Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 08/25/19 in all areas

  1. Normal ca te inseala, te-a luat de papagal si a gasit pe altu de o fute mai bine, dar de tine se simte atasata ca suport moral, sprijin material, stie ca-i vei fi aproape la greu, si pe ce se mai bazeaza relatia voastra. Un futai bun spulbera tot.. incearca sa i-o tragi ca la ultima parasuta, si o sa vezi pe urma efectul. Majoritatea pisdelor gandesc total diferit fata de ce-ti imaginezi tu ca ar arata o relatie ideala.
    2 points
  2. Și-a găsit pe unul care știe gramatică.
    1 point
  3. Ti o spun dim experientele mele personale. Am iesit si am futut femei casatorite, cu copii, vaduve, babe, etc. relatii de 10 ani, 15 ani. M am intrebat, fiind tanar, ce plm cauta femeile astea cu mine avand barbati si copii acasa? Raspunsul e simplu, relatiile se strica, racesc, devin toxice. Cand unul dintre parteneri lasa loc, apare the third wheel. Un fapt e sigur. A gasit alta pula, poate chiar si un sprijin mai bun ca al tau. Sa nu te mire. Inca o treaba, daca a aparut indoiala ca te inseala, relatia nu va mai fi niciodata ca inainte. Trebuie sa intelegi ca femeile sunt perverse, mai mult decat crezi...mult mai mult. Sa gasesti una care sa ti fie alaturi toata viata, loterie. Nu s model playboy, nu ofer prea multe, dar la nivel conversational, le dau sa zaca. Cred ca asta si cauta, iluzia ca le intelegi mai bine decat cel de acasa. Un umar pe care sa planga. E pas mic pana la futai. Te cred ca ati fost lapte si miere, dar am vazut cum dau cu piciorul la relatii de ani de zile pentru....o noapte 2 de placeri si cateva discutii scoase din povesti. Sfatul meu, get your shit together, ia o tare si vorbeste cu ea ca si cum ai fi sigur de ce se intampla, chiar si fara dovezi. Arunca i tu ca stii de la cineva care a vazut o cu altcineva, dar conteaza sa fii increzator. Ea va ceda, mereu cedeaza. Dupa, e decizia ta cum procedezi. Ai nevoie de certitudine, confirmarea ei, ca e asa cum crezi, asta ca sa nu o iei randeaua. Nu te cunosc, imi pare rau ca treci prin asta stiind ca fut femeile altora, dar...simti ca te inseala. Te inseala. N ai gasit pe cine trebuie, nu esti primul nici ultimul care a crezut ca va merge. Pune ti gandurile in ordine si fii bine. Are balta peste. Tine ne la curent, m ai facut curios. De unde esti?
    1 point
  4. Deep Exploit - Official Link Fully automatic penetration test tool using Deep Reinforcement Learning. Presentation February 17th,2018: SECCON YOROZU 2018 August 9th,2018: Black Hat USA 2018 Arsenal August 10th,2018: DEF CON 26! AI Village October 24th,2018: CSS2018 November 3rd,2018: AV TOKYO 2018 Hive December 6th,2018: Black Hat EURO 2018 Arsenal Cooperation HITB+ AI Challenge Demonstration See the demo page. Documentation (Installation, Usage) See the project's wiki for installation, usage and changelog. Overview DeepExploit is fully automated penetration test tool linked with Metasploit. DeepExploit identifies the status of all opened ports on the target server and executes the exploit at pinpoint using Machine Learning. It's key features are following. Efficiently execute exploit. DeepExploit can execute exploits at pinpoint (minimum 1 attempt) using Machine Learning. Deep penetration. If DeepExploit succeeds the exploit to the target server, it further executes the exploit to other internal servers. Self-learning. DeepExploit can learn how to exploitation by itself (uses Reinforcement Learning). It is not necessary for humans to prepare learning data. Learning time is very fast. Generally, reinforcement learning takes a lot of time. So, DeepExploit uses distributed learning by multi agents. We adopted an advanced machine learning model called A3C. Powerful intelligence gathering To gather the information of software operated on the target server is very important for successful the exploitation. DeepExploit can identify product name and version using following methods. Port scanning Machine Learning (Analyze HTTP responses gathered by Web crawling) Contents exploration Abilities of "Deep Exploit". Current DeepExploit's version is a beta. But, it can fully automatically execute following actions: Intelligence gathering. Threat modeling. Vulnerability analysis. Exploitation. Post-Exploitation. Reporting. Your benefits. By using our DeepExploit, you will benefit from the following. For pentester: (a) They can greatly improve the test efficiency. (b) The more pentester uses DeepExploit, DeepExploit learns how to method of exploitation using machine learning. As a result, accuracy of test can be improve. For Information Security Officer: (c) They can quickly identify vulnerabilities of own servers. As a result, prevent that attackers attack to your servers using vulnerabilities, and protect your reputation by avoiding the negative media coverage after breach. Since attack methods to servers are evolving day by day, there is no guarantee that yesterday's security countermeasures are safety today. It is necessary to quickly find vulnerabilities and take countermeasures. Our DeepExploit will contribute greatly to keep your safety.
    1 point
  5. Official Link Introduction Maltrail is a malicious traffic detection system, utilizing publicly available (black)lists containing malicious and/or generally suspicious trails, along with static trails compiled from various AV reports and custom user defined lists, where trail can be anything from domain name (e.g. zvpprsensinaix.com for Banjori malware), URL (e.g. hXXp://109.162.38.120/harsh02.exefor known malicious executable), IP address (e.g. 185.130.5.231 for known attacker) or HTTP User-Agent header value (e.g. sqlmap for automatic SQL injection and database takeover tool). Also, it uses (optional) advanced heuristic mechanisms that can help in discovery of unknown threats (e.g. new malware).
    1 point
  6. ManaTI Project - Official Link Machine Learning for Threat Intuitive Analysis The goal of the ManaTI project is to develop machine learning techniques to assist an intuitive threat analyst to speed the discovery of new security problems. The machine learning will contribute to the analysis by finding new relationships and inferences. The project will include the development of a web interface for the analyst to interact with the data and the machine learning output. This project is partially supported by Cisco Systems. For more information about the project please go to Stratosphere Lab page
    1 point
  7. Official Link Emagnet is a very powerful tool for it's purpose wich is to capture email addresses and passwords from leaked databases uploaded on pastebin. It's almost impossible to find leaked passwords when they are out of list on pastebin.com. Either they have been deleted by pastebin's techs or the uploads is just one in the crowd. To be honest it's easier to find a needle in a haystack then find outdated uploads on pastebin with the data we want to collect. Demo - How it works Left side is how you see it - Right side is what actually happening in the background Of course everything getting stored to log dir (Filtered email addresses)
    1 point
  8. REBEL-FRAMEWORK - Official Link automate the automation MODULES SCREENSHOTS DEMOS
    1 point
This leaderboard is set to Bucharest/GMT+03:00
×
×
  • Create New...