Saturday, December 28, 2019

nuclear ied detonator (electronics folder)

Comentários
  • Elsinha David and guys...no super heroe maid from the "system" will dismantle this baby bomb

Welcome back to war, end of the last 2019 saturday , 18.50 pm...Presenting you a very specific resistor for a very special bomb
GPMSURPLUS.COM
Manufacturer: Ohmite Model/Part#: D50K50K Condition: New Surplus Power Rating: 50 W Resistance: 50 kOhms Tolerance: 10 % Notes: Item appears in excellent condition. NIS-9726 DF

hello world! welcome back to war, last saturday from 2019, 10.10 am. I hope you like the concept..since a 5 years old kid can putted toghther...


Friday, December 27, 2019


nuclear ied intel (improvise nuclear generator)

ok here we hv the CIA with the Ukranian secret service, running for a big, big promotion  ...so, let me simplify...the neutron generator is /heavy water (deuterium and tritium) tube, now we need some replacement , exacly with the function of an ion chamber..and this is the thing!

nuclear ied intel


nuclear ied intel



I'll make a draw for this particulary connection on the nuclear ied, which needs this very powerfull turbine to set the hydrogen implosion

nuclear intel folder


Hello worldwide, welcome back to war, friday, last weekend from 2019, 10.55 am "Krytrons and sprytrons handling voltages of 2,500 V and above, currents of 100 A and above, and switching delays of under 10 microseconds are typically suitable for nuclear weapon triggers." All about cover FBI pieces of shit here, trying to caught some big promotion )nuclear intel=

Thursday, December 26, 2019

(intel folder, nuclear)

Maybe next year, i leave my bad luck behind, maybe not. But if not..I want to say a couple of things about the nuclear IED. 1st the hardest part to achieve is the neutron generator, but let me tell you that some countries did improvised the device. The 2nd is a litle detonator switch for the primary explosive, bcz, if the detonation starter is not at 7.4 micro seconds, the neutrons chain self destroys. To tell you the truth, after all this study years, neither US, Russia, China have 75% of correctness about the true nuclear detonation. Hiroshima's weight 700 kilos, and the US had only that one, since the 2 first prototypes just killed the scientists. But it would be really odd, if 700 kilos wouldn't damage nothing..for the IIWW concerns that convinced the nazis. In the 50ths lots of old movies at Nevada, with nuclear implosions, that don't say nothing about the construction. Then the russians started saying they had it..and finally chinese..etc...This issue is complex. Not only about the fissile material itself. Not only bcz, nuclear bombs hv a dead line time, bcz the enrichment is lost with the radioactive natural decay. The israeli's are always robbering vessels, bcz their arsenal gets obselet. So, Saddam actually had..the improvied "stuff" that in my opinion was exacly the same the so called super powers have. The iranians, either have some very close detonation timer switch, or they will never have nothing to blow up. Conclusion, 1st if you get ur hands on a nuclear suitcase be sure to ask how much years it has, or is probably useless, not more than 7 years. If you get ur hands on fisslie material, don't make no mistake on "improvising" the time detonation...so, next time I return with the nuclear..we will talk about that. .

Iranian National and His Company Charged in Plot Involving Export of Military Antennas from the United States (Intel Folder)

Amin Ravan, a citizen of Iran, and his Iran-based company, IC Market Iran (IMI), have been charged in an indictment unsealed today with conspiracy to defraud the United States, smuggling, and violating the Arms Export Control Act (AECA) in connection with the unlawful export of 55 military antennas from the United States to Singapore and Hong Kong.

The indictment was announced by Lisa Monaco, Assistant Attorney General for National Security; Ronald C. Machen Jr., U.S. Attorney for the District of Columbia; John Morton, Director of the Department of Homeland Security’s U.S. Immigration and Customs Enforcement (ICE); Stephanie Douglas, Executive Assistant Director of the FBI’s National Security Branch; and Eric L. Hirschhorn, Under Secretary for Industry and Security at the Commerce Department.

According to the indictment, which was returned under seal by a grand jury in the District of Columbia on Nov. 16, 2011, Ravan was based in Iran and, at various times, acted as an agent of IMI in Iran and an agent of Corezing International, Pte, Ltd, a company based in Singapore that also maintained offices in Hong Kong and China.

On Oct. 10, 2012, Ravan was arrested by authorities in Malaysia in connection with a U.S. provisional arrest warrant. The United States is seeking to extradite him from Malaysia to stand trial in the District of Columbia. If convicted of the charges against him, Ravan faces a potential 20 years in prison for the AECA violation, 10 years in prison for the smuggling charge and five years in prison for the conspiracy charge.

According to the indictment, in late 2006 and early 2007, Ravan attempted to procure for shipment to Iran export-controlled antennas made by a company in Massachusetts, through an intermediary in Iran. The antennas sought by Ravan were cavity-backed spiral antennas suitable for airborne or shipboard direction finding systems or radar warning receiver applications, as well as biconical antennas that are suitable for airborne and shipboard environments, including in several military aircraft.

After this first attempt was unsuccessful, Ravan joined with two co-conspirators at Corezing in Singapore so that Corezing would contact the Massachusetts company and obtain the antennas on behalf of Ravan for shipment to Iran. When Corezing was unable to purchase the export-controlled antennas from the Massachusetts firm, Corezing then contacted another individual in the United States who was ultimately able to obtain these items from the Massachusetts firm by slightly altering the frequency range of the antennas to avoid detection by the company’s export compliance officer.

In March 2007, Ravan and the co-conspirators at Corezing agreed on a purchase price of $86,750 for 50 cavity-backed antennas from the United States and discussed structuring payment from Ravan to his Corezing co-conspirators in a manner that would avoid transactional delays caused by the Iran embargo. Ultimately, between July and September 2007, a total of 50 cavity-backed spiral antennas and five biconical antennas were exported from the United States to Corezing in Singapore and Hong Kong.

According to the indictment, no party to these transactions -- including Ravan or IMI -- ever applied for or received a license from the State Department’s Directorate of Defense Trade Controls to export any of these antennas from the United States to Singapore or Hong Kong.

Two of Ravan’s co-conspirators, Lim Kow Seng (aka Eric Lim) and Hia Soo Gan Benson (aka Benson Hia), principals of Corezing, have been charged in a separate indictment in the District of Columbia in connection with this particular transaction involving the export of military antennas to Singapore and Hong Kong. The two Corezing principals were arrested in Singapore last year and the United States is seeking their extradition.

This investigation was jointly conducted by ICE agents in Boston and Los Angeles; FBI agents and analysts in Minneapolis; and Department of Commerce, Office of Export Enforcement agents and analysts in Chicago and Boston. Substantial assistance was provided by the U.S. Department of Defense, U.S. Customs and Border Protection, the State Department’s Directorate of Defense Trade Controls, and U.S. Department of Justice, Office of International Affairs.

The prosecution is being handled by Assistant U.S. Attorney Anthony Asuncion of the U.S. Attorney’s Office for the District of Columbia and Trial Attorney Richard S. Scott of the Counterespionage Section of the Justice Department’s National Security Division.

An indictment is merely a formal charge that a defendant has committed a violation of criminal law and is not evidence of guilt. Every defendant is presumed innocent until, and unless, proven guilty.

Monday, December 23, 2019

Monday, December 16, 2019

we are talking here about e-food, and stuff...for instance crazy motherfuckers should take this lithium...essential suplement for the brains...also about e-food..we have silica..also an electronic component..which comes from bambu ...as a curiosity, if we are starving of hunger, we can feed ourselfs from nitrouse oxide gas...it will keep us alive..(intel)




MASMUSCULO.COM
Loja online de Silica - 90 caps de Lamberts. Em MAISMusculo colocamos à venda Silica - 90 caps da marca Lamberts.

QD-RUIMING.EN.MADE-IN-CHINA.COM
Constituent: Industrial Pure Air Grade Standard: Medical Grade Chemical Property: Inflammable Gas CAS No: 10024-97-2 General Description: Colorless, Non-Flammable, Cryogenic Liquid Un No.: Un1070

29 de janeiro de 2003, Base de Monte Real, F16, falta de manutençao (portugal intel folder)


(robbering folder)


Thursday, December 12, 2019

with love..Elsa PLENZ.COM Julius Plenz - Tunnel everything through SSH ( hack folder)

https://plenz.com/tunnel-everything.php

In this Tutorial I'll cover how you can tunnel any TCP traffic through an encrypted SSH connection or a SOCKS server, even if a certain program doesn't support proxying of connections natively.
The only requirement for SSH tunneling to work is a shell account on a machine connected to the internet (and, optionally, a HTTP Proxy server). I will refer to this account as your server (it doesn't matter if you may not become root).

Tunneling HTTP

In case you just want to tunnel HTTP traffic (to surf safely, to let the request appear to originate from a different IP and/or to not disclose HTTP clear text passwords to your LAN) best practise is to set up Privoxy on your server. By default, Privoxy binds to 127.0.0.1:8118 (thus only allowing connections from localhost), which is good for us. No configuration must be done for this.
The next step is to establish a tunnel from your computer to your server's Privoxy. That is done with the following SSH command:
ssh -NL 8118:localhost:8118 user@server
This command opens a tunnel on your computer: All connections to port 8118 will be forwarded (encrypted, of course) over the SSH connection and come out at your server's port 8118 (where Privoxy is running).
Once you have established the connection you will want to edit your browser's proxy settings accordingly. Just set the HTTP (and, with some browsers, the HTTPS) proxy to localhost, port 8118.

Advantages

The great advantage over SOCKS tunneling (see below) is, that even the DNS requests are made from your server. No-one on your LAN can gather information on what kind of site you're surfing. Another advantage is that Privoxy already filters out some advertisements and removes sensitive headers from your requests.

Tunneling Arbitrary Protocols (Dynamic Forward/SOCKS)

If you want to tunnel not just HTTP traffic but arbitrary other TCP protocols as well, a HTTP Proxy isn't adequate any more. Instead, you'll have to set up a SOCKS proxy. That also is possible with SSH:

Setting up the SSH proxy

Setting up the SSH SOCKS proxy is really easy. On your computer, just enter the following command:
ssh -ND 3333 user@server
That command establishes a connection to your server, logs in as user user (you'll have to enter your password though, of course) and then starts a little SOCKS proxy on your server.
On your computer, all connections to port 3333 will be forwarded over the secure SSH channel and will then be forwarded by the proxy to their destination.
Now you'll have to configure the program you want to connect through that tunnel to use localhost, port 3333 as it's SOCKS server (if you have the choice, select SOCKS version 5).
Not many programs support SOCKS proxy forwarding natively (hardly any CLI programs). But there is a workaround for that: tsocks. It enables arbitrary programs which don't support the SOCKS protocol natively to establish connections via a SOCKS server.

How tsocks works

On your computer, install the tsocks program.
I won't go into detail about how this program works, but it basically does the following:
  • Before the actual program is loaded tsocks loads its own shared library.
  • This library overwrites the kernel's connect() function and replaces it with its own.
  • Whenever the program tries to send a request the request is forwarded through your proxy server (and then over the secure tunnel).
All this is done through setting the environment variable LD_PRELOAD to /usr/lib/libtsocks.so.
The tsocks program itself is just a simple shell wrapper script. All the actual redirecting stuff is done via the library.

Editing the /etc/tsocks.conf

Now you'll have to edit the file /etc/tsocks.conf to relay all connections through your proxy. Open the file and delete all lines. Then enter just the following two lines:
server = 127.0.0.1
server_port = 3333

If you may not become root ...

... just enter the two lines from above into a file called .tsocks.conf and place it in your home directory. Then, write a little shell script:
#!/bin/sh

TSOCKS_CONF_FILE=$HOME/.tsocks.conf
export TSOCKS_CONF_FILE
exec tsocks "$@"
I call this script viaservername. Place this script in a directory contained in your $PATH and make it executable.

Tunneling Connections

For programs who natively support proxying connections (e.g. Mozilla Firefox) you can now set the proxy address to localhost port 3333. I don't recommend to do that for browsers; instead, use HTTP tunneling (see above).
All other programs which's connections you want to tunnel through your server are prefixed with tsocks. This would look like some of the following program calls (if you wrote a shell script, use that instead of tsocks):
tsocks dog http://www.google.com
tsocks netcat example.com 80
tsocks irssi -c irc.freenode.net -p 6667
If you call tsocks without parameters it executes a shell witht the LD_PRELOAD environment variable already set and exported. That means that every program called from this shell will be redirected through the external server and every subsehll started from this shell will also have the LD_PRELOAD variable set. So if you started tsocks directly after logging in all your traffic would be redirected through your external server.

Example

$ cat =myip
#!/bin/sh
lynx -dump http://tnx.nl/ip

$ ssh -fND 3333 xxx@feh  # -f: goes to background after prompting for password
xxx@feh.name's password:

$ IP=`myip`; host $IP
Name: p54XXXX8B.dip.t-dialin.net
Address: 84.143.XXX.XXX

$ IP=`tsocks myip`; host $IP
16:15:23 libtsocks(26802): Call to connect received on completed request 3
Name: feh.name
Address: 217.160.108.109
Have fun!

hack robbering folder

Intended use cases

Security researchers performing red team assessments.
Capturing card values to later be cloned.
Replaying raw binary captures.*(see note below)
Fuzzing access control systems.*(see note below)...
Ver mais
GITHUB.COM
A tool for logging data/testing devices with a Wiegand Interface. Can be used to create a portable RFID reader or installed directly into an existing installation. Provides access to a web based in...