Jump to content

Leaderboard


Popular Content

Showing content with the highest reputation since 12/19/19 in all areas

  1. 7 points
    San Francisco: Electric automaker Tesla has once again challenged hackers to find bugs in its connected cars. The Elon Musk-run company is returning to the annual hackers' competition "Pwn20wn" to be held in Vancouver in March, reports electrek. Some Model 3 cars and $1 million in award money will be up for grabs. In March last year, a group of hackers won a Tesla Model 3 and $35,000 for hacking into its systems. Amat Cama and Richard Zhu of team called 'Fluoroacetate' exposed a vulnerability in the vehicle system during the hacking competition. The hackers targeted the infotainment system on the Tesla Model 3. According to the Electric Vehicle maker, such hacking events it test as well as improve its security systems. Hackers have also demonstrated how they could trick a Tesla Model S to enter into the wrong lane by using a method called "adversarial attack", a way of manipulating a Machine Learning model.
  2. 5 points
    Poti antrena un porc sa le caute
  3. 3 points
    Mergi la un magazin de electrice (abb/schneider) si le spui ca ai nevoie de un releu cu o pereche de contacte "normal inchis / normal deschis". Este suficient si de 3 amperi. Vezi in imaginea de mai jos. Nu e prea clara, dar poate te ajuta. Cat timp exista tensiune in bobina releului, din retea, pompa de recirculare isi primeste tensiune de acolo prin contactele "normal deschise". Cand tensiunea pica, contactele trec in partea cealalalta iar pompa isi primeste tensiune de la invertorul tau. Deci, este suficient un simplu releu de 220v minim 3 amperi. O pompa de recirculare consuma intre 150 si 350 watts. (de regula au un ajustor de turatie pe ele si nu sunt folosite la maxim). Daca iei in calcul cei 350 watts (maximum), consumul exprimat in amperi este de aproximativ 1.6A (watts / volts = ampers sau volts * ampers = watts) Ca parere personala: Eu nu m-as incurca cu un ansamblu de invertor construit amatoriceste + o baterie de 12 volti. As cumpara un UPS APC de 750 VA (volt-amper) si as rezolva problema elegant. Este obligatoriu ca UPS-ul sau invertorul folosit sa genereze semnal sinusoidal, nicidecum dreptunghiular. Trecerea de la retea la mod baterie pe un UPS profesional se face electronic (tiristoare), nu prin contactele unui releu.
  4. 3 points
    Daca vrei sa inveti SMTP: https://tools.ietf.org/html/rfc5321 Daca vrei sa "aduni SMTP": https://www.shodan.io/ Daca vrei sa faci spam, mai gandeste-te: https://rstforums.com/forum/topic/100304-regulamentul-forumului/ https://www.legi-internet.ro/articole-drept-it/spamul-aspecte-legislative-si-jurisprudentiale.html https://www.dataprotection.ro/
  5. 2 points
    Ca tot e lumea pe aici cu socks, haideti sa deschidem un magazin de sosete. In 6 luni recuperam 9000 euro: https://www.wall-street.ro/raft-afaceri/afaceri-online/cum-sa-pornesti-afacere-sosete.html
  6. 2 points
    - Sa intelegem ca pentru tine google este camera de comert si industrie + anaf + curtea de conturi? - Cum sfantul excrement oferi 20% din ce nu e al tau? Incepi din prima cu o frauda, utilizand fondurile in alte scopuri? Ai atras atentia si lui Che. Hahaha
  7. 2 points
    Legenda spune ca asa a iesit @aelius la ecograf
  8. 2 points
    Ba, urmaresc forumu asta din umbra de ceva timp, nu am mai postat. Dar cat puteti ba sa fiti de terminati? Oare prostia asta a voastra nu are limite? Ce baza de date ba, ca aia era cu persoane de prin anii 90'. 80% din cei care sunt in baza aia de date au murit. Numa invitatii filelist, coduri, dork-uri si baze de date visati. Sa faceti ceva pentru viitoru vostru n-ati face. Ai aici oameni care sunt guru in Linux, care stiu Python si alte lucruri utile si voi cereti baze de date.
  9. 1 point
    Salut, Dupa cum puteti observa, au aparut cateva probleme legate de tema. Imi bag pula in mortii si ranitii astora de la IP Board.
  10. 1 point
  11. 1 point
    20% din profit-ul din computer service, de ong nu ma ating, 'haha'
  12. 1 point
    Data viitoare va fut in cur pe amandoi daca mai postati cacaturi la sectiunea tehnica -> programare. Labagiilor.
  13. 1 point
    Eu iti recomand BIT Academy dar nu pentru ca am facut cursuri de programare la ei, ci din pricina celor de pe Networking. Au "profesori" care au CCIE si CCNP, iar asta este un mare plus in Romania, sa iti predea un CCIE. Cat despre programare, nu stiu cat de buni sunt dar din moment ce isi permit sa angajeze un CCIE care sa predea, eu cred ca si pe programare sunt buni.
  14. 1 point
    Wellcode.ro Sunt sute de mii de carti, tutoriale pe aici (rst); Inveti, faci practica, cauti diploma pe batranul Google Succes
  15. 1 point
  16. 1 point
    Cred ca esti ratatul cu parfumeriastar.
  17. 1 point
    Ahh, nu pot sa iti raspund direct la intrebare. Si inteleg ca vrei certificare neaparat? In opinia mea, daca gasesti un proiect open-source sau ai tu o idee de un proiect (ceva ce te atrage pentru a te motiva), si incepi sa lucrezi fix la a aduce idea aia la realitate. O sa inveti si programare si o sa ai si ceva la care ai lucrat, practic, pentru a discuta despre la interviuri s.a.m.d. Dar da, o certificare/diploma te ajuta sa ajungi la interviurile alea. (P.S. opinia mea e formata pentru joburile din Anglia, nu stiu daca se aplica si in Romania)
  18. 1 point
    cum pot da flood in orice fel inafara de cmd cu putty sau ceva mesaj discord •̶๖̶̶̶ζ͜͡Zeken#8256
  19. 1 point
    Exact cum ti-ai cumpara un Bugatti Veyron cu garda joasa si il tii in garaj ca nu il poti conduce pe drumurile din Romania, Sau l-ai prins in coalii stelare?
  20. 1 point
    @aelius la doctor https://9gag.com/gag/aN0vL5r
  21. 1 point
    Unde saracie pe planeta asta au vazut ei bash setat cu bit suid/sgid? (by default)
  22. 1 point
    Decat sa cumperi un bilet mai bine faci abonament. In Germania un bilet costa 1.8E sau 2.60E pe cand abonamentul pe o luna costa 74E
  23. 1 point
    Chiar nu inteleg de unde aveti puterea sa fiti asa de aroganti. Si sunteti aroganti pe prostie, nu pe cunostinte. Omu a intrebat ceva. Nu stiu daca ati postat vreodata ceva util aici. Daca stiti, ajutati-l, daca nu, mai bine taceti. Va raguseste gatul ca vreti inapoi comunitatea cum era, dar cand cineva vine si posteaza ceva serios, adica fara invitatii filelist si vanzari de conturi facebook, il luati la peleu. D-asta toata lumea a disparut de aici. Si nu ar fi o problema daca trollati, ca toti facem asta. Dar sa si aduceti ceva in schimb. Eu nu aduc nimic in plus, dar macar nu trollez. S-a facut canal de Slack, ca ati tipat ca tiganii cand vand burlane ca vreti canal de discutii. Suntem 15 oameni. Cam asta este despre voi.(ma refer la formele de viata de mai sus care au postat ca sa vada daca le merge tastatura). Sunt oameni vechi care ar putea ajuta lumea pe aici fara sa isi foloseasca aproape deloc creierul, pentru ca sunt prea buni pe ceea ce fac. Dar nu mai intra aici. De scarba. De scarba de a da de oameni ca voi. Daca as fi moderator aici o saptamana, cred ca 100 de oameni ar mai avea cont.
  24. 1 point
  25. 1 point
    Pentru ca de multe ori am cerut ajutorul aici si de prea putine ori l-am oferit inapoi, va pun la dispozitie toate cartile mele de Cisco. Doar Cisco am ca asa mananc painea zilnica. https://we.tl/t-m69KrEzFGx https://we.tl/t-HrRwcciXqn De asemenea, pentru cine merita am toate cursurile de la INE (CCNA, CCNP & CCIE), atat R&S cat si Security, CBTNuggets, GNS3WorkBench, Pearson IT Certifications, Packt, RouteHUB si IpExperts, care se gasesc foarte greu astazi, pentru ca IpExperts a fost inchis. Cine stie, cunoaste. Ca sa va incadrati la culoarea rosie nu trebuie sa fi cerut invitatii FileList si sa fiti vechi. Toate cursurile video sunt platite si downlodate, asa ca e dreptul meu sa aleg cui le dau. PS: De ceva timp am inceput sa-mi blestem zilele cu CCIE-ul si as avea mare nevoie de cursurile celor de la IpExperts. Cum ei nu mai sunt pe piata, iar eu am doar CCNP de la ei, nu prea am de unde sa le mai iau. Cine le are si crede ca le merit, multumesc.
  26. 1 point
    Ba,De fiecare data cand intru pe RST Activity Watcher va vad pe voi cum milogiti invitatii de trackere.Mai usor cu ele. Nu mai merge "pirate bays" si veniti aici?
  27. 1 point
    Asa saraki am ajuns? Sa vindem niste cacaturi de invitatii pe niste trackere aburite, pe care altii le dau moca...?
  28. 1 point
    Sursa: https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE/blob/master/README.md PENTESTING-BIBLE hundreds of ethical hacking & penetration testing & red team & cyber security & computer science resources. MORE THAN 1000 LINK MORE TO COME
  29. 1 point
    Scuze ca v-a deranjat postul asta, eram doar curios daca mai are cineva fisierul ala si daca e dispus sa-l dea mai departe... Eu nu am treaba cu hacking-ul si alte chestii de genul, tocmai de-aia am contul asta doar pentru intrebarea asta si nu frecventez astfel de site-uri. Am auzit de fisierul asta de la niste colegi care l-au folosit, l-am avut si eu intr-o perioada si nu il mai am. Ce am avut eu nu avea doar date din anii 90. Nu sunt genul de persoana care sa ceara chestii pe degeaba si chiar am sapat dupa el, dar fara succes. Am incercat sa intreb mai mult asa, ca ultimul lucru ramas de facut. Nu inteleg cum deduci tu dintr-o simpla intrebare ce fac eu cu timpul meu si cu viitorul meu, dar in fine, nu am chef de cearta. Seara placuta!
  30. 1 point
    Awesome Web Security 🐶 Curated list of Web Security materials and resources. Needless to say, most websites suffer from various types of bugs which may eventually lead to vulnerabilities. Why would this happen so often? There can be many factors involved including misconfiguration, shortage of engineers' security skills, etc. To combat this, here is a curated list of Web Security materials and resources for learning cutting edge penetration techniques, and I highly encourage you to read this article "So you want to be a web security researcher?" first. Please read the contribution guidelines before contributing. 🌈 Want to strengthen your penetration skills? I would recommend playing some awesome-ctfs. If you enjoy this awesome list and would like to support it, check out my Patreon page Also, don't forget to check out my repos 🐾 or say hi on my Twitter! Contents Forums Resources Tips XSS CSV Injection SQL Injection Command Injection ORM Injection FTP Injection XXE CSRF SSRF Web Cache Poisoning Open Redirect Upload Rails AngularJS ReactJS SSL/TLS Webmail NFS AWS Fingerprint Sub Domain Enumeration Crypto Web Shell OSINT Books Evasions CSP WAF JSMVC Authentication Tricks CSRF Remote Code Execution XSS SQL Injection NoSQL Injection FTP Injection XXE SSRF Web Cache Poisoning Header Injection URL Others Browser Exploitation PoCs Database Tools Auditing Command Injection Reconnaissance OSINT Sub Domain Enumeration Code Generating Fuzzing Scanning Penetration Testing Leaking Offensive XSS SQL Injection Template Injection Cross Site Request Forgery Detecting Preventing Proxy Webshell Disassembler Decompiler Others Social Engineering Database Blogs Twitter Users Practices Application AWS XSS ModSecurity / OWASP ModSecurity Core Rule Set Community Miscellaneous Forums Phrack Magazine - Ezine written by and for hackers. The Hacker News - Security in a serious way. Security Weekly - The security podcast network. The Register - Biting the hand that feeds IT. Dark Reading - Connecting The Information Security Community. HackDig - Dig high-quality web security articles for hacker. Resources Tips Hacker101 - Written by hackerone. The Daily Swig - Web security digest - Written by PortSwigger. Web Application Security Zone by Netsparker - Written by Netsparker. Infosec Newbie - Written by Mark Robinson. The Magic of Learning - Written by @bitvijays. CTF Field Guide - Written by Trail of Bits. XSS - Cross-Site Scripting Cross-Site Scripting – Application Security – Google - Written by Google. H5SC - Written by @cure53. AwesomeXSS - Written by @s0md3v. XSS.png - Written by @jackmasa. C.XSS Guide - Written by @JakobKallin and Irene Lobo Valbuena. THE BIG BAD WOLF - XSS AND MAINTAINING ACCESS - Written by Paulos Yibelo. CSV Injection CSV Injection -> Meterpreter on Pornhub - Written by Andy. The Absurdly Underestimated Dangers of CSV Injection - Written by George Mauer. SQL Injection SQL Injection Cheat Sheet - Written by @netsparker. SQL Injection Wiki - Written by NETSPI. SQL Injection Pocket Reference - Written by @LightOS. Command Injection Potential command injection in resolv.rb - Written by @drigg3r. ORM Injection HQL for pentesters - Written by @h3xstream. HQL : Hyperinsane Query Language (or how to access the whole SQL API within a HQL injection ?) - Written by @_m0bius. ORM2Pwn: Exploiting injections in Hibernate ORM - Written by Mikhail Egorov. ORM Injection - Written by Simone Onofri. FTP Injection Advisory: Java/Python FTP Injections Allow for Firewall Bypass - Written by Timothy Morgan. SMTP over XXE − how to send emails using Java's XML parser - Written by Alexander Klink. XXE - XML eXternal Entity XXE - Written by @phonexicum. XXE OOB extracting via HTTP+FTP using single opened port - Written by skavans. CSRF - Cross-Site Request Forgery Wiping Out CSRF - Written by @jrozner. SSRF - Server-Side Request Forgery SSRF bible. Cheatsheet - Written by Wallarm. Web Cache Poisoning Practical Web Cache Poisoning - Written by @albinowax. Open Redirect Open Redirect Vulnerability - Written by s0cket7. Upload File Upload Restrictions Bypass - Written by Haboob Team. Rails Rails Security - First part - Written by @qazbnm456. AngularJS XSS without HTML: Client-Side Template Injection with AngularJS - Written by Gareth Heyes. DOM based Angular sandbox escapes - Written by @garethheyes ReactJS XSS via a spoofed React element - Written by Daniel LeCheminant. SSL/TLS SSL & TLS Penetration Testing - Written by APTIVE. Webmail Why mail() is dangerous in PHP - Written by Robin Peraglie. NFS NFS | PENETRATION TESTING ACADEMY - Written by PENETRATION ACADEMY. AWS PENETRATION TESTING AWS STORAGE: KICKING THE S3 BUCKET - Written by Dwight Hohnstein from Rhino Security Labs. AWS PENETRATION TESTING PART 1. S3 BUCKETS - Written by VirtueSecurity. AWS PENETRATION TESTING PART 2. S3, IAM, EC2 - Written by VirtueSecurity. Fingerprint Sub Domain Enumeration A penetration tester’s guide to sub-domain enumeration - Written by Bharath. The Art of Subdomain Enumeration - Written by Patrik Hudak. Crypto Applied Crypto Hardening - Written by The bettercrypto.org Team. Web Shell Hunting for Web Shells - Written by Jacob Baines. Hacking with JSP Shells - Written by @_nullbind. OSINT Hacking Cryptocurrency Miners with OSINT Techniques - Written by @s3yfullah. OSINT x UCCU Workshop on Open Source Intelligence - Written by Philippe Lin. 102 Deep Dive in the Dark Web OSINT Style Kirby Plessas - Presented by @kirbstr. The most complete guide to finding anyone’s email - Written by Timur Daudpota. Books XSS Cheat Sheet - 2018 Edition - Written by @brutelogic. Evasions CSP Any protection against dynamic module import? - Written by @shhnjk. CSP: bypassing form-action with reflected XSS - Written by Detectify Labs. TWITTER XSS + CSP BYPASS - Written by Paulos Yibelo. Neatly bypassing CSP - Written by Wallarm. Evading CSP with DOM-based dangling markup - Written by portswigger. GitHub's CSP journey - Written by @ptoomey3. GitHub's post-CSP journey - Written by @ptoomey3. WAF Web Application Firewall (WAF) Evasion Techniques - Written by @secjuice. Web Application Firewall (WAF) Evasion Techniques #2 - Written by @secjuice. Airbnb – When Bypassing JSON Encoding, XSS Filter, WAF, CSP, and Auditor turns into Eight Vulnerabilities - Written by @Brett Buerhaus. How to bypass libinjection in many WAF/NGWAF - Written by @d0znpp. JSMVC JavaScript MVC and Templating Frameworks - Written by Mario Heiderich. Authentication Trend Micro Threat Discovery Appliance - Session Generation Authentication Bypass (CVE-2016-8584) - Written by @malerisch and @steventseeley. Tricks CSRF Neat tricks to bypass CSRF-protection - Written by Twosecurity. Exploiting CSRF on JSON endpoints with Flash and redirects - Written by @riyazwalikar. Stealing CSRF tokens with CSS injection (without iFrames) - Written by @dxa4481. Remote Code Execution WebLogic RCE (CVE-2019-2725) Debug Diary - Written by Badcode@Knownsec 404 Team. What Do WebLogic, WebSphere, JBoss, Jenkins, OpenNMS, and Your Application Have in Common? This Vulnerability. - Written by @breenmachine. Exploiting Node.js deserialization bug for Remote Code Execution - Written by OpSecX. DRUPAL 7.X SERVICES MODULE UNSERIALIZE() TO RCE - Written by Ambionics Security. How we exploited a remote code execution vulnerability in math.js - Written by @capacitorset. GitHub Enterprise Remote Code Execution - Written by @iblue. Evil Teacher: Code Injection in Moodle - Written by RIPS Technologies. How I Chained 4 vulnerabilities on GitHub Enterprise, From SSRF Execution Chain to RCE! - Written by Orange. $36k Google App Engine RCE - Written by Ezequiel Pereira. Poor RichFaces - Written by CODE WHITE. Remote Code Execution on a Facebook server - Written by @blaklis_. XSS XSS-Auditor — the protector of unprotected and the deceiver of protected. - Written by @terjanq. Query parameter reordering causes redirect page to render unsafe URL - Written by kenziy. ECMAScript 6 from an Attacker's Perspective - Breaking Frameworks, Sandboxes, and everything else - Written by Mario Heiderich. How I found a $5,000 Google Maps XSS (by fiddling with Protobuf) - Written by @marin_m. DON'T TRUST THE DOM: BYPASSING XSS MITIGATIONS VIA SCRIPT GADGETS - Written by Sebastian Lekies, Krzysztof Kotowicz, and Eduardo Vela. Uber XSS via Cookie - Written by zhchbin. DOM XSS – auth.uber.com - Written by StamOne_. Stored XSS on Facebook - Written by Enguerran Gillier. XSS in Google Colaboratory + CSP bypass - Written by Michał Bentkowski. Another XSS in Google Colaboratory - Written by Michał Bentkowski. </script> is filtered ? - Written by @strukt93. SQL Injection MySQL Error Based SQL Injection Using EXP - Written by @osandamalith. SQL injection in an UPDATE query - a bug bounty story! - Written by Zombiehelp54. GitHub Enterprise SQL Injection - Written by Orange. Making a Blind SQL Injection a little less blind - Written by TomNomNom. NoSQL Injection GraphQL NoSQL Injection Through JSON Types - Written by @east5th. FTP Injection XML Out-Of-Band Data Retrieval - Written by @a66at and Alexey Osipov. XXE OOB exploitation at Java 1.7+ - Written by Ivan Novikov. XXE Evil XML with two encodings - Written by Arseniy Sharoglazov. XXE in WeChat Pay Sdk ( WeChat leave a backdoor on merchant websites) - Written by [Rose Jackcode](1024rosecode at gamil dot com). SSRF AWS takeover through SSRF in JavaScript - Written by Gwen. SSRF in Exchange leads to ROOT access in all instances - Written by @0xacb. SSRF to ROOT Access - A $25k bounty for SSRF leading to ROOT Access in all instances by 0xacb. PHP SSRF Techniques - Written by @themiddleblue. SSRF in https://imgur.com/vidgif/url - Written by aesteral. All you need to know about SSRF and how may we write tools to do auto-detect - Written by @realAuxy233. A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages! - Written by Orange. SSRF Tips - Written by xl7dev. Into the Borg – SSRF inside Google production network - Written by opnsec. Piercing the Veil: Server Side Request Forgery to NIPRNet access - Written by Alyssa Herrera. Web Cache Poisoning Bypassing Web Cache Poisoning Countermeasures - Written by @albinowax. Cache poisoning and other dirty tricks - Written by Wallarm. Header Injection Java/Python FTP Injections Allow for Firewall Bypass - Written by Timothy Morgan. URL Some Problems Of URLs - Written by Chris Palmer. Phishing with Unicode Domains - Written by Xudong Zheng. Unicode Domains are bad and you should feel bad for supporting them - Written by VRGSEC. [dev.twitter.com] XSS - Written by Sergey Bobrov. Others How I hacked Google’s bug tracking system itself for $15,600 in bounties - Written by @alex.birsan. Some Tricks From My Secret Group - Written by PHITHON. Inducing DNS Leaks in Onion Web Services - Written by @epidemics-scepticism. Stored XSS, and SSRF in Google using the Dataset Publishing Language - Written by @signalchaos. Browser Exploitation Frontend (like SOP bypass, URL spoofing, and something like that) The inception bar: a new phishing method - Written by jameshfisher. JSON hijacking for the modern web - Written by portswigger. IE11 Information disclosure - local file detection - Written by James Lee. SOP bypass / UXSS – Stealing Credentials Pretty Fast (Edge) - Written by Manuel. Особенности Safari в client-side атаках - Written by Bo0oM. How do we Stop Spilling the Beans Across Origins? - Written by aaj at google.com and mkwst at google.com. Setting arbitrary request headers in Chromium via CRLF injection - Written by Michał Bentkowski. I’m harvesting credit card numbers and passwords from your site. Here’s how. - Written by David Gilbertson. Backend (core of Browser implementation, and often refers to C or C++ part) Breaking UC Browser - Written by Доктор Веб. Attacking JavaScript Engines - A case study of JavaScriptCore and CVE-2016-4622 - Written by phrack@saelo.net. Three roads lead to Rome - Written by Luke Viruswalker. Exploiting a V8 OOB write. - Written by @halbecaf. FROM CRASH TO EXPLOIT: CVE-2015-6086 – OUT OF BOUND READ/ASLR BYPASS - Written by payatu. SSD Advisory – Chrome Turbofan Remote Code Execution - Written by SecuriTeam Secure Disclosure (SSD). Look Mom, I don't use Shellcode - Browser Exploitation Case Study for Internet Explorer 11 - Written by @moritzj. PUSHING WEBKIT'S BUTTONS WITH A MOBILE PWN2OWN EXPLOIT - Written by @wanderingglitch. A Methodical Approach to Browser Exploitation - Written by RET2 SYSTEMS, INC. CVE-2017-2446 or JSC::JSGlobalObject::isHavingABadTime. - Written by Diary of a reverse-engineer. PoCs Database js-vuln-db - Collection of JavaScript engine CVEs with PoCs by @tunz. awesome-cve-poc - Curated list of CVE PoCs by @qazbnm456. Some-PoC-oR-ExP - 各种漏洞poc、Exp的收集或编写 by @coffeehb. uxss-db - Collection of UXSS CVEs with PoCs by @Metnew. SPLOITUS - Exploits & Tools Search Engine by @i_bo0om. Exploit Database - ultimate archive of Exploits, Shellcode, and Security Papers by Offensive Security. Tools Auditing prowler - Tool for AWS security assessment, auditing and hardening by @Alfresco. A2SV - Auto Scanning to SSL Vulnerability by @hahwul. Command Injection commix - Automated All-in-One OS command injection and exploitation tool by @commixproject. Reconnaissance OSINT - Open-Source Intelligence Shodan - Shodan is the world's first search engine for Internet-connected devices by @shodanhq. Censys - Censys is a search engine that allows computer scientists to ask questions about the devices and networks that compose the Internet by University of Michigan. urlscan.io - Service which analyses websites and the resources they request by @heipei. ZoomEye - Cyberspace Search Engine by @zoomeye_team. FOFA - Cyberspace Search Engine by BAIMAOHUI. NSFOCUS - THREAT INTELLIGENCE PORTAL by NSFOCUS GLOBAL. Photon - Incredibly fast crawler designed for OSINT by @s0md3v. FOCA - FOCA (Fingerprinting Organizations with Collected Archives) is a tool used mainly to find metadata and hidden information in the documents its scans by ElevenPaths. SpiderFoot - Open source footprinting and intelligence-gathering tool by @binarypool. xray - XRay is a tool for recon, mapping and OSINT gathering from public networks by @evilsocket. gitrob - Reconnaissance tool for GitHub organizations by @michenriksen. GSIL - Github Sensitive Information Leakage(Github敏感信息泄露)by @FeeiCN. raven - raven is a Linkedin information gathering tool that can be used by pentesters to gather information about an organization employees using Linkedin by @0x09AL. ReconDog - Reconnaissance Swiss Army Knife by @s0md3v. Databases - start.me - Various databases which you can use for your OSINT research by @technisette. peoplefindThor - the easy way to find people on Facebook by [postkassen](mailto:postkassen@oejvind.dk?subject=peoplefindthor.dk comments). tinfoleak - The most complete open-source tool for Twitter intelligence analysis by @vaguileradiaz. Raccoon - High performance offensive security tool for reconnaissance and vulnerability scanning by @evyatarmeged. Social Mapper - Social Media Enumeration & Correlation Tool by Jacob Wilkin(Greenwolf) by @SpiderLabs. espi0n/Dockerfiles - Dockerfiles for various OSINT tools by @espi0n. Sub Domain Enumeration Sublist3r - Sublist3r is a multi-threaded sub-domain enumeration tool for penetration testers by @aboul3la. EyeWitness - EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible by @ChrisTruncer. subDomainsBrute - A simple and fast sub domain brute tool for pentesters by @lijiejie. AQUATONE - Tool for Domain Flyovers by @michenriksen. domain_analyzer - Analyze the security of any domain by finding all the information possible by @eldraco. VirusTotal domain information - Searching for domain information by VirusTotal. Certificate Transparency - Google's Certificate Transparency project fixes several structural flaws in the SSL certificate system by @google. Certificate Search - Enter an Identity (Domain Name, Organization Name, etc), a Certificate Fingerprint (SHA-1 or SHA-256) or a crt.sh ID to search certificate(s) by @crtsh. GSDF - Domain searcher named GoogleSSLdomainFinder by @We5ter. Code Generating VWGen - Vulnerable Web applications Generator by @qazbnm456. Fuzzing wfuzz - Web application bruteforcer by @xmendez. charsetinspect - Script that inspects multi-byte character sets looking for characters with specific user-defined properties by @hack-all-the-things. IPObfuscator - Simple tool to convert the IP to a DWORD IP by @OsandaMalith. domato - DOM fuzzer by @google. FuzzDB - Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery. dirhunt - Web crawler optimized for searching and analyzing the directory structure of a site by @nekmo. ssltest - Online service that performs a deep analysis of the configuration of any SSL web server on the public internet. Provided by Qualys SSL Labs. Scanning wpscan - WPScan is a black box WordPress vulnerability scanner by @wpscanteam. JoomlaScan - Free software to find the components installed in Joomla CMS, built out of the ashes of Joomscan by @drego85. WAScan - Is an open source web application security scanner that uses "black-box" method, created by @m4ll0k. Penetration Testing Burp Suite - Burp Suite is an integrated platform for performing security testing of web applications by portswigger. TIDoS-Framework - A comprehensive web application audit framework to cover up everything from Reconnaissance and OSINT to Vulnerability Analysis by @_tID. Astra - Automated Security Testing For REST API's by @flipkart-incubator. aws_pwn - A collection of AWS penetration testing junk by @dagrz. grayhatwarfare - Public buckets by grayhatwarfare. Offensive XSS - Cross-Site Scripting beef - The Browser Exploitation Framework Project by beefproject. JShell - Get a JavaScript shell with XSS by @s0md3v. XSStrike - XSStrike is a program which can fuzz and bruteforce parameters for XSS. It can also detect and bypass WAFs by @s0md3v. xssor2 - XSS'OR - Hack with JavaScript by @evilcos. SQL Injection sqlmap - Automatic SQL injection and database takeover tool. Template Injection tplmap - Code and Server-Side Template Injection Detection and Exploitation Tool by @epinna. Cross Site Request Forgery XSRFProbe - The Prime CSRF Audit & Exploitation Toolkit by @0xInfection. Leaking HTTPLeaks - All possible ways, a website can leak HTTP requests by @cure53. dvcs-ripper - Rip web accessible (distributed) version control systems: SVN/GIT/HG... by @kost. DVCS-Pillage - Pillage web accessible GIT, HG and BZR repositories by @evilpacket. GitMiner - Tool for advanced mining for content on Github by @UnkL4b. gitleaks - Searches full repo history for secrets and keys by @zricethezav. CSS-Keylogging - Chrome extension and Express server that exploits keylogging abilities of CSS by @maxchehab. pwngitmanager - Git manager for pentesters by @allyshka. snallygaster - Tool to scan for secret files on HTTP servers by @hannob. Detecting sqlchop - SQL injection detection engine by chaitin. xsschop - XSS detection engine by chaitin. retire.js - Scanner detecting the use of JavaScript libraries with known vulnerabilities by @RetireJS. malware-jail - Sandbox for semi-automatic Javascript malware analysis, deobfuscation and payload extraction by @HynekPetrak. repo-supervisor - Scan your code for security misconfiguration, search for passwords and secrets. bXSS - bXSS is a simple Blind XSS application adapted from cure53.de/m by @LewisArdern. OpenRASP - An open source RASP solution actively maintained by Baidu Inc. With context-aware detection algorithm the project achieved nearly no false positives. And less than 3% performance reduction is observed under heavy server load. GuardRails - A GitHub App that provides security feedback in Pull Requests. Preventing DOMPurify - DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG by Cure53. js-xss - Sanitize untrusted HTML (to prevent XSS) with a configuration specified by a Whitelist by @leizongmin. Acra - Client-side encryption engine for SQL databases, with strong selective encryption, SQL injections prevention and intrusion detection by @cossacklabs. Proxy Charles - HTTP proxy / HTTP monitor / Reverse Proxy that enables a developer to view all of the HTTP and SSL / HTTPS traffic between their machine and the Internet. mitmproxy - Interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers by @mitmproxy. Webshell nano - Family of code golfed PHP shells by @s0md3v. webshell - This is a webshell open source project by @tennc. Weevely - Weaponized web shell by @epinna. Webshell-Sniper - Manage your website via terminal by @WangYihang. Reverse-Shell-Manager - Reverse Shell Manager via Terminal @WangYihang. reverse-shell - Reverse Shell as a Service by @lukechilds. Disassembler plasma - Plasma is an interactive disassembler for x86/ARM/MIPS by @plasma-disassembler. radare2 - Unix-like reverse engineering framework and commandline tools by @radare. Iaitō - Qt and C++ GUI for radare2 reverse engineering framework by @hteso. Decompiler CFR - Another java decompiler by @LeeAtBenf. Others Dnslogger - DNS Logger by @iagox86. CyberChef - The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis - by @GCHQ. Social Engineering Database use at your own risk haveibeenpwned - Check if you have an account that has been compromised in a data breach by Troy Hunt. databases.today - The biggest free-to-download collection of publicly available website databases for security researchers and journalists by @publicdbhost. mysql-password - Database of MySQL hashes. Blogs Orange - Taiwan's talented web penetrator. leavesongs - China's talented web penetrator. James Kettle - Head of Research at PortSwigger Web Security. Broken Browser - Fun with Browser Vulnerabilities. Scrutiny - Internet Security through Web Browsers by Dhiraj Mishra. Blog of Osanda - Security Researching and Reverse Engineering. BRETT BUERHAUS - Vulnerability disclosures and rambles on application security. n0tr00t - ~# n0tr00t Security Team. OpnSec - Open Mind Security! LoRexxar - 带着对技术的敬畏之心成长,不安于一隅... Wfox - 技术宅,热衷各种方面。 RIPS Technologies - Write-ups for PHP vulnerabilities. 0Day Labs - Awesome bug-bounty and challenges writeups. Blog of Osanda - Security Researching and Reverse Engineering. Twitter Users @HackwithGitHub - Initiative to showcase open source hacking tools for hackers and pentesters @filedescriptor - Active penetrator often tweets and writes useful articles @cure53berlin - Cure53 is a German cybersecurity firm. @XssPayloads - The wonderland of JavaScript unexpected usages, and more. @kinugawamasato - Japanese web penetrator. @h3xstream - Security Researcher, interested in web security, crypto, pentest, static analysis but most of all, samy is my hero. @garethheyes - English web penetrator. @hasegawayosuke - Japanese javascript security researcher. Practices Application OWASP Juice Shop - probably the most modern and sophisticated insecure web application - Written by @bkimminich and the @owasp_juiceshop team. BadLibrary - vulnerable web application for training - Written by @SecureSkyTechnology. Hackxor - realistic web application hacking game - Written by @albinowax. SELinux Game - Learn SELinux by doing. Solve Puzzles, show skillz - Written by @selinuxgame. AWS FLAWS - Amazon AWS CTF challenge - Written by @0xdabbad00. CloudGoat - Rhino Security Labs' "Vulnerable by Design" AWS infrastructure setup tool - Written by @RhinoSecurityLabs. XSS XSS Thousand Knocks - XSS Thousand Knocks - Written by @yagihashoo. XSS game - Google XSS Challenge - Written by Google. prompt(1) to win - Complex 16-Level XSS Challenge held in summer 2014 (+4 Hidden Levels) - Written by @cure53. alert(1) to win - Series of XSS challenges - Written by @steike. XSS Challenges - Series of XSS challenges - Written by yamagata21. ModSecurity / OWASP ModSecurity Core Rule Set ModSecurity / OWASP ModSecurity Core Rule Set - Series of tutorials to install, configure and tune ModSecurity and the Core Rule Set - Written by @ChrFolini. Community Reddit Stack Overflow Miscellaneous awesome-bug-bounty - Comprehensive curated list of available Bug Bounty & Disclosure Programs and write-ups by @djadmin. bug-bounty-reference - List of bug bounty write-up that is categorized by the bug nature by @ngalongc. Google VRP and Unicorns - Written by Daniel Stelter-Gliese. Brute Forcing Your Facebook Email and Phone Number - Written by PwnDizzle. Pentest + Exploit dev Cheatsheet wallpaper - Penetration Testing and Exploit Dev CheatSheet. The Definitive Security Data Science and Machine Learning Guide - Written by JASON TROS. EQGRP - Decrypted content of eqgrp-auction-file.tar.xz by @x0rz. Browser Extension and Login-Leak Experiment - Browser Extension and Login-Leak Experiment. notes - Some public notes by @ChALkeR. A glimpse into GitHub's Bug Bounty workflow - Written by @gregose. Cybersecurity Campaign Playbook - Written by Belfer Center for Science and International Affairs. Infosec_Reference - Information Security Reference That Doesn't Suck by @rmusser01. Internet of Things Scanner - Check if your internet-connected devices at home are public on Shodan by BullGuard. The Bug Hunters Methodology v2.1 - Written by @jhaddix. $7.5k Google services mix-up - Written by Ezequiel Pereira. How I exploited ACME TLS-SNI-01 issuing Let's Encrypt SSL-certs for any domain using shared hosting - Written by @fransrosen. TL:DR: VPN leaks users’ IPs via WebRTC. I’ve tested seventy VPN providers and 16 of them leaks users’ IPs via WebRTC (23%) - Written by voidsec. Escape and Evasion Egressing Restricted Networks - Written by Chris Patten, Tom Steele. Be careful what you copy: Invisibly inserting usernames into text with Zero-Width Characters - Written by @umpox. Domato Fuzzer's Generation Engine Internals - Written by sigpwn. CSS Is So Overpowered It Can Deanonymize Facebook Users - Written by Ruslan Habalov. Introduction to Web Application Security - Written by @itsC0rg1, @jmkeads and @matir. Finding The Real Origin IPs Hiding Behind CloudFlare or TOR - Written by Paul Dannewitz. Why Facebook's api starts with a for loop - Written by @AntoGarand. How I could have stolen your photos from Google - my first 3 bug bounty writeups - Written by @gergoturcsanyi. An example why NAT is NOT security - Written by @0daywork. Code of Conduct Please note that this project is released with a Contributor Code of Conduct. By participating in this project you agree to abide by its terms. License To the extent possible under law, @qazbnm456 has waived all copyright and related or neighboring rights to this work. Sursa: https://github.com/qazbnm456/awesome-web-security
  31. 1 point
    Programare in limbajul C/C++ pentru liceu Emanuela Cerchez, Marinel Serban este pentru incepatori Download link: https://www25.zippyshare.com/v/KxEH9wdy/file.html
  32. 1 point
    Pai daca esti sobolan cosmic si nu te uiti cu atentie. Topicul a fost facut in Decembrie 2014. Crezi ca sunt mostenire conturile si tin o viata?
  33. 1 point
    This post requires you to click the Likes button to read this content. http://a.pomf.se/pjmwvx.png """ OLX.ro scraper Gets name, phone no., Yahoo! & Skype addresses, where applicable http://a.pomf.se/pjmwvx.png """ import re import json import requests from bs4 import BeautifulSoup as b pages = 1 # How many pages should be scraped # Category URL, a.k.a. where to get the ads from catURL = "http://olx.ro/electronice-si-electrocasnice/laptop-calculator/" # Links to the Ajax requests ajaxNum = "http://olx.ro/ajax/misc/contact/phone/" ajaxYah = "http://olx.ro/ajax/misc/contact/communicator/" ajaxSky = "http://olx.ro/ajax/misc/contact/skype/" def getName(link): # Get the name from the ad page = requests.get(link) soup = b(page.text) match = soup.find(attrs={"class": "block color-5 brkword xx-large"}) name = re.search(">(.+)<", str(match)).group(1) return name def getPhoneNum(aID): # Get the phone number resp = requests.get("%s%s/" % (ajaxNum, aID)).text try: resp = json.loads(resp).get("value") except ValueError: return # No phone number if "span" in resp: # Multiple phone numbers nums = b(resp).find_all(text=True) for num in nums: if num != " ": return num else: return resp def getYahoo(aID): # Get the Yahoo! ID resp = requests.get("%s%s/" % (ajaxYah, aID)).text try: resp = json.loads(resp).get("value") except ValueError: return # No Yahoo! ID else: return resp def getSkype(aID): # Get the Skype ID resp = requests.get("%s%s/" % (ajaxSky, aID)).text try: resp = json.loads(resp).get("value") except ValueError: return # No Skype ID else: return resp def main(): for pageNum in range(1, pages+1): print("Page %d." % pageNum) page = requests.get(catURL + "?page=" + str(pageNum)) soup = b(page.text) links = soup.findAll(attrs={"class": "marginright5 link linkWithHash \ detailsLink"}) for a in links: aID = re.search('ID(.+)\.', a['href']).group(1) print("ID: %s" % aID) print("\tName: %s" % getName(a['href'])) if getPhoneNum(aID) != None: print("\tPhone: %s" % getPhoneNum(aID)) if getYahoo(aID) != None: print("\tYahoo: %s" % getYahoo(aID)) if getSkype(aID) != None: print("\tSkype: %s" % getSkype(aID)) if __name__ == "__main__": main() Tocmai scraper: https://rstforums.com/forum/98245-tocmai-ro-scraper-nume-oras-numar-telefon.rst
  34. 1 point
    Tutoriale in limba romana: https://drive.google.com/drive/folders/1O2cqrDEdX_1Vag9wWQC6ovBgeoXDk0BB https://1drv.ms/f/s!ApMTkgZGX6psgSKu1b1xhgu1SjWJ Intra in subdirectorul Programare(RO) Acolo gasesti tutoriale limbaj de asamblare (majoritatea - 11), algoritmica, C++. Carte MySQL Romana, si Java.
  35. 1 point
  36. 1 point
    Cele mai utile comenzi de rulare din Windows 7 și 10. Aceste comenzi permit să accesați rapid caracteristici și aplicații pentru a particulariza mediul sistemului de operare. Quick Access To C: drive \ Open the current user’s home folder . Open up the Users folder .. Open Documents Folder documents Open Videos folder videos Open Downloads Folder downloads Open Favorites Folder favorites Open Recent Folder recent Open Recent Folder logoff Open Pictures Folder pictures Windows Sideshow control.exe /name Microsoft.WindowsSideshow Windows CardSpace control.exe /name Microsoft.cardspace Windows Anytime Upgrade WindowsAnytimeUpgradeui Taskbar and Start Menu control.exe /name Microsoft.TaskbarandStartMenu Troubleshooting control.exe /name Microsoft.Troubleshooting User Accounts control.exe /name Microsoft.UserAccounts Adding a new Device devicepairingwizard Add Hardware Wizard hdwwiz Advanced User Accounts netplwiz Advanced User Accounts azman.msc Backup and Restore sdclt Bluetooth File Transfer fsquirt Calculator calc Certificates certmgr.msc Change Computer Performance Settings systempropertiesperformance Change Data Execution Prevention Settings systempropertiesdataexecutionprevention Change Data Execution Prevention Settings printui Character Map charmap ClearType Tuner cttune Color Management colorcpl Command Prompt cmd Component Services comexp.msc Component Services dcomcnfg Computer Management compmgmt.msc Computer Management compmgmtlauncher Connect to a Network Projector netproj Connect to a Projector displayswitch Control Panel control Create A Shared Folder Wizard shrpubw Create a System Repair Disc recdisc Credential Backup and Restore Wizard credwiz Data Execution Prevention systempropertiesdataexecutionprevention Date and Time timedate.cpl Default Location locationnotifications Device Manager devmgmt.msc Device Manager hdwwiz.cpl Device Pairing Wizard devicepairingwizard Diagnostics Troubleshooting Wizard msdt Digitizer Calibration Tool tabcal DirectX Diagnostic Tool dxdiag Disk Cleanup cleanmgr Disk Defragmenter dfrgui Disk Management diskmgmt.msc Display dpiscaling Display Color Calibration dccw Display Switch displayswitch DPAPI Key Migration Wizard dpapimig Driver Verifier Manager verifier Ease of Access Center utilman EFS Wizard rekeywiz Event Viewer eventvwr.msc Fax Cover Page Editor fxscover File Signature Verification sigverif Font Viewer fontview Game Controllers joy.cpl Getting Started gettingstarted IExpress Wizard iexpress Getting Started irprops.cpl Install or Uninstall Display Languages lusrmgr Internet Explorer iexplore Internet Options inetcpl.cpl iSCSI Initiator Configuration Tool iscsicpl Language Pack Installer lpksetup Local Group Policy Editor gpedit.msc Local Security Policy secpol.msc Local Users and Groups lusrmgr.msc Location Activity locationnotifications Magnifier magnify Malicious Software Removal Tool mrt Manage Your File Encryption Certificates rekeywiz Math Input Panel mip Microsoft Management Console mmc Microsoft Support Diagnostic Tool msdt Mouse main.cpl NAP Client Configuration napclcfg.msc Narrator narrator Network Connections ncpa.cpl New Scan Wizard wiaacmgr Notepad notepad ODBC Data Source Administrator odbcad32 ODBC Driver Configuration odbcconf On-Screen Keyboard osk Paint mspaint Pen and Touch tabletpc.cpl People Near Me collab.cpl Performance Monitor perfmon.msc Performance Options systempropertiesperformance Phone and Modem telephon.cpl Phone Dialer dialer Power Options powercfg.cpl Presentation Settings presentationsettings Print Management printmanagement.msc Printer Migration printbrmui Printer User Interface printui Private Character Editor eudcedit Problem Steps Recorder psr Programs and Features appwiz.cpl Protected Content Migration dpapimig Region and Language intl.cpl Registry Editor regedit Registry Editor 32 regedt32 Remote Access Phonebook rasphone Remote Desktop Connection mstsc Resource Monitor resmon Resultant Set of Policy rsop.msc SAM Lock Tool syskey Screen Resolution desk.cpl Securing the Windows Account Database syskey Services services.msc Set Program Access and Computer Defaults computerdefaults Share Creation Wizard shrpubw Shared Folders fsmgmt.msc Snipping Tool snippingtool Sound mmsys.cpl Sound recorder soundrecorder SQL Server Client Network Utility cliconfg Sticky Notes stikynot Stored User Names and Passwords credwiz Sync Center mobsync System Configuration msconfig System Configuration Editor sysedit System Information msinfo32 System Properties sysdm.cpl System Properties (Advanced Tab) systempropertiesadvanced System Properties (Computer Name Tab) systempropertiescomputername System Properties (Hardware Tab) systempropertieshardware System Properties (Remote Tab) systempropertiesremote System Properties (System Protection Tab) systempropertiesprotection System Restore rstrui Task Manager taskmgr Task Scheduler taskschd.msc Trusted Platform Module (TPM) Management tpm.msc User Account Control Settings useraccountcontrolsettings Utility Manager utilman Version Reporter Applet winver Volume Mixer sndvol Windows Action Center wscui.cpl Windows Activation Client slui Windows Anytime Upgrade Results windowsanytimeupgraderesults Windows CardSpace infocardcpl.cpl Windows Disc Image Burning Tool isoburn Windows DVD Maker dvdmaker Windows Easy Transfer migwiz Windows Explorer explorer Windows Fax and Scan wfs Windows Features optionalfeatures Windows Firewall firewall.cpl Windows Firewall with Advanced Security wf.msc Windows Journal journal Windows Media Player wmplayer Windows Memory Diagnostic Scheduler mdsched Windows Mobility Center mblctr Windows Picture Acquisition Wizard wiaacmgr Windows PowerShell powershell Windows PowerShell ISE powershell_ise Windows Remote Assistance msra Windows Repair Disc recdisc Windows Script Host wscript Windows Update wuapp Windows Update Standalone Installer wusa Version Windows winver WMI Management wmimgmt.msc WordPad write XPS Viewer xpsrchvw Import to Windows Contacts wabmig Tablet PC Input Panel tabtip Windows Contacts wab Windows Firewall with Advanced Security wf Windows Help and Support winhlp32 Windows Script Host wscript WMI Tester wbemtest Access Screen Resolution page desk.cpl Access Mouse properties main.cpl Access Windows Action Center wscui.cpl Access Network Adapters ncpa.cpl Access Power Option powercfg.cpl Access the Programs and Features Window appwiz.cpl Access the System Properties sysdm.cpl Access the Windows Firewall firewall.cpl
  37. 1 point
    Administrez servere linux (orice distributie) cat si FreeBSD. Experienta in domeniu: ~22 de ani In mare, din cunostintele ce le am si ce servicii pot oferi: - Politici de securitate atat pe FreeBSD cat si pe linux - Solutii antispam si solutii de securitate pentru servere de email - Orice arhitectura de server(e) web (content delivery & caching, dual strat, clusters) - MySQL, PostgreSQL, PHP - Tehnici avansate de mitigare atacuri DDoS. - Sisteme de detectie si prevenire a intruziunilor - Audit de securitate si pregatire in vederea certificarii ISO 27001 (+ analiza riscuri) Instalez, configurez si optimizez orice fel de daemon sau aplicatie open source. De asemenea, ofer consultanta pentru necesitati hardware. Ofer factura pentru toate serviciile oferite. Pentru cotatii de pret, trimite un email te rog la tex at unixteacher dot org (sau un mesaj privat)
  38. 0 points
    Si eu fac acelasi lucru. Vad aceeasi terminati zile intregi nefacand nimic pentru viitorul lor. Sa va dam la muie tuturor!
  39. -1 points
    Esti si bou si nici nu esti in stare sa cauti in google, ceea ce este un beneficiu pentru cei ca tine. Maine apare postare...caut scan de vps...sau vps de scan Cum ti-au sugerat baietii si mai sus...pune mana si citeste o carte
  40. -1 points
  41. -1 points
  42. -1 points
  43. -1 points
    Va rog, ma poate ajuta si pe mine cineva cu o invitatie pe filelist?
  44. -1 points
    53e3bd3288b2d472253d09c726b02467
  45. -1 points
    Macar nu ai postat intr-o discutie creata acum 5 ani.
  46. -2 points
    Hackuit ieri un server un china, am gasit pe yel multe tooluri, 0day etc.. Va pun unu din yele, ratul ala plugX Run in VM we never know what can hide inside.. https://anonfiles.com/Zflf90H2n2/Controller_zip
×
×
  • Create New...