Friday, October 27, 2017

ok, just a quick turn...anybody interessed on here the police around here ? or my house?

crie seu filtro, ou escolha um na lista no lado direito da tela >>>

DX stationDE stationbandmode
dxcc:
  • all
  • 137kHz
  • 472kHz
  • 160m
  • 80m
  • 60m
  • 40m
  • 30m
  • 20m
  • 17m
  • 15m
  • 12m
  • 10m
  • 6m
  • 4m
  • 2m
  • 70cm
  • 23cm
  • 13cm
itu zone:
cq zone:
continent:
 https://dxwatch.com/dxsd1/


Extract IP Addresses -Free online service used to extract ip addresses from a text, extract IPv4 addresses, extract ips online

Enter a text on the form below and press the button to extract valid IP addresses. Do you like this free "Extract IP Address" service? You can make a  donation :)


Hello World! so let's make another register hacking, something very interresting (on pwn) Exploit Development with AFL, PEDA and PwnTools

We found that we could cause a segmentation fault in the target using some specific inputs. In this post (and in this video), we will cover the next step: confirming if the crash can lead to a vulnerability. To do so, we’ll use GDB, the GNU debugger, and PEDA to analyze the execution of the target while processing the inputs previously generated by AFL. By doing so, we will find a way to hijack the execution flow from the Vuln1 program in order to execute our own code


https://thecyberrecce.net/tag/technology/

Thursday, October 26, 2017

SECLIST


Disrupt is a penetration tool devised purely disruption purposes.
http://seclist.us/2015/12

DISRUPT IS A PENETRATION TOOL DEVISED PURELY DISRUPTION PURPOSES.

Disrupt is a penetration tool devised purely disruption purposes. Modules: * SMS Bomber: The SMS Bomber module allows users to send an overflow of threads…

Proxying Bluetooth devices for security analysis using btproxy


Installation

The code currently lives on Github and currently only works on Linux or OS X. It relies on BlueZ.
Install the dependencies:
sudo apt-get install bluez bluez-utils bluez-tools libbluetooth-dev python-dev
Install btproxy:
git clone https://github.com/conorpp/btproxy
cd btproxy
sudo python setup.py install

Running it on the Pebble Watch

To run it, you will need two Bluetooth devices to proxy (Bluetooth low energy doesn’t work yet).
I choose to use my Phone (Nexus 6) and Pebble Steel watch.
So I went ahead and made each device Bluetooth discoverable. For the Nexus 6 running Android L, this just means opening Bluetooth in the settings. For the Pebble watch, you just open Bluetooth in the settings as well.
Now that they are visible, the Proxy can run.
I use hcitool to scan for the devices so I know their Bluetooth MAC addresses.
$ hcitool scan
Scanning ...
        77:88:99:AA:BB:CC   Pebble 9FAA
        11:22:33:44:55:66   conorpp's Nexus 6
Now to run the Bluetooth proxy.

USBPcap - USB Packet capture for Windows (open-source USB Sniffer for Windows)

I'm the bad...bad girl...for a constitucional right :) download this tribe

ETERNAL BLUES

Eternal Blues is a free EternalBlue vulnerability scanner. It helps finding the blind spots in your network, these endpoints that are still vulnerable to EternalBlue.
Just hit the SCAN button and you will immediately start to get which of your computers are vulnerable and which aren’t. That’s it.
EternalBlues_0.0.0.8
If you wish, you can switch networks, or edit your own (yeah, you can also scan the world wide web if you wish). Please use it for good cause only. We have enough bad guys already…

FFmpeg unpacks the video container as separate raw video data and audio data in a native layer. Then, the raw video data is transferred into MediaCodec’s APIs in the Java layer for hardware decoder



FFmpeg has supported Android since the 2.1 release, but the FFmpeg package did not have a build script for x86 on Android. Following are the steps for how to build FFmpeg for Android on x86:
  1. On FFmpeg's web site, download the latest FFmpeg release: ffmpeg-2.2.4.tar.bz2 [2]. 
  2. Copy the FFmpeg package to a Ubuntu* build machine and extract using this “tar” command:
    wangsy@ubuntu:~/Desktop$  tar  xvf  ffmpeg-2.2.4.tar.bz2
  3. Set up ANDROID_NDK_HOME environment with the "export" command: 
    export  ANDROID_NDK_HOME= $ ANDROID_NDK_HOME :/~/android-ndk-r9c
  4. Copy the following configuration file to ~/ffmpeg-2.2.4 and add the "run" permissions: 
    wangsy@ubuntu:~/Desktop$  cp  config_build_x86.sh  ~/ffmpeg-2.2.4
    wangsy@ubuntu:~/Desktop$  sudo chmod  a+x  ~/ffmpeg-2.2.4/config_build_x86.sh
    
    Config Build Icon
  5. Run the configuration script and build using the “make” and “make install” commands: 
    wangsy@ubuntu:~/Desktop/ffmpeg-2.2.4$  make 
    wangsy@ubuntu:~/Desktop/ffmpeg-2.2.4$  make install
The generated Android for x86 libs are under ~/Desktop/ffmpeg-2.2.4/android/x86/lib$.  
Developers can copy these generated libs for development. Because YASM [3] assembler compiler and Intel® Streaming SIMD Extensions (Intel® SSE) [4] are enabled in the config_build_x86.sh, the generated Android for x86 libs are optimized for high performance on Intel Atom-based Android platforms.

PDM audio software decoding on STM32 microcontrollers

This application note presents the algorithms and architecture of an optimized softwareimplementation for PDM signal decoding and audio signal reconstruction when connectingan ST MP45DT02 MEMS microphone with an STM32 microcontroller. It can directly take thePulse Density Modulated (PDM) data output from the microphone and convert it to 16-bitpulse-code modulation (PCM) format.This document also provides quick start information describing how to implement the PDMLibrary for single microphone acquisition via I2S based on the STM32F4 microcontroller andSTM32F4DISCOVERY board

This application note presents the algorithms and architecture of an optimized software implementation for PDM signal decoding and audio signal reconstruction when connecting an ST MP45DT02 MEMS microphone with an STM32 microcontroller. It can directly take the Pulse Density Modulated (PDM) data output from the microphone and convert it to 16-bit pulse-code modulation (PCM) format. This document also provides quick start information describing how to implement the PDM Library for single microphone acquisition via I2S based on the STM32F4 microcontroller and STM32F4DISCOVERY board.