Skip to main content

Posts

VMware Workstation 6,7,8,9,10,11,12 Universal License Keys for Win & Linux

universal License Keys for all old versions of VMware Workstation  6.x, 7.x, 8.x, 9.x, 10.x, 11.x and 12.x on Windows & Linux (supports both 32-bit and 64-bit OS) in this one post. If you’re finding the ones for VMware Workstation 12.x, go here . // 6~12 Universal License Keys List // Version License Keys VMware Workstation 6.x A0E8R-YUDFV-6AK2F-4GAN2 CRX0D-VWL0V-7CJ6C-46C7A NA8RX-QPNDU-D2LA9-4WAZL 1H4WM-N21FZ-7GK2A-44U5U 6AJ6N-THY2P-42KEF-4WTFG VMware Workstation 7.x FU3D8-28X0N-H8DJQ-4GZZX-MY2T8 ZY7M2-8ZX81-0813Y-AWPG9-PP0G6 CC3W8-DTX9M-4853Y-HPQGX-NU8X6 YU15U-6TWDQ-H88RZ-GGNXC-QFATA AF1T0-FMZEL-H88FQ-N5NXG-PZUX0 GC3MU-28W06-M80WQ-R4ZXV-YFK98 UA5J0-0HW13-48EMY-VXQNZ-NFUD2 VF7WU-2GF14-488CP-R4Z7Z-NL2YF VMware Workstation 8.x 0A494-8U0EM-UZ2A9-0105M-A303M MA406-25387-7ZNW8-F197P-1AL2D 4A4GP-6PLD0-QZTP9-WK0NK-C3UQD 4A2XP-D03DN-7Z6H9-Z2ANM-0C9PFD 0F0G8-FK29Q-AZ529-2J1NP-AC02F VMware Workstation 9.x 5U63Y-6QL1K-GZ7K0...

How was the WannaCry virus stopped?

The Spread: Spread to host computer through exploits in network infrastructure (since patched). Hold Drive Hostage: Encrypt the user's entire drive, display a message to pay up for the encryption key. Repeat. So a cyber security analyst who was digging through code the worm uses to spread realized something. There was a website url that is referenced in a few places. He tried to go to the website, but found it didn't exist. So he bought the domain for $10 from a site like godaddy.com and forwarded it to a sinkhole server where it couldn't do damage. Once he set this up, almost immediately he was getting thousands of connections a second. What happened? The code he edited basically (over simplified) said: Try and connect to the website: qwhnamownflslwff.co If the website doesn't exist, keep on spreading. If the website exists, halt spreading of the malware. It was essentially a kill-switch programmed in he accidentally stumbled upon....

linux - reverse engineering tool

Examine Browser Malware Website analysis: Thug , mitmproxy , Network Miner Free Edition , curl , Wget , Burp Proxy Free Edition , Automater , pdnstool , Tor , tcpextract , tcpflow , passive.py , CapTipper , yaraPcap.py Flash: xxxswf , SWF Tools , RABCDAsm , extract_swf , Flare Java: Java Cache IDX Parser , JD-GUI Java Decompiler , JAD Java Decompiler , Javassist , CFR JavaScript: Rhino Debugger , ExtractScripts , SpiderMonkey , V8 , JS Beautifier Examine Document Files PDF: AnalyzePDF , Pdfobjflow , pdfid , pdf-parser , peepdf , Origami , PDF X-RAY Lite , PDFtk , swf_mastah , qpdf , pdfresurrect Microsoft Office: officeparser , pyOLEScanner.py , oletools , libolecf , oledump , emldump , MSGConvert , base64dump.py , unicode Shellcode: sctest , unicode2hex-escaped, unicode2raw, dism-this , shellcode2exe Extract and Decode Artifacts Deobfuscate: unXOR , XORStrings , ex_pe_xor , XORSearch , brxor.py , xortool , NoMoreXOR , XORBruteForcer , Balbuzard , FLOSS Extract strin...

python - script count whatever you write there

 this script help to check letter, number whatever even space button to write or past in terminal... bydevilzlinux byrockstardevil print "this script made to check number of message you enter it." print "\nthis script created by ROCK STAR DEVIL devilzlinux.blogspot.com" print "\nthis script check space button too.." message = raw_input("enter a message:") print "\nThe length of the message is: ", len(message) raw_input("\n\npress the enter key to exit" )

wifijammer

wifijammer Continuously jam all wifi clients and access points within range. The effectiveness of this script is constrained by your wireless card. Alfa cards seem to effectively jam within about a block radius with heavy access point saturation. Granularity is given in the options for more effective targeting. Requires: python 2.7, python-scapy, a wireless card capable of injection Usage Simple python wifijammer.py This will find the most powerful wireless interface and turn on monitor mode. If a monitor mode interface is already up it will use the first one it finds instead. It will then start sequentially hopping channels 1 per second from channel 1 to 11 identifying all access points and clients connected to those access points. On the first pass through all the wireless channels it is only identifying targets. After that the 1sec per channel time limit is eliminated and channels are hopped as soon as the deauth packets finish sending. Note that it will...

Autovpn – Easily connect to a VPN in a country of your choice

Download autovpn autovpn is a tool to automatically connect you to a random VPN in a country of your choice. It uses openvpn to connect you to a server obtained from VPN Gate . Compiling First clone the repo and cd into the directory: $ git clone https://github.com/adtac/autovpn $ cd autovpn Then run this to generate the executable: $ go build autovpn.go It’s Go. What do you expect? Requirements This requires openvpn . To install this on a yum -based distro : $ sudo dnf install openvpn If you’re on a apt -based distro : $ sudo apt-get install openvpn Tested and works on Fedora 23. Dunno about Windows. Patches welcome. Usage Simply run: $ ./autovpn and you’re done. You’ll be connected to a server in the US. Welcome to the US! You can give a country if you want. For example, if you want to connect to a server in Japan: $ ./autovpn JP You may need superuser privileges. Don’t worry, I’m not running rm -rf --no-preserve-root / ...

Scan website for vulnerabilities with Uniscan Kali Linux Tutorial

Scan website for vulnerabilities with Uniscan Kali Linux tut Welcome back, in this tutorial you will learn how to scan and fingerprint a web server or device to find vulnerabilities.  To achieve this we will be using a tool called Uniscan. This tutorial will require a Linux Operating system we recommend installing Kali Linux if you have not already done so. Requirements: Kali Linux Uniscan (Comes Pre-Installed in Kali Linux) What is Uniscan ? Uniscan is a simple Remote File Include, Local File Include and Remote Command Execution vulnerability scanner that was written in Perl by Douglas Poerschke Roch. Installing Uniscan root@kali:~# apt-get install uniscan listing usage: You can use command uniscan -h to list help options and display usage. root@kali:~# uniscan -h #################################### # Uniscan project                  # # http://uniscan.sourceforge.net/  # ###################################...

Rollmac – Bypass Free Wifi Time & Data Restriction

Rollmac Free networks often impose either a time or data restriction and this can be used quickly. When this happens you can change your mac address and reconnect, but this is annoying, and it takes time. In addition, most networks will ask you to re-accept the terms and conditions of the network in order to continue. Rollmac – Bypass Free Wifi Time & Data Restriction Rollmac is designed to automate this process by using the WPAD protocol to discover the login page and automatically re-accept the terms and conditions. It also maintains a watch of the network current usage and/or time limit to ensure it is never reached. This means you can run downloads overnight or while you are away from your computer, automatically rolling mac’s and reconnecting to the free network. The entire operation usually takes about 10 seconds. You may need to configure the script slightly to adjust to individual network specifics, however, Rollmac allows you to download massive ...

brut3k1t – Server Side Bruteforce Module

Brute-force (dictionary attack, jk) attack that supports multiple protocols and services http://ex0dus-0x.github.io Introduction brut3k1t is a server-side bruteforce module that supports dictionary attacks for several protocols. The current protocols that are complete and in support are: ssh ftp smtp XMPP instagram facebook There will be future implementations of different protocols and services (including Twitter, Facebook, Instagram). Installation Installation is simple. brut3k1t requires several dependencies, although they will be installed by the program if you do not have it. argparse – utilized for parsing command line arguments paramiko – utilized for working with SSH connections and authentication ftplib – utilized for working with FTP connections and authentication smtplib – utilized for working with SMTP (email) connections and authentication fbchat – utilized for connecting with Facebook selenium – utilized for web scraping, which i...

Creating WordPress Admin Phishing Pages

Creating WordPress Admin Phishing Pages.. Hi welcome back today I will show you how to create WordPress phishing pages. Phishing is the practice of sending emails or fake pages in order to trick targets into unknowingly giving personal information such as passwords and credit and debit card numbers. Phishing attacks are a Social Engineering method that relies solely on human error and trickery. Scenario Lets assume we are doing a Pentest on a popular WordPress website the admin has giving us permission to try and phish information from staff members without breaking into their WordPress or gaining information from the SQLDatabases. The site admin has spent 1000’s of dollar maintaining security of his website and believes it to be quite safe although he can’t be to sure that his staff members will compromise his website through human error. A lot of people come to the conclusion that a user must be stupid or an idiot to fall for phishing pages. This is not th...

FIX “Could not get lock /var/lib/dpkg/lock – Resource temporarily unavailable) E: Unable to lock the administration directory (/var/lib/dpkg/), is another process using it?

Fix “Could not get lock /var/lib/dpkg/lock – Resource temporarily unavailable) E: Unable to lock the administration directory (/var/lib/dpkg/), is another process using it? You been installing packages or updating your repositories and you run in an error message from apt. “ Could not get lock /var/lib/dpkg/lock ” this error can become quite annoying to beginners don’t worry I will show you how to remove the lock from /var/lib/dpkg/lock this will remove the lock and allow us to continue installing software and resources from Kali Linux repositories. E: Could not get lock /var/lib/dpkg/lock - open (11: Resource temporarily unavailable) E: Unable to lock the administration directory (/var/lib/dpkg/), is another process using it? Method 1: First open up a new terminal and use the following command to remove the lock. rm /var/lib/dpkg/lock If the lock does not remove first time repeat the process above. The screen shot below shows the process of removing the l...

how to install saavn songs in SD card / extract mp3 from saavn

how to  Extract MP3 from Saavn Songs..  steps 1> download saavan mod version from osmdroid from here -: https://osmdroid.net/saavn-pro-apk-cracked-mod-unlocked-hack/      ---> steps to install saavan hack version                     Instructions :           * Select which type of theme you want. (Original app theme is light)           * Install apk & LOGIN from facebook account ( if facebook login      dos'nt work first time than try once again) fix for "app not install error "         just rename the orginal apk name and again try to install    Extract MP3 from Saavn Songs There are lot of music streaming apps in app stores now. Gaana, Spotify, Saavn, Wynk etc. Most of them also allo...

How to Organize Your Tools by Pentest Stages

How to Organize Your Tools by Pentest Stages In this tut i will give you steps for hacking ... steps how hacking work and how to find everything about victim .. in every steps i have mention soft which we need to used in kali linux ... you can learn about their work from this website or from other.... I like to organize tools based on the phases of a pentest. Then, in each directory, I will symlink to the tool itself (if it's a tool I don't use often), unless I built the tool from source in that directory. With tools installed via Homebrew or from a .pkg, it can help to maintain a copy of the readme file in the directory with the tool named something like $toolname.readme . This will help with more obscure tools, and it can also help by giving you a place to note things about the tool. Phase 1: Reconnaissance This is the information gathering stage, and can be either active or passive. The whole purpose of this phase is to learn—the more information yo...

TX Power - how to increase signal strength in kali linux 2017

Increase Wi-Fi TX Power / Signal Strength USE this command to check your current dbs :-  iwconfig  example -  root@rockstardevil:~# iwconfig lo        no wireless extensions. eth0      no wireless extensions. wlan0     IEEE 802.11  ESSID:"devilzlinux.blogspot.com"           Mode:Managed  Frequency:2.427 GHz  Access Point: D2:99:K2:54:DC:17            Bit Rate=65 Mb/s   Tx-Power=20 dBm             Retry short limit:7   RTS thr:off   Fragment thr:off           Encryption key:off           Power Management:off           Link Quality=49/70  Signal level=-61 dBm...

CyberWar - check real time attack in world

Cyber War Real Time Cyber War – Here are some awesome sites which give you the live detail of Cyber Wars and threats that are occurring in the world. The graphic awesomeness gives you the goosebumps. With details on what ports? Country? Region? Etc.. is available. These contain DDOS attacks also. Worth visiting these - http://map.norsecorp.com/#/ https://cybermap.kaspersky.com/ http://hp.ipviking.com/ https://threatmap.checkpoint.com/ThreatPortal/livemap.html https://www.fireeye.com/cyber-map/threat-map.html

how to Find Your Gateway IP(linux/win/osx)

It's important for you to know the internal IP address of your default gateway, which is normally your router's LAN IP address. If you have ever had to access your router to configure it, you should know the address. It's what you type in your browser address bar to reach the configuration interface (example: http://192.168.1.1/ ) and, if not, you can find it with the following steps: Windows : Click Start > All Programs > Accessories > Command Prompt . When Command Prompt is open, type the following command: ipconfig | findstr /i "Gateway" (You can copy & paste it in the command prompt; just right-click anywhere in the command prompt window and select Paste .) You should see something like this: C:\Documents and Settings\administrator>ipconfig | findstr /i "Gateway" Default Gateway . . . . . . . . . : 192.168.1.1 In this example, your default gateway (router) IP address is 192.168.1.1 . Linux : You...

How can I decode a base64 string from the command line?

If you have ever needed to quickly decode or encode base64, Linux has a command line utility called base64 that works great. I’ll show you how it works! To encode text to base64, use the following syntax: $ echo -n 'devilzlinux.blogspot.com' | base64 ZGV2aWx6bGludXguYmxvZ3Nwb3QuY29tCg== To decode, use base64 -d. To decode base64, use a syntax like the following: $ echo -n ZGV2aWx6bGludXguYmxvZ3Nwb3QuY29tCg== | base64 -d devilzlinux.blogspot.com Note: if on OS X, use capital D: echo -n ZGV2aWx6bGludXguYmxvZ3Nwb3QuY29tCg== | base64 -D same work with another way python ___________________________________________________________ python - m base64 - d <<< "ZGV2aWx6bGludXguYmxvZ3Nwb3QuY29tCg==" devilzlinux.blogspot.com  ____________________________________________________________________ perl _____________________________________________________________ perl - MMIME :: Base64 - ne 'printf "%s\n",decode_base...

Hacking and Gaining Access to Linux by Exploiting SAMBA Service (exploit/multi/samba/usermap_script)

Hacking and Gaining Access to Linux by Exploiting SAMBA Service we are using kali linux 2016.2 with backtrack wallpaper    this attack work on linux os which have open port in  samba becouce we are using exploit/multi/samba/usermap_script and this script work on linux .. Step 1) First, we need to find out the ports and services running on the target system. To find the open ports and services, the command is: Command: nmap -sS -Pn -A 192.168.2.142 Step 2: Once you find the open ports and service like the samba port and service ready, get set for sending an exploit through that port to create a meterpreter session. To perform this attack, you need to open metasploit. Step 3: Once you open metasploit, first we need to find the version of samba Command: – msf> search scanner/samba (This command used to finding the scanner parameter to find samba version) Step 3: Once you find the scanners to find the samba version of the tar...