer tool
btscanner - ncurses-based scanner for Bluetooth devices
chaosreader - trace network sessions and export it to html format
chkrootkit - rootkit detector
cryptcat - A lightweight version netcat extended with twofish encryption
darkstat - network traffic analyzer
dhcpdump - Parse DHCP packets from tcpdump
dissy - graphical frontend for objdump
dmitry - Deepmagic Information Gathering Tool
dns2tcp - TCP over DNS tunnel client and server
dnswalk - Checks dns zone information using nameserver lookups
dsniff - Various tools to sniff network traffic for cleartext insecurities
enum4linux - a tool for enumerating information from Windows and Samba systems
etherape - graphical network monitor
exploit-db - Exploit Database
fcrackzip - password cracker for zip archives
fimap - local and remote file inclusion tool
flasm - assembler and disassembler for Flash (SWF) bytecode
foremost - forensic program to recover lost files
fping - sends ICMP ECHO_REQUEST packets to network hosts
ftp-proxy - application level proxy for the FTP protocol
galleta - An Internet Explorer cookie forensic analysis tool
ghettotooth - a simple but effective blue driving tool
hostmap - hostnames and virtual hosts discovery tool
hping3 - Active Network Smashing Tool
httptunnel - Tunnels a data stream in HTTP requests
httrack - Copy websites to your computer (Offline browser)
hydra - Very fast network logon cracker
ike-scan - discover and fingerprint IKE hosts (IPsec VPN Servers)
inguma - Open source penetration testing toolkit
iodine - tool for tunneling IPv4 data through a DNS server
ipcalc - parameter calculator for IPv4 addresses
isr-evilgrade - take advantage of poor upgrade implementations by injecting fake updates
ipgrab - tcpdump-like utility that prints detailed header information
john - active password cracking tool
kismet - Wireless 802.11b monitoring tool
knocker - Simple and easy to use TCP security port scanner
lcrack - A generic password cracker
lynis - security auditing tool for Unix based systems
macchanger - utility for manipulating the MAC address of network interfaces
mboxgrep - Grep through mailboxes
mdk3 - bruteforce SSIDs, bruteforce MAC filters, SSID beacon flood
medusa - fast, parallel, modular, login brute-forcer for network services
metagoofil - an information gathering tool designed for extracting metadata
metasploit - security project which provides information about security vulnerabilities
mysqloit - SQL Injection takeover tool focused on LAMP
mz - versatile packet creation and network traffic generation tool
nbtscan - A program for scanning networks for NetBIOS name information
netcat-traditional - TCP/IP swiss army knife
netdiscover - active/passive network address scanner using arp requests
netrw - netcat like tool with nice features to transport files over network
netsed - network packet-altering stream editor
netwag - graphical frontend for netwox
netwox - networking utilities
nikto - web server security scanner
nmapsi4 - graphical interface to nmap, the network scanner
nmap - The Network Mapper
nstreams - network streams - a tcpdump output analyzer
obexftp - file transfer utility for devices that use the OBEX protocol
onesixtyone - fast and simple SNMP scanner
openvas-client - Remote network security auditor, the client
openvas-server - remote network security auditor - server
ophcrack-cli - Microsoft Windows password cracker using rainbow tables (cmdline)
ophcrack - Microsoft Windows password cracker using rainbow tables (gui)
otp - Generator for One Time Pads or Passwords
p0f - Passive OS fingerprinting tool
packeth - Ethernet packet generator
packit - Network Injection and Capture
pbnj - a suite of tools to monitor changes on a network
pentbox - Suite that packs security and stability testing oriented tools
pdfcrack - PDF files password cracker
pnscan - Multi threaded port scanner
proxychains - proxy chains - redirect connections through proxy servers
pscan - Format string security checker for C files
ptunnel - Tunnel TCP connections over ICMP packets
ratproxy - passive web application security assessment tool
reaver - brute force attack tool against Wifi Protected Setup PIN number
s.e.t - social engineering toolkit
scrub - writes patterns on magnetic media to thwart data recovery
secure-delete - tools to wipe files, free disk space, swap and memory
sendemail - lightweight, command line SMTP email client
siege - HTTP regression testing and benchmarking utility
sipcrack - SIP login dumper/cracker
sipvicious - suite is a set of tools that can be used to audit SIP based VoIP systems
skipfish - fully automated, active web application security reconnaissance tool
socat - multipurpose relay for bidirectional data transfer
splint - tool for statically checking C programs for bugs
sqlbrute - a tool for brute forcing data out of databases using blind SQL injection
sqlmap - tool that automates the process of detecting and exploiting SQL injection flaws
sqlninja - SQL Server injection and takeover tool
ssldump - An SSLv3/TLS network protocol analyzer
sslscan - Fast SSL scanner
sslsniff - SSL/TLS man-in-the-middle attack tool
sslstrip - SSL/TLS man-in-the-middle attack tool
stunnel4 - Universal SSL tunnel for network daemons
swaks - SMTP command-line test tool
tcpdump - command-line network traffic analyzer
tcpflow - TCP flow recorder
tcpick - TCP stream sniffer and connection tracker
tcpreplay - Tool to replay saved tcpdump files at arbitrary speeds
tcpslice - extract pieces of and/or glue together tcpdump files
tcpspy - Incoming and Outgoing TCP/IP connections logger
tcptrace - Tool for analyzing tcpdump output
tcpxtract - extracts files from network traffic based on file signatures
theHarvester - gather emails, subdomains, hosts, employee names, open ports and banners
tinyproxy - A lightweight, non-caching, optionally anonymizing HTTP proxy
tor - anonymizing overlay network for TCP
u3-tool - tool for controlling the special features of a U3 USB flash disk
udptunnel - tunnel UDP packets over a TCP connection
ussp-push - Client for OBEX PUSH
vidalia - controller GUI for Tor
vinetto - A forensics tool to examine Thumbs.db files
voiphopper - VoIP infrastructure security testing tool
voipong - VoIP sniffer and call detector
w3af-console - framework to find and exploit web application vulnerabilities (CLI only)
w3af - framework to find and exploit web application vulnerabilities
wapiti - Web application vulnerability scanner
wash - scan for vunerable WPS access points
wavemon - Wireless Device Monitoring Application
wbox - HTTP testing tool and configuration-less HTTP server
webhttrack - Copy websites to your computer, httrack with a Web interface
weplab - tool designed to break WEP keys
wfuzz - a tool designed for bruteforcing Web Applications
wipe - Secure file deletion
wireshark - network traffic analyzer - GTK+ version
xprobe - Remote OS identification
yersinia - Network vulnerabilities check software
zenmap - The Network Mapper Front End
zzuf - transparent application fuzzer
Download PwnPi
download file now
Labels:
android,
cara,
coldbird,
di,
menggunakan,
multyplayer,
online,
ppsspp,
server,
tutorial
Thursday, September 7, 2017
Tutorial Cara Mod Texture Game PSP Menggunakan Emulator PPSSPP Di PC
Tutorial Cara Mod Texture Game PSP Menggunakan Emulator PPSSPP Di PC
Patch win86/64 PE and linux86/64 binaries with shellcode. The goal of The Backdoor Factory is to patch executable binaries with user desired shellcode and continue normal execution of the binary prepatched state. Under a BSD 3 Clause License.
This is done by either appending a code cave or using existing code caves of the executable. This project includes several customized metasploit shellcodes. Plus a new shellcode loadliba_reverse_tcp: designed to bypass all the protections of EMET 4.1. Also, the user can provide their own shellcode for use.
This update provides the loadliba_reverse_tcp shellcode, stability fixes, and speed improvements.
Usage: backdoor.py [options]
Options:
-h, --help show this help message and exit
-f FILE, --file=FILE File to backdoor
-s SHELL, --shell=SHELL
Payloads that are available for use.
-H HOST, --hostip=HOST
IP of the C2 for reverse connections
-P PORT, --port=PORT The port to either connect back to for reverse shells
or to listen on for bind shells
-J, --cave_jumping Select this options if you want to use code cave
jumping to further hide your shellcode in the binary.
-a, --add_new_section
Mandating that a new section be added to the exe
(better success) but less av avoidance
-U SUPPLIED_SHELLCODE, --user_shellcode=SUPPLIED_SHELLCODE
User supplied shellcode, make sure that it matches the
architecture that you are targeting.
-c, --cave The cave flag will find code caves that can be used
for stashing shellcode. This will print to all the
code caves of a specific size.The -l flag can be use
with this setting.
-l SHELL_LEN, --shell_length=SHELL_LEN
For use with -c to help find code caves of different
sizes
-o OUTPUT, --output-file=OUTPUT
The backdoor output file
-n NSECTION, --section=NSECTION
New section name must be less than seven characters
-d DIR, --directory=DIR
This is the location of the files that you want to
backdoor. You can make a directory of file backdooring
faster by forcing the attaching of a codecave to the
exe by using the -a setting.
-w, --change_access This flag changes the section that houses the codecave
to RWE. Sometimes this is necessary. Enabled by
default. If disabled, the backdoor may fail.
-i, --injector This command turns the backdoor factory in a hunt and
shellcode inject type of mechinism. Edit the target
settings in the injector module.
-u SUFFIX, --suffix=SUFFIX
For use with injector, places a suffix on the original
file for easy recovery
-D, --delete_original
For use with injector module. This command deletes
the original file. Not for use in production systems.
*Author not responsible for stupid uses.*
-O DISK_OFFSET, --disk_offset=DISK_OFFSET
Starting point on disk offset, in bytes. Some authors
want to obfuscate their on disk offset to avoid
reverse engineering, if you find one of those files
use this flag, after you find the offset.
-S, --support_check To determine if the file is supported by BDF prior to
backdooring the file. For use by itself or with
verbose. This check happens automatically if the
backdooring is attempted.
-M, --cave-miner Future use, to help determine smallest shellcode
possible in a PE file
-q, --no_banner Kills the banner.
-v, --verbose For debug information output.
-T IMAGE_TYPE, --image-type=IMAGE_TYPE
ALL, x32, or x64 type binaries only. Default=ALL
-Z, --zero_cert Allows for the overwriting of the pointer to the PE
certificate table effectively removing the certificate
from the binary for all intents and purposes.
-R, --runas_admin Checks the PE binaries for requestedExecutionLevel
level="highestAvailable". If this string is included
in the binary, it must run as system/admin. Doing this
slows patching speed significantly.
-L, --patch_dll Use this setting if you DONT want to patch DLLs.
Patches by default.
Features:
PE Files
Can find all codecaves in an EXE/DLL.
By default, clears the pointer to the PE certificate table, thereby unsigning a binary.
Can inject shellcode into code caves or into a new section.
Can find if a PE binary needs to run with elevated privileges.
When selecting code caves, you can use the following commands:
-Jump (j), for code cave jumping
-Single (s), for patching all your shellcode into one cave
-Append (a), for creating a code cave
-Ignore (i), nevermind, ignore this binary
Can ignore DLLs.
ELF Files
Extends 1000 bytes (in bytes) to the TEXT SEGMENT and injects shellcode into that section of code.
Overall
The user can :
-Provide custom shellcode.
-Patch a directory of executables/dlls.
-Select x32 or x64 binaries to patch only.
-Include BDF is other python projects see pebin.py and elfbin.py
Download BackdoorFactory
download file now
Tuesday, September 5, 2017
Tutorial Cara Multyplayer Wifi Hotspot LAN PPSSPP Di Android
Tutorial Cara Multyplayer Wifi Hotspot LAN PPSSPP Di Android

PacketFence is a fully supported, trusted, Free and Open Source network access control (NAC) solution. Boasting an impressive feature set including a captive-portal for registration and remediation, centralized wired and wireless management, powerful BYOD management options, 802.1X support, layer-2 isolation of problematic devices; PacketFence can be used to effectively secure networks small to very large heterogeneous networks.
Here are the changes in 4.3.0:
New Features
- Added MAC authentication support for Edge-corE 4510
- Added support for Ruckus External Captive Portal
- Support for Huawei S2700, S3700, S5700, S6700, S7700, S9700 switches
- Added support for LinkedIn and Windows Live as authentication sources
- Support for 802.1X on Juniper EX2200 and EX4200 switches
- Added support for the Netgear M series switches
- Added support to define SNAT interface to use for passthrough
- Added Nessus scan policy based on a DHCP fingerprint
- Added support to unregister a node if the username is locked or deleted in Active Directory
- Fortinet FortiGate and PaloAlto firewalls integration
- New configuration parameters in switches.conf to use mapping by VLAN and/or mapping by role
Enhancements
- When validating an email confirmation code, use the same portal profile initially used by to register the device
- Removed old iptables code (ipset is now always used for inline enforcement)
- MariaDB support
- Updated WebAPI method
- Use Webservices parameters from PacketFence configuration
- Use WebAPI notify from pfdhcplistener (faster)
- Improved Apache SSL configuration forbids SSLv2 use and prioritzes better ciphers
- Removed CGI-based captive portal files
- For device registration use the source used to authenticate for calculating the role and unregdate (bugid:1805)
- For device registration, we set the "NOTES" field of the node with the selected type of device (if defined)
- On status page check the portal associated to the user and authenticate on the sources included in the portal profile
- Merge pf::email_activation and pf::sms_activation to pf::activation
- Removed unused table switchlocation
- Deauthentication and firewall enforcement can now be done throught the web API
- Added support to configure high-availability from within the configurator/webadmin
- Changed the way we�re handling DNS blackholing when unregistered in inline enforcement mode (using DNAT rather than REDIRECT)
- Now handling rogue DHCP servers based both on the server IP and server MAC address
Bug Fixes
- Fixed pfdetectd not starting because of stale pid file
- Fixed SQL join with iplog in advanced search of nodes
- Fixed unreg date calculation in Catalyst captive portal
- Fixed allowed_device_types array in device registration page (bugid:1809)
- Fixed VLAN format to comply with RFC 2868
- Fixed possible double submission of the form on the billing page
- Fixed db upgrade script to avoid duplicate changes to locationlog table
See the ChangeLog file for the complete list of changes.
See the UPGRADE file for notes about upgrading.
Download PacketFence v4.3.0
download file now
Friday, September 1, 2017
Tutorial Cara Multyplayer Online PPSSPP Menggunakan Server Coldbird Di PC
Tutorial Cara Multyplayer Online PPSSPP Menggunakan Server Coldbird Di PC

A newer, better system information script for irc, administration, and system troubleshooters.
Inxi Options
Inxi has a wide range of options and custom triggers, along with useful defaults like -b or -F. Plain inxi, no options, prints a single line of basic system information.
Here is a screenshot of typical output for inxi -Fz (-z filters certain output like IP numbers and Mac address of network card, things that dont need to be publically displayed for security reasons). The display output has changed slightly as of 1.7.x:
Full List of Inxi Options
- inxi supports the following options. These options are included as of inxi 2.2.20. Earlier versions may not have every option. You can combine these options, or list them one by one: Examples: inxi -v4 -c6 OR inxi -bDc 6
- If you start inxi with no arguments, it will show the short form. The following options if used without -b, -F or -v + number will show just that complete line:
- A, C, D, G, I, M, N, P, R, S, f, i, n, o, p, l, u, r, s, t, w, W - you can use these together or alone to show just the line(s) you want to see.
- If you use them with either a -v + level, a -b, or with -F, it will show the full output for that line along with the output for the chosen verbosity level.
- NOTE: as of version 1.6.5, the old basic output option -d was changed to -b, for basic. -d is now used for the extended disk option, showing cdrom/dvd information as well.
- Output Control Options:
- -A Show Audio/sound card information.
- -b Shows basic (b for basic - version 1.7.5 or later. Earlier versions used: -d) output, short form. Similar to inxi -v 2. Shows -S -M -C -G -N -D and -R (short forms), and -I. -R does not show if no raid devices found.
- -c Available color schemes. Scheme number is required. Color selectors run a color selector option prior to inxi starting which lets you set the config file value for the selection.
- Supported color schemes: 0-32 Example: inxi -c 11
- Note: if you want to turn off all script colors, use -c 0 This is useful if you are for example piping output and dont want the color code characters.
- Supported color selectors. NOTE: irc and global only show safe color set. (version 1.5.x or later only)
- 94 - Console, out of X
- 95 - Terminal, running in X - like xTerm
- 96 - Gui IRC, running in X - like Xchat, Quassel, Konversation etc.
- 97 - Console IRC running in X - like irssi in xTerm
- 98 - Console IRC not in X
- 99 - Global - Overrides/removes all settings. Setting specific removes global.
- -C Show full CPU output, including per CPU clockspeed.
- -D Show full hard Disk info, not only model, ie: /dev/sda ST380817AS 80.0GB.
- -f Show all cpu flags used, not just the short list. Not shown with -F to avoid spamming.
- -F Show Fuller output for inxi, includes all upper case line arguments, plus -n and -s. Does not show extra verbose options like -d -f -u -l -p -t or -o unless you add them explicitly, for example: -Fplo
- -G Show Graphic card information (card, x type, resolution, version). Also shows glx renderer, card pci busID with -x. Shows active/unloaded/failed driver versions (1.5.x or later)
- -i Show Wan IP address, and shows local interfaces (requires ifconfig network tool). Same as -Nni
- If you are going to use this for public posting of your data, consider running it with the -z option for filtering. IRC filters by default.
- -I (upper case i) Show Information: processes, uptime, memory, irc client, inxi version.
- -l (lower case l, el) Show partition labels. Default: short partition -P. For full -p output, use: -pl (or -plu).
- -M Show machine data. Motherboard, Bios, and if present, System Builder (Like Lenovo) (version 1.6.x and later). Older systems/kernels without the required /sys data can use dmidecode instead, run as root. -! 33 forces use of dmidecode, which might be of some utility in certain fringe cases where dmidecode has more data than /sys.
- -n Show Advanced Network card information. Same as -Nn. Shows interface, speed, mac id, state (version 1.5.x and later).
- -N Show Network card information. Shows card and driver. Includes support for USB networking devices. Also shows busID/USB-ID, ports, driver version with -x
- -o Show unmounted partition information (includes UUID and LABEL if available).
- Shows file system type if you have file installed, if you are root OR if you have added to /etc/sudoers (sudo v. 1.7 or newer):
- < username > ALL = NOPASSWD: /usr/bin/file (sample)
- -p Show full partition information (-P plus all other detected partitions).
- -P Show Partition information (shows what -v 4 would show, but without extra data).
- Shows, if detected: / /boot /home /tmp /usr /var. Use -p to see all mounted partitions.
- -r Show distro repository data. Currently supported repo types:
- APT (Debian, Ubuntu + derived versions)
- PACMAN (Arch Linux + derived versions)
- PISI (Pardus + derived versions)
- URPMQ (Mandriva, Mageia + derived versions)
- YUM. (Fedora, Redhat, maybe Suse + derived versions)
- (as distro data is collected more will be added. If yours is missing please show us how to get this information and well try to add it.)
- -R Show RAID data. Shows RAID devices, states, levels, and components, and extra data with -x/-xx. If device is resyncing, shows resync progress line as well.
- -s Show sensors output (if sensors installed/configured): mobo/cpu/gpu temp; detected fan speeds.
- Gpu temp only for Fglrx/Nvidia drivers. Nvidia shows screen number for > 1 screens
- -S Show System information: host name, kernel, desktop, desktop version (plus toolkit if -x used), distro (desktop features, version 1.5.x or later)
- -t Show processes. Requires extra options: c (cpu) m (memory) cm (cpu+memory).
- If followed by numbers 1-20, shows that number of top process for each selection (default: 5):
- Examples:
- -t cm10 (shows top 10 cpu and memory processes, 20 in all)
- -t c (shows top 5 cpu processes)
- -t m20 (shows top 20 memory processes)
- -t cm (shows top 5 cpu and memory processes, 10 in all)
- Make sure to have no space between letters and numbers (cm10 -right, cm 10 - wrong).
- -u Show partition UUIDs. Default: short partition -P. For full -p output, use: -pu (or -plu).
- -v Script verbosity levels. Verbosity level number is required. Note: do not mix -v options with -b or -F, use one or the other.
- Supported levels: 0-7 Example: inxi -v 4
- 0 - short output, same as: inxi
- 1 - Basic verbose. Roughly the same as the old -d,
- 2 - Adds networking card (-N), Machine (-M) data, and shows basic hard disk data (names only), and basic raid (devices only, and if inactive, notes that). Similar to inxi -b
- 3 - Adds advanced CPU (-C), network (-n) data, and switches on -x advanced data option.
- 4 - Adds partition size/filled data (-P) for (if present):/, /home, /var/, /boot. Shows full disk data (-D)
- 5 - Adds audio card (-A); sensors (-s), partition label (-l) and UUID (-u), short form of optical drives, and standard raid data (-R).
- 6 - Adds full partition data (-p), unmounted partition data (-o), -d full disk data, including CD/DVD information.
- 7 - Adds network IP data (-i); triggers -xx.
- -w Local weather data/time. To check an alternate location, see: -W location. For extra weather data options see -x, -xx, and -xxx.
- -W location - location supported options: postal code; city,[state/country]; latitude,longitude. Only use if you want the weather somewhere other than the machine running inxi. Use only ascii characters, replace spaces in city/state/country names with +: new+york,ny
- -x Show extra data:
- -C - Bogomips on Cpu; CPU flags short list
- -d - Shows more information if present on cd/dvd devices.
- -D - Shows hdd temp with disk data if you have hddtemp installed, if you are root OR if you have added to /etc/sudoers (sudo v. 1.7 or newer):
- < username > ALL = NOPASSWD: /usr/sbin/hddtemp (sample)
- -G - Direct rendering status for Graphics (in X). Only works with verbose or line output;
- -G - Shows (for single gpu, nvidia driver) screen number gpu is running on.
- -i - Show IPv6 as well for LAN interface (IF) devices.
- -I - Show system GCC, default. With -xx, also show other installed GCC versions. Show Init type, if detected, like systemd, Upstart, SysVinit, init (bsd), Epoch, runit. Show runlevel/target if present.
- -N, -A - driver version (if available) for Network/Audio;
- -N, -A - Shows port for card/device, if available.
- -N -A -G - Shows pci Bus ID / Usb ID for Audio, Network, Graphics
- -R - Shows component raid id. Adds second RAID Info line: raid level; report on drives (like 5/5); blocks; chunk size; bitmap (if present). Resync line, shows blocks synced/total blocks.
- -S - Shows toolkit (QT or GTK) if GNOME, KDE, or XFCE. Shows kernel gcc version.
- -t - Adds memory use output to cpu (-xt c, and cpu use to memory (-xt m).
- -w/-W - Wind speed and time zone (time zone, -w only).
- -xx Show extra, extra data (only works with verbose or line output, not short form). You can also trigger it with -Fx (but not -xF) (Version 1.6.x and later)
- -D - Adds disk serial number.
- -I - Adds other detected installed gcc versions to primary gcc output (if present). Shows init type version if found, and default runlevel/target if found.
- -M - Adds chassis information, if any data for that is available.
- -N -A -G - Shows vendor:product ID for Audio, Network, Graphics
- -R - Adds superblock (if present); algorythm, U data. Adds system info line (kernel support, read ahead, raid events). Adds if present, unused device line. Resync line, shows progress bar.
- -w/-W - Humidity, barometric pressure.
- -xx -@ [11-14] - Automatically uploads debugger data tar.gz file to ftp.techpatterns.com.
- -xxx Show extra, extra, extra data (only works with verbose or line output, not short form):
- -S - Panel/shell information in desktop output, if in X (like gnome-shell, cinnamon, mate-panel).
- -w/-W - Location (uses -z/irc filter), weather observation time, wind chill, heat index, dew point (shows extra lines for data where relevant).
- -y (plus integer >= 80) This is an absolute width override which sets the output line width max. Overrides COLS_MAX_IRC / COLS_MAX_CONSOLE globals, or the actual widths of the terminal. If used with -h or -c 94-99, put -y option first or the override will be ignored. Cannot be used with --help / --version / --recommends type long options. Example: inxi -y 130 -Fxx
- -z Adds security filters for IP addresses, Mac, and user home directory name. Default on for irc clients.
- -Z Absolute override for output filters. Useful for debugging networking issues in irc for example.
- Additional Options:
- -h, --help This help menu.
- -H - This help menu, plus developer options. Do not use dev options in normal operation!
- --recommends Checks inxi application dependencies + recommends, and directories, then shows what package(s) you need to install to add support for that feature (version 1.6.6 and later).
- -U Auto-update script. Note: if you installed as root, you must be root to update, otherwise user is fine.
- -V, --version inxi version information. Prints information then exits.
- -% Overrides defective or corrupted data.
- -@ Triggers debugger output. Requires debugging level 1-13 (8-10 - logging). Less than 8 just triggers inxi debugger output on screen.
- 1-7 - On screen debugger output
- 8 - Basic logging
- 9 - Full file/sys info logging
- 10 - Color logging.
- The following create a tar.gz file of system data, plus collecting the inxi output to file. To automatically upload debugger data tar.gz file to ftp.techpatterns.com: inxi -xx@ [11-14] For alternate ftp upload locations: Example: inxi -! ftp.yourserver.com/incoming -xx@ 14
- 11 - With data file of xiin read of /sys.
- 12 - With xorg conf and log data, xrandr, xprop, xdpyinfo, glxinfo etc.
- 13 - With data from dev, disks, partitions etc.
- 14 - Everything, all the data available.
- -! 31 - Turns off hostname in output. Useful if showing output from servers etc.
- -! 32 - Turns on hostname in output. Overrides global B_SHOW_HOST=false
- -! 33 - Force use of dmidecode. This will override /sys data in some lines, like -M.
Download Inxi
download file now
Labels:
cara,
coldbird,
di,
menggunakan,
multyplayer,
online,
pc,
ppsspp,
server,
tutorial
Tutorial Cara Multyplayer Online PPSSPP Menggunakan Server HunsterVerse Di Android
Tutorial Cara Multyplayer Online PPSSPP Menggunakan Server HunsterVerse Di Android


Viper is a binary analysis and management framework. Its fundamental objective is to provide a solution to easily organize your collection of malware and exploit samples as well as your collection of scripts you created or found over the time to facilitate your daily research. Think of it as a Metasploit for malware researchers: it provides a terminal interface that you can use to store, search and analyze arbitraty files with and a framework to easily create plugins of any sort.
Download Viper
download file now
Labels:
android,
cara,
di,
hunsterverse,
menggunakan,
multyplayer,
online,
ppsspp,
server,
tutorial
Subscribe to:
Posts (Atom)