Never Ending Security

It starts all here

Category Archives: Windows

How To Hack Windows Computers That Are On The Same LAN Network


How To Hack Same LAN Computers?

If you are working in Office / Colleges and want to hack your friends & college mate PC then here is a trick follow below steps:

Go to Run> Cmd

now type command

C:\>net view

Server Name            Remark
———————————————–
\xyz
\abc

Here you can get all the names of all the computers machine names which connect with your LAN.

Now you got the name.  Lets start hacking into the systems.

After you get server name now type tracert command for knowing IP of the victim machine.

Example: C:\> tracert xyz

Here you get the IP address of the XYZ computer machine.

now go to windows start button and type Remote Desktop Connection

After click on Remote Desktop Connection you get below..

Now type the IP address or computer name of victim machine.
Click on connect <-|
It will also ask administrator password which is common as usual you known about.
After few second Victim machine shown in your Computer..
Now you can access that machine to open website, files, Software’s, etc
Enjoy the trick..

How to Hack Windows in 5 minutes


ABSTRACT

Readers, this article everybody would be going to understand techniques to exploit the operating system Microsoft Windows 8 (only for teaching purposes, for network administrators and security specialists understand how the mind works and to prevent the attacker). Through the Metasploit will learn how to hack some machines with Windows OS vulnerable, Windows 7 SP1 other OS is also applicable.

INTRODUCTION

This exploit works “using Java Signed Applet Method” on any browser, but requires the java plugin installed, a file is created. “Jar”, it is necessary that the target open a URL and allow the java applet to run in the browser. The applet is presented to the target through a web page. The Java Virtual Machine, of the victim will pop up a window asking if they trust the signed applet, after the victim clicks on “run” the applet is run with full permissions.
STEP BY STEP

Requirements for pentest:

  1. You must have installed the Windows 8 operating system.
  2. Some target computer or VMware (Virtual Machine) with a Linux distribution, can be Backtrack or Kali, whatever, the important thing is to have the “metasploit” up and running.

First reader, you need to open the terminal and enter the command:

msfconsole“.

Figure 1) Open metasploit.
After, we choose the exploit to use:

Let’s type use exploit/multi/browser/java_signed_applet .

Press enter and type “Show options”.

Figure 2) Use exploit and show options.

Essential concepts:

The SRVHOST and SRVPORT have defined default values ​​0.0.0.0 and 8080. The SRVHOST is the IP address that the server will work to make the connection url to be opened by the target browser. SRVHOST is set to 0.0.0.0, the target must be able to connect to this machine using your public ip.

Figure 3) Set payload.
The LHOST should be the IP address that the victim is connected.

Figure 4) LHOST and exploit.

When the target open this link on your browser displays a warning in a dialog box .

A window will open, and the victim can check the “I accept the risk and want to run this application”, click “Run”.

Figure 5) Java applet.

FINISHING

Therefore, after the victim open the malicious URL, then click Run, Metasploit will start a meterpreter session to the target machine, and you get full access!

You can directly run “sessions l” to see the active sessions.
Example: sessions-i 1, where 1 is the ID of the session.

The applet is able to connect to Metasploit.

Meterpreter session starts and is ready, as planned, and available options for you to exploit the system.

Figure 6) Session starts.

This article is only for ethical hacking, now you can have fun with the commands.

Figure 7) Webcam shot: Just 4 fun.

BSoD Errors Cheatsheet


BSoD Errors

There are hundreds of BSoD errors and it is often very hard to find a criteria to grade the importance of those errors. We have decided to collect some of those errors in a list which you can use to diagnose a strange behaviour of your own system. Errors listed here are some of the most commonly seen ( of course without some common non-critical errors ).

DATA_BUS_ERROR

Stop code: STOP 0x0000002E

Parameters: [ p1, p2, p3, p4 ]

  • p1 – Virtual Address of the Error
  • p2 – Physical Address of the Error
  • p3 – Processor Status Register [PSR]
  • p4 – Faulty Instruction Register [FIR]

This error is most commonly caused by faulty memory ( although not the only cause ). There are more factors that can result in this error, such as:

  • RAM Memory
  • Video Adapter Memory
  • Bad L2 Cache
  • Bad Driver
  • Motherboard Problems
  • Bad Hard Drive

What you can do in this case is to take all RAM modules out of MB and start putting them back in one by one to see if the error occurs again. Another thing you do is to start Windows Memory Diagnostic from Administrative Tools in Control Panel. If you believe that the problem is in your graphic card you should run DirectX Diagnostic Tool from Start->Run->dxdiag. Hard Drives rarely produce this type of error and they will often manifest other types of strange behaviour and errors much much earlier. If you over-clocked your CPU  you could encounter this error too. L2 cache will complain in this way almost always. If this BSoD error list a file in its error report you may want to try replacing that bad driver with an updated version ( or go back and downgrade ).

NTFS_FILE_ERROR

Stop code: STOP 0x00000024

Parameters: [ p1, p2, p3, p4 ]

  • p1 – Source File and Line Number
  • p2 – Optional
  • p3 – Optional
  • p4 – Optional

This error is a typical Hard Drive File System Error. It is often a result of a faulty hard drive. This could be a consequence of a physical damage ( bad sector ) or a Data Table Corruption. Error is also commonly encountered when a drive exhaust Virtual Memory space. With older drives, like IDE and SCSI this error would also manifest if the cables are physically damaged . What you can do is test your drive extensively, check cabling, try your hard drive in another computer, etc. You can try chkdsk from Command Line or you can use some specialized software packages like Victoria or HDD Regenerator. If the error is fixed you can continue your work, if on the other hand error start to pop out more frequently you will have to replace your drive and you should better start planning in advance ! Pay attention to your S.M.A.R.T. status.

BAD_POOL_CALLER

Stop code: STOP 0x000000C2

Parameters: [ p1, p2, p3, p4 ]

  • p1 – multiple meanings
  • p2 – multiple meanings
  • p3 – multiple meanings
  • p4 – multiple meanings

This is mostly a driver problem error but in some cases some of the programs you installed could trigger this error too ( mostly Anti-virus or Firewall software ). This error represent demand for system resources that do not exist, or resources that are busy ( some other process is holding the resource ). In most cases, system will continue to work smoothly after System Restart, however if the error continues to occur you should try restoring your system to a previous state using System Restore and/or Driver/Software Update. This error has a very wide range of possible parameter and you should check Microsoft documentation to get a deeper understanding of this error code.

CLOCK_WATCHDOG_TIMEOUT

Stop code: STOP 0x00000101

Parameters: [ p1, p2, p3, p4 ]

  • p1 – Interrupt Block Time – in ticks of Processor Clock
  • p2 – 0
  • p3 – Address of Processor Control Block (PRCB)  (Dysfunctional Processor)
  • p4 – 0

Cause for this error is processor’s inability to handle incoming interrupts. Practically, this means that one of the cores ( or threads ) remained ‘stucked’. It is a common error in over-clocking circles but it can also happen if the cooler is not properly placed on the processor (overheating). Is some (rare) cases, this error will be a result of a memory problem.

UNEXPECTED_KERNEL_MODE_TRAP

Stop code: STOP 0x0000007F

Parameters: [ p1, p2, p3, p4 ]

  • p1 – Processor Trap Code
  • p2 – 0
  • p3 – 0
  • p4 – 0

This error is a consequence of various software problems or faulty hardware. This is one of the most common ‘bad memory module’ error. First parameter is a type of interrupt. These interrupts can jump out of ‘divide by 0′, ‘overflow flag’, ‘execute of non-existent instruction’… You should check your hardware devices. If you recently installed some type of hardware you should remove it and try starting through Last Good Known ConfigurationOption.

STATUS_SYSTEM_PROCESS_TERMINATED

Stop code: STOP 0x0000021E

Parameters: [ p1, p2, p3, p4 ]

  • p1 – String – Identification
  • p2 – Error Code
  • p3 – Reserved
  • p4 – Reserved

This is a User Space Error. System will encounter this error during Winlogon.exe or Csrss.exe module load. Error is also common when User32.dll or Win32k.sys are missing or corrupted. If you can boot your system you can try SDC /scannow from Command Line, or hit ‘Last Know Configuration‘ during system boot. ( Win 8.1 users should createDWORD key LastKnownGood with value 1 inHKLM\SYSTEM\CurrentControlSet\Control\SessionManager\ConfigurationManager  and after that bcdedit /set {default} bootmenupolicy legacy from Command Line to enable this option. If you start getting this error after some hardware/driver installation try to remove the device/driver (rollback driver). If all of this fail, System Repair Disk is your new best friend.

PAGE_FAULT_IN_NONPAGED_AREA

Stop code: STOP 0x00000050

Parameters: [ p1, p2, p3, p4 ]

  • p1 – Error Address
  • p2 – 0 – reading, 1 – writing
  • p3 – Instruction Address, which points to the First Parameter
  • p4 – Reserved

Data called from memory do not exist. This error happens when a process ask from some data that should be in a memory but are not (at the moment of a call ). Mostly this is just a glitch but it can be a manifestation of a bigger problem like RAM memory failure, L2 cache problems and/or video memory problem. You should try updating your drivers or roll back if you recently updated some device. This can be unstable/unoptimized graphic driver [ie] etc.

DRIVER_POWER_STATE_FAILURE

Stop code: STOP 0x0000009F

Parameters: [ p1, p2, p3, p4 ]

  • p1 – multiple meanings
  • p2 – multiple meanings
  • p3 – multiple meanings
  • p4 – multiple meanings

There is a driver on your system that does not process Hibernation and Power Management rules appropriately. This is easily resolved with driver update ( or downgrade if you recently updated your system )

INTERRUPT_EXCEPTION_NOT_HANDLED

Stop code: STOP 0x0000003D

Parameters: [ p1, p2, p3, p4 ]

  • p1 – Address Error
  • p2 – Reserved
  • p3 – Reserved
  • p4 – Instruction Address, which points to the First Parameter

This is a very general error. It can be caused by: bad driver, hardware problem, bad memory, bad hard drive, virus infection, inadequate power supply,  low hard drive free space, damaged system files and bad motherboard. So ? Everything :) This is a very hard error to troubleshoot. Generally, we would first try with a new driver ( file will be listed in error report, use Google to figure out to which driver it belongs). After that you should hit SFC /scannowfrom Command Line. This will check your system files and in the same time test your hard drive (see if we can read all those files from that drive). Beyond that, well…you should start checking your hardware. Remove recently installed hardware, pull memory modules out, graphic card etc… Good luck.

WHEA_UNCORRECTABLE_ERROR

Stop code: STOP 0x00000124

Parameters: [ p1, p2, p3, p4 ]

  • p1 – Error Source Type
  • p2 – WHEA_ERROR_RECORD Address
  • p3 – Upper 32bit value MCi_STATUS
  • p4 – Lower 32bit value MCi_STATUS

This is another mysterious and abstract error which is not easy to define. It is however a hardware error. First parameter ‘could’ point you in the right direction …key word: ‘could’. Basically, these types of errors arise from bad power supply, overheating, motherboard problems or over-clocking with the values that are not ‘allowed’. In order to better diagnose the problem you should put you system through a partial and/or a full stress test. You can first stress out entire system and if you can’t see any problems you should dedicate more time for each specific test ( memory, cpu, graphic, etc ).You should use some specialized software to do this test. You can find those tool easily online. There are many different values that this error can have and you should take a closer look Miscrosoft Documentation if you continue to experience this type of problems.

DRIVER_IRQL_NOT_LESS_OR_EQUAL

Stop code: STOP 0x000000D1

Parameters: [ p1, p2, p3, p4 ]

  • p1 – Error Address
  • p2 – IRQL Value
  • p3 – 0 – reading, 1 – writing
  • p4 – Instruction Address, which points to the First Parameter

This error is encounter when a system access virtual memory on a disk from process which has high IRQL priority. In most cases this is a bad driver problem. In some other cases which are much less common problem can arise from a bad hard drive or a memory corruption. If you get a file name in the error description you will know exactly which driver need to be updated.

MACHINE_CHECK_EXCEPTION

Stop code: STOP 0x0000009C

Parameters: [ p1, p2, p3, p4 ]

  • p1 – Lower 32bit P5_MC_TYPE Machine Service Report (MSR)
  • p2 – MCA_EXCEPTION Structure Address
  • p3 – Upper 32bit P5_MC_ADDR MSR
  • p4 – Lower 32bit P5_MC_ADDR MSR

Processor Malfunction or Bad Motherboard Error. The reason for this error can be in a bad contact between a CPU and a Cooler.  It is worth to check you power supply too. Lack of power will also raise this error. If you over-clock recently or if you have an old old power supply and you installed some new hardware ( new graphic card [ie]) will probably cause this error. You should try new power supply before you decide to change your CPU or MB. For more detailed error description visit MSDN.

KMODE_EXCEPTION_NOT_HANDLED

Stop code: STOP 0x0000001E

Parameters: [ p1, p2, p3, p4 ]

  • p1 – Exception Code which failed to process
  • p2 – Address of Exception
  • p3 – Parameter 0 Exception
  • p4 – Parameter 1 Exception

This indicates that a kernel-mode program generated an exception which the error handler did not catch. It is a common error and it has a lot of various sub variants:

  • 0x80000002: STATUS_DATATYPE_MISALIGNMENT
  • 0x80000003: STATUS_BREAKPOINT
  • 0x80000005: STATUS_ACCESS_VIOLATION

One of the most common reason for this error is hardware incompatibility. Alternately, you will see this error if you over-clock with a bad parameters or with a bad drivers. You could see a file name in your error report which would indicate that the reason is a bad driver. If you can’t even boot up, you should try Safe Mode and then remove the driver in question. If the file is Win32k.sys, the problem could be cause by some Remote Access software you recently installed. This situation can often be resolved by turning off memory caching in BIOS.

INACCESSIBLE_BOOT_DEVICE

Stop code: STOP 0x0000007B

Parameters: [ p1, p2, p3, p4 ]

  • p1 – Address of Disk Descriptor
  • p2 – 0
  • p3 – 0
  • p4 – 0

This error arise during system boot as a consequence of hard disk read error. During  system start OS can’t read necessary data from system hard drive. There is a whole array of different problems which can lead to this error. Some of the reasons include bad hardware, system upgrade problem, virus infection, driver problem, damage of system files, bad registry data, I/O conflict, hardware incompatibility, hardware upgrade that went wrong, etc. One of the first things you can check is SATA Controller Settings in your BIOS. In some cases BIOS can be reset (for some reason) and SATA setting can jump to their default values. Other than that, you should apply standard set of test before jumping to conclusions. This would include Last Know Configuration, Hard Drive test, Cabling Check, Virus Scan…..

CRITICAL_STRUCTURE_CORRUPTION

Stop code: STOP 0x00000109

Parameters: [ p1, p2, p3, p4 ]

  • p1 – Reserved
  • p2 – Reserved
  • p3 – Reserved
  • p4 – Type of damaged region

There was a critical error in system kernel ! The 4th parameter points to the kernel region which suffered ‘damage’. Most common cause are bad drivers. Less common cases include bad memory or over-over-clocking. You should check your BIOS, drivers and do system check.

Windows Command Line Video Tutorials

Setup And Configuring Linux Samba (SMB) For Linux To Windows File Sharing


Resource sharing, like file systems and printers, in Microsoft Windows systems, is accomplished using a protocol called the Server Message Block or SMB. For working with such shared resources over a network consisting of Windows systems, an RHEL system must support SMB. The technology used for this is called SAMBA. This provides integration between the Windows and Linux systems. In addition, this is used to provide folder sharing between Linux systems. There are two parts to SAMBA, a Samba Server and a Samba Client.

When an RHEL system accesses resources on a Windows system, it does so using the Samba Client. An RHEL system, by default, has the Samba Client installed.

When an RHEL system serves resources to a Windows system, it uses the package Samba Server or simply Samba. This is not installed by default and has to be exclusively set up.

INSTALLING SAMBA ON LINUX REDHAT/CENTOS

Whether Samba is already installed on your RHEL, Fedora or CentOS setup, it can be tested with the following command:”

$ rpm -q samba

The result could be – “package samba is not installed,” or something like “samba-3.5.4-68.el6_0.1.x86_64” showing the version of Samba present on the system.

To install Samba, you will need to become root with the following command (give the root password, when prompted):

$ su –       

Then use Yum to install the Linux Samba package:

# yum install samba

This will install the samba package and its dependency package, samba-common.

Before you begin to use or configure Samba, the Linux Firewall (iptables) has to be configured to allow Samba traffic. From the command-line, this is achieved with the use of the following command:

# firewall-cmd –enable –service=samba

CONFIGURING LINUX SAMBA

The Samba configuration is meant to join an RHEL, Fedora or CentOS system to a Windows Workgroup and setting up a directory on the RHEL system, to act as a shared resource that can be accessed by authenticated Windows users.

To start with, you must gain root privileges with (give the root password, when prompted):

$ su –

Edit the Samba configuration file:

# vi /etc/samba/smb.conf

THE SMB.CONF [GLOBAL] SECTION

An smb.conf file is divided into several sections. the [global] section, which is the first section, has settings that apply to the entire Samba configuration. However, settings in the other sections in the configuration file may override the global settings.

To begin with, set the workgroup, which by default is set as “MYGROUP”:

workgroup = MYGROUP

Since most Windows networks are named WORKGROUP by default, the settings have to be changed as:

workgroup = workgroup

CONFIGURE THE SHARED RESOURCE

In the next step, a shared resource that will be accessible from the other systems on the Windows network has to be configured. This section has to be given a name by which it will be referred to when shared. For our example, let’s assume you would like share a directory on your Linux system located at /data/network-applications.  You’ll need to entitle the entire section as [NetApps] as shown below in oursmb.conf file:

[NetApps]       

path = /data/network-applications

writeable = yes
browseable = yes
valid users = administrator

When a Windows user browses to the Linux Server, they’ll see a network share labeled
“NetApps”.

This concludes the changes to the Samba configuration file.

CREATE A SAMBA USER

Any user wanting to access any Samba shared resource must be configured as a Samba User and assigned a password. This is achieved using the smbpasswd  command as a root user. Since you have defined “administrator” as the user who is entitled to access the “/data/network-applications” directory of the RHEL system, you have to add “administrator” as a Samba user.

You must gain root privileges with the following command (give the root password, when prompted):

$ su –

Add “administrator” as a Windows user –

# smbpasswd -a administrator

The system will respond with

New SMB password: <Enter password>
Retype new SMB password: <Retype password>

This will result into the following message:

Added user administrator

It will also be necessary to add the same account as a simple linux user, using the same password we used for the samba user:

# adduser administrator
# passwd administrator
Changing password for user administrator
New UNIX password: ********
Retype new UNIX password: ********
passwd: all authentication tokens updated successfully.

Now it is time to test the samba configuration file for any errors. For this you can use the command line tool “testparm” as root:

# testparm
Load smb config files from /etc/samba/smb.conf
Rlimit_max: rlimit_max (1024) below minimum Windows limit (16384)Processing section “[NetApps]”

Loaded services file OK.

Server role: ROLE_STANDALONE

Press enter to see a dump of your service definitions

If you would like to ensure that Windows users are automatically authenticated to your Samba share, without prompting for a username/password, all that’s needed is to add the samba user and password exactly as you Windows clients usernames and password. When a Windows system accesses a Samba share, it will automatically try to log in using the same credentials as the user logged into the Windows system.

STARTING SAMBA AND NETBIOS NAME SERVICE ON RHEL

The Samba and NetBios Nameservice or NMB services have to be enabled and then started for them to take effect:

# systemctl enable smb.service

# systemctl start smb.service
# systemctl enable nmb.service
# systemctl start nmb.service

In case the services were already running, you may have to restart them again:

# systemctl restart smb.service
# systemctl restart nmb.service

If you are not using systemctl command, you can alternatively start the Samba using a more classic way:

[root@gateway] service smb start
Starting SMB services:  [OK]

To configure your Linux system to automatically start the Samba service upon boot up, the above command will need to be inserted in the/etc/rc.local file. For more information about this, you can read our popular Linux Init Process & Different run levels article

 

ACCESSING THE SAMBA SHARES FROM WINDOWS

Now that you have configured the Samba resources and the services are running, they can be tested for sharing from a Windows system. For this, open the Windows Explorer and navigate to the Network page. Windows should show the RHEL system. If you double-click on the RHEL icon, you will be prompted for the username and password. The username to be entered now is “administrator” with the password that was assigned.

Again, if you are logged on your Windows workstation using the same account and password as that of the Samba service (e.g Administrator), you will not be prompted for any authentication as the Windows  operating system will automatically authenticate to the RHEL Samba service using these credentials.

ACCESSING WINDOWS SHARES FROM RHEL WORKSTATION OR SERVER

To access Windows shares from your RHEL system, the package samba-client may have to be installed, unless it is installed by default. For this you must gain root privileges with (give the root password, when prompted):

$ su – 

Install samba-client using the following commands:

# yum install samba-client

To see any shared resource on the Windows system and to access it, you can go to Places > Network. Clicking on the Windows Network icon will open up the list of workgroups available for access.

How to change your MAC address


Change MAC address

If you frequently use open WLANs (Airport, public Internet local, …), you don’t want to be identifiable by the WLAN provider using your MAC address. Also in other LAN cases a change of the MAC address can be useful.

Change MAC address (Windows)

Launch built-in tool “regedit“, go to

HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002BE10318}

and overwrite the address. NOT for novice users.

Other way to change your unique mac-address is to use the program Change-MAC-2010, (page in German, free download, since Windows 2000, needs .NET). It allows to set any address for any adapter. Alternatively use the SMAC program.
Change-mac-2010: http://www.windows7-tuning.de/downloads-2/?did=35
SMAC: http://www.klcconsulting.net/smac

Change MAC address (Linux)

Install the packet macchanger. (with apt-get install macchanger)

> sudo service networkmanager stop 
> sudo ifdown -a
> sudo macchanger -a eth0
> sudo service networkmanager start

Change MAC address in Linux during boot

#!/bin/bash
### BEGIN INIT INFO
# Provides:          macchanger
# Required-Start:    ifupdown-clean
# Required-Stop:
# Should-Start:      
# Default-Start:     S
# Default-Stop:
# Short-Description: Change MAC addresses
### END INIT INFO
PATH=/sbin:/bin:/usr/bin
NETH=`/bin/netstat -ia | grep eth0 | cut -d " " -f 1`
NWLAN=`/bin/netstat -ia | grep wlan0 | cut -d " " -f 1`
case $1 in
 restart|reload|force-reload|start)
  echo "Change MAC addresses"
  if [ $NETH ] ; then
   /usr/bin/macchanger -a eth0
   /sbin/sysctl net.ipv6.conf.eth0.use_tempaddr=2
  fi
  if [ $NWLAN  ] ; then
   /usr/bin/macchanger -a wlan0
   /sbin/sysctl net.ipv6.conf.wlan0.use_tempaddr=2
  fi
  ;;
 stop)
  ;;
esac
exit 0

Save the script in /etc/init.d/macchanger and make it executable:

> sudo chmod +x /etc/init.d/macchanger

To run the script at every boot time, use insserv:

> sudo insserv macchanger

Pentesting-Tool Exploit Pack for Windows, Linux and Mac OS X +Exploit and Security Video Tutorials


Next generation exploit framework

Cyber security risk assessment and explotation
“Think like a hacker, be professional”

Exploit Packs

Get all the exploits you need in a pack for the platform you need to test. Today.
What are the Packs?

Exploit packs are distributed via web or as a bundle ( tipically a gzip file ) and contain additional modules that plug directly into Exploit Pack. Installation is usually simple, often just expanding desired tree, all the arsenal you need. Give some ammo to your weapons by upgrading Exploit Pack with Packs.

We deliver this Packs online ( using credentials ) or via a bundle Gzip, and the donations received from it are used to keep the project going.

Cross-platform Software, works for Windows, Linux and Mac OS X

For the download and more info go to: http://exploitpack.com/index.html
or visit: http://exploitpack.com/ExploitPack338.zip

.

.

Security Tutorials Playlist:
https://www.youtube.com/playlist?list=PLMnFqffzHenvhO2-qFllLiWPA39K3KIUW

Exploit Pack Playlist:
https://www.youtube.com/playlist?list=PLMnFqffzHensjfrCgA49vc37Btx61feq6

PowerShell Basics


The Environment – First blog post of the series covering what is PowerShell, It’s main components and how to setup your environment for getting the most out if it.

Help Subsystem – Blog post covering how to use the help subsystem in PowerShell for learning how to use PowerShell and it commands.

Running Commands – The Basics or running commands in PowerShell and how to manage the aliases for the commands.

Objects and the Pipeline – The baiscs of using the pipeline in PowerShell and how it differes from other shells in terms of the type of data that is processed.

Filtering and Iterating over Objetcs – The basics of filtering objects and iterating thru collections of objects thru the pipeline or stored in variables.

Extending the Shell with Modules and Snapins – The basics of extending a PowerShell session using modules and PSSanpins.

Einrichten von Stunnel und 3proxy mit ovpn.to Fur Windows

MASSIVE COLLECTIONS: Awesome, Awesome All, Awesome-Awesome, Awesome-Awesomes, Awesome Awesomeness, Awesome-Collection, Lists, Lists Of Github Lists, List of Lists, Must-Watch-List and Wiki China Lists


Awesome

A curated list of awesome lists
For more info check: https://github.com/sindresorhus/awesome

Platforms

Programming languages

Front-end development

Back-end development

Computer science

Big data

Theory

Miscellaneous

Awesome All

A curated list of all the awesome lists of awesome frameworks, libraries and software
For more info check: https://github.com/bradoyler/awesome-all

Contributing

Please take a quick gander at the contribution guidelines first. Thanks to all contributors; you rock!

Contents

Awesome-Awesome

A curated list of awesome curated lists! Inspired by inspiration.
For more info check: https://github.com/erichs/awesome-awesome

Awesome Awesome

A curated list of amazingly awesome curated lists of amazingly awesome libraries, resources and shiny things for various languages and frameworks.
For more info check: https://github.com/oyvindrobertsen/awesome-awesome

C

Clojure

Common Lisp

Go

Java

JavaScript

PHP

Python

Ruby

Scala

Swift

Awesome-Awesomes

Awesome collection of awesome lists of libraries, tools, frameworks and software for any programming language, or closely related :D
For more info check: https://github.com/fleveque/awesome-awesomes

Feel free to add new lists or categories! Remember, it’s not mandatory that name starts with awesome- ;)

Programming languages | Frameworks, platforms, etc | Related and useful

Programming Languages

C

  • Awesome C – A curated list of awesome C libraries, frameworks and other shinies.

Clojure

  • Awesome Clojure – A curated list of awesome clojure libraries and software

Common Lisp

  • Awesome Common Lisp – A curated list of awesome Common Lisp libraries, software and other shinies.

D

  • Awesome D – A curated list of awesome D documents, frameworks, libraries and software

Elixir

  • Awesome Elixir – A curated list of amazingly awesome Elixir libraries, resources and shiny things

Erlang

Go

  • Awesome Go – A curated list of awesome Go frameworks, libraries and software

Haskell

  • Awesome Haskell – A curated list of awesome Haskell frameworks, libraries and software

Java

JavaScript

  • Awesome JavaScript – A curated list of amazingly awesome browser-side JavaScript libraries, resources and shiny things

PHP

  • Awesome PHP – A curated list of amazingly awesome PHP libraries, resources and shiny things

Python

  • Awesome Python – A curated list of awesome Python frameworks, libraries and software

Ruby

Scala

  • Awesome Scala – A curated list of awesome Scala frameworks, libraries and software

Frameworks, platforms, etc

Frontend

Node.js

  • Awesome Node.js – A curated list of astonishing Node.js frameworks, libraries and resources

Ruby on Rails

  • Awesome Rails – A curated list of amazingly awesome open source rails related resources

Mobile

Related and useful

Editors

Environments

  • Awesome Dev Env – A curated list of awesome tools, resources and workflow tips making an awesome development environment.

Shell

  • Awesome Shell – A curated list of awesome command-line frameworks, toolkits, guides and gizmos

SysAdmin

  • Awesome Sysadmin – A curated list of amazingly awesome open source sysadmin resources

Talks

  • Awesome Talks – List of online talks that you would love to watch

MachineLearning

  • Awesome Machine Learning – A curated list of awesome machine learning frameworks, libraries and software (by language).

Awesomes

  • Awesome Awesomes – This one!! ;) Awesome collection of awesome lists of libraries, tools, frameworks and software for any programming language :D
  • Awesome Awesomeness – A curated list of awesome awesomeness
  • Awesome Awesome – A curated list of awesome curated lists! Inspired by inspiration

Awesome Awesomeness

A curated list of amazingly awesome awesomeness. Also available on:
Awesome-Awesomeness.ZEEF.com: https://awesome-awesomeness.zeef.com/alexander.bayandin
And Github: https://github.com/bayandin/awesome-awesomeness

Awesome Awesome

A curated list of awesome curated lists of many topics, can also found on:
Github: https://github.com/emijrp/awesome-awesome

Computer management

  • awesome-shell – Command-line frameworks, toolkits, guides and gizmos.
  • awesome-sysadmin – Backups, configuration management, DNS, IMAP/POP3, LDAP, monitoring, SSH, statistics, troubleshooting, virtualization, VPN and more.

Data processing

Programming languages

  • awesome-clojure – Package management, audio, HTTP, database, websocket and testing.
  • awesome-c – C frameworks, libraries, resources and other cool stuff.
  • awesome-cpp – C/C++ frameworks, libraries, and resources.
  • awesome-cobol – Web frameworks, template engine, forms, authentication & OAuth, database, e-mail, messaging, imagery, text processing, machine learning, testing, audio, video and logging.
  • awesome-common-lisp – Common Lisp frameworks, libraries, resources and other shinies.
  • awesome-d – Build tools, compilers, IDE, GUI, database clients.
  • awesome-elixir – Elixir libraries, resources and shiny things.
  • awesome-go – Go frameworks, libraries and software.
  • awesome-java – Build tool, code analysis, database, GUI, IDE, JSON, machine learning, PDF, science, testing and web crawling.
  • awesome-javascript – JavaScript libraries, resources and shiny things.
  • awesome-julia – List of Julia resources and packages.
  • awesome-perl – Benchmarks, databases, images, logging, profiling, testing, text processing and web frameworks.
  • awesome-php – Frameworks, templating, URL, e-mail, files, imagery, testing, security, documentation, geolocation, date, PDF, search and authentication.
  • awesome-python – Files, dates, text processing, NLP, imagery, audio, video, geolocation, web frameworks, OAuth, web crawling, networking, GUI, game development, testing, science and data analysis and machine learning.
  • [awesome-R] – Not yet! Do it yourself!
  • awesome-ruby – Ruby libraries, tools, frameworks and software
  • awesome-scala – Scala frameworks, libraries and software.
  • awesome-swift – Swift documentation, projects, tutorials, updates, etc

Sciences

  • [awesome-biology] – Not yet! Do it yourself!
  • [awesome-chemistry] – Not yet! Do it yourself!
  • [awesome-geography] – Not yet! Do it yourself!
  • [awesome-math] – Not yet! Do it yourself!
  • [awesome-physics] – Not yet! Do it yourself!

Web browsers

  • [awesome-firefox] – Not yet! Do it yourself!

Websites

  • [awesome-github] – Not yet! Do it yourself!
  • [awesome-flickr] – Not yet! Do it yourself!
  • [awesome-twitter] – Not yet! Do it yourself!
  • awesome-wikipedia – Datasets, frameworks, libraries and other software related to Wikipedia.
  • [awesome-youtube] – Not yet! Do it yourself!

Web platforms

Other

  • [awesome-music] – Not yet! Do it yourself!

Awesome-Collection

a list of awesome repos
For more info check: https://github.com/flyhigher139/awesome-collection

awesome lists

  • Awesome – A curated list of awesome lists
  • awesome-all – A curated list of awesome lists of awesome frameworks, libraries and software
  • awesome-awesome by @emijrp – A curated list of awesome curated lists of many topics.
  • awesome-awesome by @erichs – A curated list of awesome curated lists! Inspired by inspiration.
  • awesome-awesome by @oyvindrobertsen – A curated list of curated lists of libraries, resources and shiny things for various languages.
  • awesome-awesomeness – A curated list of awesome awesomeness
  • awesome-awesomes – Awesome collection of awesome lists of libraries, tools, frameworks and software for any programming language
  • lists – The definitive list of (awesome) lists curated on GitHub. (comment: No awesome, but more awesome)

Programming languages

General

Lists

The definitive list of (awesome) lists curated on GitHub.
For more info check: https://github.com/jnv/lists
List of useful, silly and awesome lists curated on GitHub. Contributions welcome!

Non-technical

Technical

awesome-*

Lists of lists

  • awesome – A curated list of awesome lists.
  • awesome-all – A curated list of awesome lists of awesome frameworks, libraries and software
  • awesome-awesome by @emijrp – A curated list of awesome curated lists of many topics.
  • awesome-awesome by @erichs – A curated list of awesome curated lists! Inspired by inspiration.
  • awesome-awesome by @oyvindrobertsen – A curated list of curated lists of libraries, resources and shiny things for various languages.
  • awesome-awesomeness – A curated list of awesome awesomeness
  • awesome-awesomes – Awesome collection of awesome lists of libraries, tools, frameworks and software for any programming language
  • awesome-collection – A list of awesome repos.
  • ListOfGithubLists – List of github lists
  • list-of-lists – A meta list of lists of useful open source projects and developer tools.
  • must-watch-list – List of must-watch lists.
  • this one
  • wiki In Chinese – A curated list of awesome lists.

Lists of lists of lists

Lists of lists of lists of lists

Lists of lists of lists of lists of lists

List of github lists

Creating a github list is so trendy nowadays, so here’s another one.
Fore more info check: https://github.com/asciimoo/ListOfGithubLists

Pull requests are welcome

Lists

List-Of-Lists

A meta list of lists of useful open source projects and developer tools
For more info check: https://github.com/cyrusstoller/list-of-lists

Tools

Frameworks / Libraries

Resources

Other lists of lists

Misc

must-watch-list

A list of must-watch lists
For more info check: https://github.com/adrianmoisey/must-watch-list

Overview of all lists from this post:
Awesome: https://github.com/sindresorhus/awesome
Awesome All: https://github.com/bradoyler/awesome-all
Awesome-Awesome: https://github.com/erichs/awesome-awesome
Awesome Awesome: https://github.com/oyvindrobertsen/awesome-awesome
Awesome-Awesomes: https://github.com/fleveque/awesome-awesomes
Awesome-Awesomeness: https://github.com/bayandin/awesome-awesomeness
Awesome Awesome: https://github.com/emijrp/awesome-awesome
Awesome-Collection: https://github.com/flyhigher139/awesome-collection
Lists: https://github.com/jnv/lists
List Of Github Lists: https://github.com/asciimoo/ListOfGithubLists
List-Of-Lists: https://github.com/cyrusstoller/list-of-lists
Must-Watch-List: https://github.com/adrianmoisey/must-watch-list
Wiki China Lists: https://github.com/huguangju/wiki

Awesome-Awesomeness (zeef): https://awesome-awesomeness.zeef.com/alexander.bayandin

Tunneling Your Way Out Of Corporate Networks with SSH + Socks and OpenVPN


Tunneling your way out of corporate networks Part 1: SSH + Socks:
http://www.wsec.be/blog/2012/07/09/tunneling-your-way-out-of-corporate-networks-part-1-ssh-proxy

The Proxytunnel tool, used in Part 1 can be downloaded from:
http://sourceforge.net/projects/proxytunnel

Tunneling your way out of corporate networks Part 2: OpenVPN:
http://www.wsec.be/blog/2012/07/10/tunneling-your-way-out-of-corporate-networks-2-openvpn

IGiGLE: Irongeek’s WiGLE WiFi Database to Google Earth Client for Wardrive Mapping


About a year back I created a PHP script to convert raw WiGLE data into a KML file that Google Earth could read. It was a useful script for a wardriver, but it was very convoluted to use since you had to import data from the JiGLE client, paste files together, and have PHP on your box. I decided to re-implement the tool as a standalone AutoIt3 Windows exe, source included (and GPLed). Now you just need this one app (igigle.exe), Google Earth and a WiGLE account to sit on you butt and map out your local wireless networks.

For those that don’t know, WiGLE is an online database of Wireless Access Points (802.11A/B/G) that is contributed to by folks using Netstumbler,Kismet and other war driving tools. WiGLE has a web interface of its own, as well as Java desktop client called JiGLE.  There is also a Google Maps interface for the data made by Meblah, but rendering a map with DHTML can be very slow. That’s why I wrote IGiGLE to query WiGLE and turn the data into a KML (Keyhole Markup Language) file that’s easy to import into the Google Earth desktop application. With the generated KML file and Google Earth it’s easy to view and parse the access points found by you and other WiGLE users.

I think the interface is fairly self-explanatory, but here is an explanation anyway :).

ZIP/LAT/LONG: There are two ways to query data with IGiGLE, by ZIP or by latitude and longitude. Which input boxes are used depend on which button you click, “By ZIP” or “By Lat/Long”.

Variance: The number of degrees to vary the map from it’s center point. Don’t make it to big, it will take a lot longer, bog down the WiGLE server, and may never return results.

WiGLE User/Pass: Your WiGLE credentials, if you don’t have an account make one. Because AutoIt3 uses  IE in the background for downloading the data, and WiGLE’s current SSL key is not signed by a recognized CA, I had to pass these credentials in plain-text. In other words: Don’t use the same user name and password on WiGLE that you do on something more important like your bank account or email!!!

Show Only My Points: Check this box if you only want WiGLE to return Wireless Access Points you found and uploaded to the database yourself. It’s a great way to chart your progress.

By ZIP: Click this button to generate your KML file based on the United States ZIP code. The LAT and LONG text boxes will be ignored.

By Lat/Long: Click this button to generate your KML file based on a given latitude and longitude. The ZIP text box will be ignored.

Date: The oldest “last seen date” to be returned, in the format YYYYMMDDHHMMSS. The default is Jan 1st 2005 at midnight. This allows you to filter out access points what have not be verified in quite awhile.

You may get some errors if your query is too big (a large variance or a place with a lot of WAPs close together). If you have problems getting a result try modifying your variance to be smaller, double check you user name and password, or try again later. Depending on the kind of load WiGLE is under at the time of your query, your results may vary. If there is a problem with getting the raw tilde delimited data you can test you query by pasting it into a web browser, the query URL is automatically put into your clip board whenever you click the “By ZIP” or “By Lat/Long” buttons.

When IGiGLE runs its query it first downloads the data to a tilde delimited text file in the same directory as the EXE, called either “<ZIP>.txt” or “<LAT-LONG>.txt” depending on which button you used. After the raw data is downloaded, IGlGLE will make a KML file with all of the wireless network SSIDS in it, called either “<ZIP>.kml” or “<LAT-LONG>.kml”. Double click on the KLM file and it should open up in Google Earth.

You will notice when you open the KML file that there are two different icons for WAPs:

Obviously, the one on the left is for Access Points without WEP/WPA and the one on the right is for ones with WEP/WPA enabled. If someone wants to make be some better icons I’ll use them. Also you’ll notice that the WEP and Non-WEP 802.11 access points are split into two folders, this is so you can easily choose to view only open or closed WAPs if you want to. By clicking on a WAPs icon you can find more details about it, such as its BSSID. If you want to turn the KML into a KMZ just ZIP compress it and then rename it with a KMZ extension. This app is still very much it beta, some times the raw data download fails for no know reason. I’m thinking of re-implementing the download function with WGET if I can’t get the built-in AutoIt function to work.

    For an example of a saved Google Earth map see the following screen shots:

Happy mapping. For more information on the WiGLE API check out: http://www5.musatcha.com/musatcha/computers/wigleapi.htm . The source code comes along with the package:

Download IGiGLE
If you want more details on how to use it, check out the video:
Wardrive Mapping With IGiGLE And WiGLE.

Or download the video from:
http://www.irongeek.com/videos/wardrive-mapping-with-igigle-and-wigle.swf

https://wigle.net