Thursday, September 1, 2016

TODAY WE ARE SETTING A GAME...

ConfigGenerator

The ConfigGen utility can be used as an aid in setting the device configuration fuse settings.
Unzip the utility and place the file ConfigGen.exe in a directory of your choice. The software uses the MPASM '8bit_device.info' file as the source of its information, and can be set to use the MPASM, MPASMX, or Swordfish copy.
Config Generator Software
Make sure the software is pointing to the MPASM, MPASMX, or Swordfish Bin installation folder. If it is not, use the 'Change Folder...' button to point to the location of the file '8bit_device.info'. For MPLAB this is typically "C:\Program Files\Microchip\MPASM Suite" and for MPLABX it's "C:\Program Files\Microchip\MPLABX\mpasmx". Next, press the 'Load File' button. This will open the .info file and build a list of all PIC18 devices contained in it. Select your desired device from the 'Device' dropdown list and it will display all of the config fuses and their default settings.
Clicking the 'Setting' column for a config entry will show a dropdown list with all of the valid selections for that fuse.
When all config settings have been made, click the 'Generate' button and the program will generate source code with all of your selections (the 'Comments' checkbox will remove the descriptions and just leave the settings, if desired).
Selecting 'Copy to Clipboard' will dump the output window contents into the Windows clipboard, which you can then paste into a file using a text editor or the Swordfish IDE using 'Edit | Paste' (or Ctrl-V).
The 'Set Defaults' button will change all the settings back to the defaults provided in the .info file, with the exception of 'XINST', 'DEBUG', 'LVP', and 'IOL1WAY' (if present for the selected device). The program always sets these off.

BlackArch Linux Complete Tools List

BlackArch Linux Complete Tools List

https://www.blackarch.org/tools.html 

 

Packages that actively seeks vulnerable exploits in the wild. More of an umbrella group for similar packages.

Tool count: 23
BlackArch recon
Name Version Description Homepage
api-dnsdumpster 29.f8cce1f Unofficial Python API for http://dnsdumpster.com/.
basedomainname 0.1 Tool that can extract TLD (Top Level Domain), domain extensions (Second Level Domain + TLD), domain name, and hostname from fully qualified domain names.
bing-ip2hosts 0.4 Enumerates all hostnames which Bing has indexed for a specific IP address.
catnthecanary 7.e9184fe An application to query the canary.pw data set for leaked data.
cutycapt 10 A Qt and WebKit based command-line utility that captures WebKit's rendering of a web page.
dnsbrute 2.b1dc84a Multi-theaded DNS bruteforcing, average speed 80 lookups/second with 40 threads.
dnsenum 1.2.4.2 Script that enumerates DNS information from a domain, attempts zone transfers, performs a brute force dictionary style attack, and then performs reverse look-ups on the results.
dnsrecon 0.8.9 Python script for enumeration of hosts, subdomains and emails from a given domain using google.
dnsspider 0.8 A very fast multithreaded bruteforcer of subdomains that leverages a wordlist and/or character permutation.
dnstracer 1.9 Determines where a given DNS server gets its information from, and follows the chain of DNS servers
dnswalk 2.0.2 A DNS debugger
domain-analyzer 0.8.1 Finds all the security information for a given domain name.
dradis 3.0.0.rc1 An open source framework to enable effective information sharing.
enum4linux 0.8.9 A tool for enumerating information from Windows and Samba systems.
facebot 23.57f6025 A facebook profile and reconnaissance system.
fbid 11.b8106f8 Show info about the author by facebook photo url.
flashlight 107.39594b5 Automated Information Gathering Tool for Penetration Testers.
geoedge 0.2 This little tools is designed to get geolocalization information of a host, it get the information from two sources (maxmind and geoiptool).
githack 6.b83a744 A `.git` folder disclosure exploit.
gitminer 29.e25f339 Tool for advanced mining for content on Github.
goodork 2.2 A python script designed to allow you to leverage the power of google dorking straight from the comfort of your command line.
goofile 1.5 Command line filetype search
goog-mail 1.0 Enumerate domain emails from google.
gwtenum 7.f27a5aa Enumeration of GWT-RCP method calls.
halcyon 0.1 A repository crawler that runs checksums for static files found within a given git repository.
hasere 1.0 Discover the vhosts using google and bing.
idswakeup 1.0 A collection of tools that allows to test network intrusion detection systems.
intrace 1.5 Traceroute-like application piggybacking on existing TCP connections
ircsnapshot 94.cb02a85 Tool to gather information from IRC servers.
ivre 1027.1b9acae Network recon framework.
kacak 1.0 Tools for penetration testers that can enumerate which users logged on windows system.
lanmap2 127.1197999 Passive network mapping tool.
lbd 20130719 Load Balancing detector
ldapenum 0.1 Enumerate domain controllers using LDAP.
lft 3.76 A layer four traceroute implementing numerous other features.
linux-exploit-suggester 32.9db2f5a A Perl script that tries to suggest exploits based OS version number.
loot 51.656fb85 Sensitive information extraction tool.
machinae 61.67b9725 A tool for collecting intelligence from public sites/feeds about various security-related pieces of data.
mdns-recon 7.cf67423 An mDNS recon tool written in Python.
metagoofil 1.4b An information gathering tool designed for extracting metadata of public documents
missidentify 1.0 A program to find Win32 applications.
monocle 1.0 A local network host discovery tool. In passive mode, it will listen for ARP request and reply packets. In active mode, it will send ARP requests to the specific IP range. The results are a list of IP and MAC addresses present on the local network.
nasnum 5.df5df19 Script to enumerate network attached storages.
necromant 3.acbc448 Python Script that search unused Virtual Hosts in Web Servers.
neglected 8.68d02b3 Facebook CDN Photo Resolver.
netdiscover 0.3 An active/passive address reconnaissance tool, mainly developed for those wireless networks without dhcp server, when you are wardriving. It can be also used on hub/switched networks.
netmask 2.4.3 Helps determine network masks
nipper 0.11.7 Network Infrastructure Parser
nsec3walker 20101223 Enumerates domain names using DNSSEC
ntp-ip-enum 0.1 Script to pull addresses from a NTP server using the monlist command. Can also output Maltego resultset.
osinterator 3.8447f58 Open Source Toolkit for Open Source Intelligence Gathering.
parsero 81.e5b585a A robots.txt audit tool.
quickrecon 0.3.2 A python script for simple information gathering. It attempts to find subdomain names, perform zone transfers and gathers emails from Google and Bing.
recon-ng 4.8.1 A full-featured Web Reconnaissance framework written in Python.
revipd 5.2aaacfb A simple reverse IP domain scanner.
ripdc 0.2 A script which maps domains related to an given ip address or domainname.
sctpscan 34.4d44706 A network scanner for discovery and security.
shard 1.5 A command line tool to detect shared passwords.
simplyemail 505.159429f Email recon made fast and easy, with a framework to build on http://CyberSyndicates.com.
sipi 10.10f087f Simple IP Information Tools for Reputation Data Analysis.
smbcrunch 5.23ea4cc 3 tools that work together to simplify reconaissance of Windows File Shares.
smtp-user-enum 1.2 Username guessing tool primarily for use against the default Solaris SMTP service. Can use either EXPN, VRFY or RCPT TO.
sn1per 116.58c25c7 Automated Pentest Recon Scanner.
spfmap 8.a42d15a A program to map out SPF and DKIM records for a large number of domains.
spiderfoot 2.7.0 The Open Source Footprinting Tool.
spoofcheck 16.8cce591 Simple script that checks a domain for email protections.
ssl-hostname-resolver 1 CN (Common Name) grabber on X.509 Certificates over HTTPS.
subdomainer 1.2 A tool designed for obtaining subdomain names from public sources.
sysdig 0.11.0 Open source system-level exploration and troubleshooting tool
theharvester 53.0f9a670 Python tool for gathering e-mail accounts and subdomain names from different public sources (search engines, pgp key servers).
tilt 90.2bc2ef2 An easy and simple tool implemented in Python for ip reconnaissance, with reverse ip lookup.
tinfoleak 3.6469eb3 Get detailed information about a Twitter user activity.
traceroute 2.1.0 Tracks the route taken by packets over an IP network
treasure 6.a91d52b Hunt for sensitive information through githubs code search.
twofi 2.0 Twitter Words of Interest.
vbrute 1.11dda8b Virtual hosts brute forcer.
waldo 28.a33de7a A lightweight and multithreaded directory and subdomain bruteforcer implemented in Python.
websearch 1.cce2384 Search vhost names given a host range. Powered by Bing..
whatweb 4188.f467aa2 Next generation web scanner that identifies what websites are running.
windows-exploit-suggester 26.493f96a This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target.
zgrab631.bb14ac8Grab banners (optionally over TLS).                                                                                                                                                                                                        

http://bt3gl.github.io/black-hat-python-infinite-possibilities-with-the-scapy-module.html 

 Black Hat Python: Infinite possibilities with the Scapy Module

This is a review about one of my favorites libraries in Python: Scapy, which is a very powerful packet manipulation resource.
Scapy is able to forge and decode packets of several protocols, send and capture them, match requests and replies, and much more. It can be used to handle most network tasks such as scanning, tracerouting, probing, attacks, network discovery, to name a few.
Before we start, make sure you have Scapy in your machine:
$ pip install scapy
You can test the installation firing up Scapy iteratively. For example, these are some useful functions:
$ scapy
Welcome to Scapy (2.2.0)
>>> ls()    ---> list protocols/layers
>>> lsc()   ---> list commands
>>> conf    ---> Display configurations
>>> help(sniff)     --> Help for a specific command
This post is divided as the following:

this is no news anyway...I have a passaport...uses a PIC....

How can I display a URL as an image in an excel cell?

How to convert website URL to QR Code online

HOW TO CONVERT URL TO QR CODE?

Just follow these easy steps:
1. Go to a URL code generator such as Scanova
2. Enter the website URL in the given field and click on Create my QR Code







how to make a qr code

Wednesday, August 31, 2016

CHECK OUT THE HARDWARE

Expanding VP8 Hardware Decoder for Full WebP Support

With the recent launch of WebP support in Chrome, Picasa and Gmail, we're happy to announce that the third generation G-Series 1 VP8 hardware decoder, called “Chip Shot,” now offers full 256 Megapixel support for WebP still images. The G-Series 1 is available for licensing at no cost through the WebM Project hardware page
Chip Shot is part of our new golf theme for VP8 hardware decoders, as we noticed that most of the engineers working on the G-Series decoder are very fond of the sport.
The G-Series 1 decoder offers both 1080p 30 frames per second WebM and 36.5 Megapixels per second WebP processing at around 100 MHz clock rate. It is a full hardware implementation, requiring a mere 2 MHz host CPU load even when processing 1080p video or any size WebP images. The decoder uses 380 kilogates of logic area and 52 kilobytes of embedded single-port memory. The logic consumes a negligible 27 mW of power at 1080p resolution, ensuring many hours of video playback time on battery-operated devices.
G-series 1 Block Diagram

Based on the previous releases of the silicon-proven G-Series 1 decoder IP, Chip Shot is a low-risk solution for anyone who wants to enable WebM and WebP support on their chipsets or SOCs. Including all G-Series 1 versions that support WebM, we have released over 50 decoders to our semiconductor partners worldwide to date.

which bug do u prefer?

Libwebp Javascript - beta

WebP - weppy - libwebpjs - offline - decoder-encoder - HTML5
Update: 8/31/2011 - libwebpjs 0.1.3 released - go to release
Update: 7/11/2011 - libwebpjs 0.1.2 released - go to release

Decoder demo: ( WebP -> PNG )

Drop your *.webp image into the field (only Chrome & Firefox)
or use one of the sample image files - Your browser may freeze for a few seconds
Notice: When you want to use the images, you need a permission of the author. more information

Speed result: - n/a
Code:
var WebPImage = { width:{value:0},height:{value:0} }
var decoder = new WebPDecoder();
var bitmap = decoder.WebPDecodeRGB(data, data.length, WebPImage.width, WebPImage.height);
//or
var bitmap = decoder.WebPDecodeRGBA(data, data.length, WebPImage.width, WebPImage.height);


//read width/height
var width = WebPImage.width.value;
var height = WebPImage.height.value;

Encoder demo ( bitmap, png, jpg -> WebP )

Drop your bitmap, png, jpg in the field below and click "Encode"
or use one of the sample images for encoding:
Notice: When you want to use the images, you need a permission of the author. more information

|
Input Image:
Method: - Quality: 0-100% Your browser may freeze for a few seconds
Output: Can only see in Chrome & Opera
Save the result:
Speed result: - n/a
Code:
var out={output:''}; //rgba data
var encoder = new WebPEncoder();

[config code]

//set config; default config -> WebPEncodeConfig( null ) 
encoder.WebPEncodeConfig(config); //when you set the config you must it do for every WebPEncode... new

//start encoding
var size = encoder.WebPEncodeRGB(inputData, w, h, w*3, qualityVal, out); //w*4 desc: w = width, 3:RGB/BGR, 4:RGBA/BGRA 
// or
var size = encoder.WebPEncodeRGBA(inputData, w, h, w*4, qualityVal, out); //w*4 desc: w = width, 3:RGB/BGR, 4:RGBA/BGRA 

//after encoding, you can get the enc-details:
str = encoder.ReturnExtraInfo();

//output (array of bytes)
var output = out.output; 
config-code:
//config, you can set all arguments or what you need
config = new Object()
config.target_size = 0;   // if non-zero, set the desired target size in bytes. Takes precedence over the 'compression' parameter.
config.target_PSNR = 0.;  // if non-zero, specifies the minimal distortion to try to achieve. Takes precedence over target_size.
config.method = method;   // quality/speed trade-off (0=fast, 6=slower-better)
config.sns_strength = 50;  // Spatial Noise Shaping. 0=off, 100=maximum.
config.filter_strength = 20; // range: [0 = off .. 100 = strongest]
config.filter_sharpness = 0; // range: [0 = off .. 7 = least sharp]
config.filter_type = 1;   // filtering type: 0 = simple, 1 = strong (only used if filter_strength > 0 or autofilter > 0)
config.partitions = 0;   // log2(number of token partitions) in [0..3] Default is set to 0 for easier progressive decoding.
config.segments = 4;   // maximum number of segments to use, in [1..4]
config.pass = 1;    // number of entropy-analysis passes (in [1..10]).
config.show_compressed = 0;  // if true, export the compressed picture back. In-loop filtering is not applied.
config.preprocessing = 0;  // preprocessing filter (0=none, 1=segment-smooth)
config.autofilter = 0;   // Auto adjust filter's strength [0 = off, 1 = on]
        //   --- description from libwebp-C-Source Code --- 
config.extra_info_type = 0;  // print extra_info
config.preset = 0     //0: default, 1: picture, 2: photo, 3: drawing, 4: icon, 5: text
libwebpjs - the libwebp implementation in javascript by Dominik Homberger (Dominikhlbg)

they run the anti virus?

File formats supported for viewing in Notes

IBM® Lotus® Notes® supports a variety of file formats for viewing attachments. Notes contains KeyView technology from Verity for viewing attachments. The following formats are available for Microsoft® Windows® operating systems:
Applix Presents 4.3, 4.4
Microsoft PowerPoint 97, 2000, 2002 (PPT)
Applix Spreadsheets 4.3, 4.4
Microsoft Windows Metafile (WMF)
Applix Words 4.3, 4.4
Microsoft Word for Macintosh 98
Bitmap (BMP)
Microsoft Word for Windows 97, Office 2000, 2002 (DOC)
CCITT Group 3 Fax (TIF)
Microsoft Works 1, 2, 3, 4
CompuServe (GIF)
Windows Video (AVI)
Computer Graphics Metafile (CGM)
Paintbrush/DCX (multi-page PCX) (PCX)
Encapsulated Postscript (TIFF header only)
PICT and PICT2 Graphics (PCT)
Executable file (EXE)
Quicktime Movie (MOV)
Graphic Interchange Format (GIF)
Revisable Form Text (RFT)
HTML (HTM)
Rich Text Format (RTF)
JPEG file (JPEG, JPG)
Tagged Image File Format (TIF)
IBM Lotus 1-2-3 97 and 98, R9 (.wk4, 123)
Text file (TXT)
Lotus Freelance 97, R9 (PRE, PRZ)
WordPerfect 5.x, 6.x, 7.x, 8.x
Lotus PIC (PIC)
WordPerfect Graphics (WPG)
Lotus WordPro® 96/97, R9 (LWP)
XyWrite
Microsoft® Excel for Windows® 97, Office 2000, 2002 (XLS)
ZIP file (ZIP)
Microsoft Excel for Macintosh 98

MAGWEAPON ( schoking planets against planets)

  E = 0.002 × (3 × 10⁸)² = 1.8 × 10¹⁴ joules 130 TW = 1.3 × 10¹⁴ W → 1.3 × 10¹⁴ J/s m = E / c² = 1.3 × 10¹⁴ / (9 × 10¹⁶) ≈ 0.00144 kg