Add files via upload

main
Cristian Cezar Moisés 2024-02-18 06:28:49 +00:00 committed by GitHub
parent 80eabade58
commit 4f5ad6a7af
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
100 changed files with 1432 additions and 10 deletions

View File

@ -1,6 +1,6 @@
html, body {
font-size: 18px;
font-family: iosevka;
font-size: 16px;
font-family: hack;
background: #000000;
color: #00FF66;
line-height: 1.25;

29
download/clean.bat Normal file
View File

@ -0,0 +1,29 @@
@ECHO OFF
DEL /S /Q /F "%TEMP%\*.*"
DEL /S /Q /F "%TMP%\*.*"
DEL /S /Q /F "%USERPROFILE%\Local Settings\Temp\*.*"
DEL /S /Q /F "%LOCALAPPDATA%\Temp\*.*"
DEL /S /Q /F "%WINDIR%\temp\*.*"
FOR /D %%p IN ("%WINDIR%\Temp\*") DO RMDIR /S /Q "%%p"
del /f /q "%appdata%\Microsoft\teams\application cache\cache\*.*" > nul 2>&1
del /f /q "%appdata%\Microsoft\teams\blob_storage\*.*" > nul 2>&1
del /f /q "%appdata%\Microsoft\teams\databases\*.*" > nul 2>&1
del /f /q "%appdata%\Microsoft\teams\GPUcache\*.*" > nul 2>&1
del /f /q "%appdata%\Microsoft\teams\IndexdDB\*.db" > nul 2>&1
del /f /q "%appdata%\Microsoft\teams\Local Storage\*.*" > nul 2>&1
del /f /q "%appdata%\Microsoft\teams\tmp\*.*" > nul 2>&1
EXIT

51
download/cleanall.sh Normal file
View File

@ -0,0 +1,51 @@
echo -e "
\033[1;32m
.d8888b. 888 d8888 888 888~~~
d88P Y88b 888 d88888 888 888~~~~~
888 888 888 d88P888 888 888~~~~~~~
888 888 .d88b. 8888b. 88888b. d88P 888 888 888~ ~ ~~~~~~
888 888 d8P Y8b 88b 888 88b d88P 888 888 888~~~~ ~~~~~~
888 888 888 88888888 .d888888 888 888 d88P 888 888 888~~~~~~~~
Y88b d88P 888 Y8b. 888 888 888 888 d8888888888 888 888~~ ~ ~~
Y8888P 888 Y8888 Y888888 888 888 d88P 888 888 888~~
// \\
||========================================================================||
𝓢𝓮𝓬𝓾𝓻𝓮 𝓭𝓮𝓵𝓮𝓽𝓮 𝔂𝓸𝓾𝓻 𝓽𝓮𝓶𝓹, 𝓽𝓻𝓪𝓼𝓱 𝓪𝓷𝓭 𝓯𝓻𝓮𝓮 𝓭𝓲𝓼𝓴 𝓼𝓹𝓪𝓬𝓮 ||
===========================================================================
𝒞𝓇𝑒𝒶𝓉𝑒𝒹 𝐵𝓎 𝒞𝓇𝒾𝓈𝓉𝒾𝒶𝓃 𝒞. 𝑀𝑜𝒾𝓈és
--------------------------------------\033[0m"
day=$(date +%A)
User=$(whoami)
now=$(date +"%T")
echo -e " \e[1;37m ||\e[0m\033[6m Today is : $day\033[0m\e[1;37m|\e[0m\e[1;37m || Time: $now ||\e[0m \033[6m User Is : $User\033[0m\e[1;37m ||\e[0m"
echo "----------------------------------------------------------------------"
echo "|| 𝓢𝓲𝔃𝓮 𝓸𝓯 𝓕𝓲𝓵𝓮𝓼 ||"
echo "----------------------------------------------------------------------"
du -h --max-depth=1 /tmp/ /var/log/ /var/cache/ ~/.cache/
echo "----------------------------------------------------------------------"
echo "|| 𝓒𝓵𝓮𝓪𝓷𝓲𝓷𝓰 ||"
echo "----------------------------------------------------------------------"
cd /
rm -rfv ~/var/log/*
rm -rfv ~/var/cache/*
rm -rfv ~/.cache/*
rm -rfv ~/tmp/*
rm -rfv ~/usr/src/tmp/*
rm -rfv ~/.bash_history
rm -rfv /zero.yes /zero.file
echo " "
echo "----------------------------------------------------------------------"
echo "|| 𝓒𝓵𝓮𝓪𝓷𝓲𝓷𝓰 𝓕𝓻𝓮𝓮 𝓤𝓹 𝓢𝓹𝓪𝓬𝓮 ||"
echo "----------------------------------------------------------------------"
dd if=/dev/zero of=zero.small.file bs=1024 count=102400
shred -z zero.small.file
cat /dev/zero > zero.file
sync
rm zero.small.file
shred -z zero.file
sync
rm zero.file
echo "----------------------------------------------------------------------"
echo "|| 𝟙𝟘𝟘% 𝓒𝓵𝓮𝓪𝓷 ||"
echo "---------------------------------------------------------------------"
exit 0

39
download/clearner.sh Normal file
View File

@ -0,0 +1,39 @@
echo -e "
\033[1;32m
.d8888b. 888 d8888 888 888~~~
d88P Y88b 888 d88888 888 888~~~~~
888 888 888 d88P888 888 888~~~~~~~
888 888 .d88b. 8888b. 88888b. d88P 888 888 888~ ~ ~~~~~~
888 888 d8P Y8b 88b 888 88b d88P 888 888 888~~~~ ~~~~~~
888 888 888 88888888 .d888888 888 888 d88P 888 888 888~~~~~~~~
Y88b d88P 888 Y8b. 888 888 888 888 d8888888888 888 888~~ ~ ~~
Y8888P 888 Y8888 Y888888 888 888 d88P 888 888 888~~
// \\
||========================================================================||
𝓢𝓮𝓬𝓾𝓻𝓮 𝓭𝓮𝓵𝓮𝓽𝓮 𝔂𝓸𝓾𝓻 𝓽𝓮𝓶𝓹, 𝓽𝓻𝓪𝓼𝓱 𝓪𝓷𝓭 𝓯𝓻𝓮𝓮 𝓭𝓲𝓼𝓴 𝓼𝓹𝓪𝓬𝓮 ||
===========================================================================
𝒞𝓇𝑒𝒶𝓉𝑒𝒹 𝐵𝓎 𝒞𝓇𝒾𝓈𝓉𝒾𝒶𝓃 𝒞. 𝑀𝑜𝒾𝓈és
--------------------------------------\033[0m"
day=$(date +%A)
User=$(whoami)
now=$(date +"%T")
echo -e " \e[1;37m ||\e[0m\033[6m Today is : $day\033[0m\e[1;37m|\e[0m\e[1;37m || Time: $now ||\e[0m \033[6m User Is : $User\033[0m\e[1;37m ||\e[0m"
echo "----------------------------------------------------------------------"
echo "|| 𝓢𝓲𝔃𝓮 𝓸𝓯 𝓕𝓲𝓵𝓮𝓼 ||"
echo "----------------------------------------------------------------------"
du -h --max-depth=1 /tmp/ /var/log/ /var/cache/ ~/.cache/
echo "----------------------------------------------------------------------"
echo "|| 𝓒𝓵𝓮𝓪𝓷𝓲𝓷𝓰 ||"
echo "----------------------------------------------------------------------"
cd /
rm -rfv ~/var/log/*
rm -rfv ~/var/cache/*
rm -rfv ~/.cache/*
rm -rfv ~/tmp/*
rm -rfv ~/usr/src/tmp/*
rm -rfv ~/.bash_history
echo " "
echo "----------------------------------------------------------------------"
echo "|| 𝟙𝟘𝟘% 𝓒𝓵𝓮𝓪𝓷 ||"
echo "---------------------------------------------------------------------"
exit 0

39
download/enp6s0.sh Normal file
View File

@ -0,0 +1,39 @@
#!/bin/bash
echo -e " *\033[1;32m
██████ ██▓███ ▒█████ ▒█████ █████▒ ███▄ ▄███▓ ▄▄▄ ▄████▄ ▄▄▄ ▓█████▄ ▓█████▄ ██▀███ ▓█████ ██████ ██████
▒██ ▒ ▓██░ ██▒▒██▒ ██▒▒██▒ ██▒▓██ ▒ ▓██▒▀█▀ ██▒▒████▄ ▒██▀ ▀█ ▒████▄ ▒██▀ ██▌▒██▀ ██▌▓██ ▒ ██▒▓█ ▀ ▒██ ▒ ▒██ ▒
░ ▓██▄ ▓██░ ██▓▒▒██░ ██▒▒██░ ██▒▒████ ░ ▓██ ▓██░▒██ ▀█▄ ▒▓█ ▄ ▒██ ▀█▄ ░██ █▌░██ █▌▓██ ░▄█ ▒▒███ ░ ▓██▄ ░ ▓██▄
▒ ██▒▒██▄█▓▒ ▒▒██ ██░▒██ ██░░▓█▒ ░ ▒██ ▒██ ░██▄▄▄▄██ ▒▓▓▄ ▄██▒ ░██▄▄▄▄██ ░▓█▄ ▌░▓█▄ ▌▒██▀▀█▄ ▒▓█ ▄ ▒ ██▒ ▒ ██▒
▒██████▒▒▒██▒ ░ ░░ ████▓▒░░ ████▓▒░░▒█░ ▒██▒ ░██▒ ▓█ ▓██▒▒ ▓███▀ ░ ▓█ ▓██▒░▒████▓ ░▒████▓ ░██▓ ▒██▒░▒████▒▒██████▒▒▒██████▒▒
▒ ▒▓▒ ▒ ░▒▓▒░ ░ ░░ ▒░▒░▒░ ░ ▒░▒░▒░ ▒ ░ ░ ▒░ ░ ░ ▒▒ ▓▒█░░ ░▒ ▒ ░ ▒▒ ▓▒█░ ▒▒▓ ▒ ▒▒▓ ▒ ░ ▒▓ ░▒▓░░░ ▒░ ░▒ ▒▓▒ ▒ ░▒ ▒▓▒ ▒ ░
░ ░▒ ░ ░░▒ ░ ░ ▒ ▒░ ░ ▒ ▒░ ░ ░ ░ ░ ▒ ▒▒ ░ ░ ▒ ▒ ▒▒ ░ ░ ▒ ▒ ░ ▒ ▒ ░▒ ░ ▒░ ░ ░ ░░ ░▒ ░ ░░ ░▒ ░ ░
░ ░ ░ ░░ ░ ░ ░ ▒ ░ ░ ░ ▒ ░ ░ ░ ░ ░ ▒ ░ ░ ▒ ░ ░ ░ ░ ░ ░ ░░ ░ ░ ░ ░ ░ ░ ░ ░
░ ░ ░ ░ ░ ░ ░ ░░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░
░ ░ ░
\033[0m*"
echo -e " \e[1;31m *---------------------* \e[0m"
printf " \e[1;31m|\e[0m \033[1;32mWelcome Hacker\033[0m \e[1;31m|\e[0m\n"
printf " \e[1;31m|\e[0m\033[1;32m Keep Safe! \033[0m\e[1;31m|\e[0m\n"
echo -e " \e[1;31m *---------------------*\e[0m"
printf " \e[1;31m/ \ \e[0m \n"
printf " \e[1;31m/ \ \e[0m \n"
day=$(date +%A)
User=$(whoami)
echo -e " \e[1;37m ------------------ ----------------\e[0m"
echo -e " \e[1;37m|\e[0m\033[6mToday is : $day\033[0m\e[1;37m|\e[0m\e[1;37m |\e[0m \033[6mUser Is : $User\033[0m\e[1;37m |\e[0m"
echo -e " \e[1;37m ------------------ ----------------\e[0m"
echo -e " *_____________________*"
echo -e " |\033[1;32mYour Wifi Mac-Address\033[0m|"
echo "*----------------------*---------------------*"
ifconfig enp6s0 down
macchanger -r enp6s0
echo "*--------------------------------------------*"
echo " *_________________________*"
echo -e " |\033[1;32mYour Ethernet Mac-Address\033[0m|"
echo "*---------------------*-------------------------*"
macchanger -r enp6s0
ifconfig enp6s0 up
echo "*-----------------------------------------------*"
echo -e " *\033[1;32m 🅷🅰🆅🅴 🅰 🅽🅸🅲🅴 🅳🅰🆈! \033[0m*"
echo -e " *\033[1;32mType macchanger --show wlan0 OR macchanger --show enp6s0\033[0m*"

39
download/eth0.sh Normal file
View File

@ -0,0 +1,39 @@
#!/bin/bash
echo -e " *\033[1;32m
██████ ██▓███ ▒█████ ▒█████ █████▒ ███▄ ▄███▓ ▄▄▄ ▄████▄ ▄▄▄ ▓█████▄ ▓█████▄ ██▀███ ▓█████ ██████ ██████
▒██ ▒ ▓██░ ██▒▒██▒ ██▒▒██▒ ██▒▓██ ▒ ▓██▒▀█▀ ██▒▒████▄ ▒██▀ ▀█ ▒████▄ ▒██▀ ██▌▒██▀ ██▌▓██ ▒ ██▒▓█ ▀ ▒██ ▒ ▒██ ▒
░ ▓██▄ ▓██░ ██▓▒▒██░ ██▒▒██░ ██▒▒████ ░ ▓██ ▓██░▒██ ▀█▄ ▒▓█ ▄ ▒██ ▀█▄ ░██ █▌░██ █▌▓██ ░▄█ ▒▒███ ░ ▓██▄ ░ ▓██▄
▒ ██▒▒██▄█▓▒ ▒▒██ ██░▒██ ██░░▓█▒ ░ ▒██ ▒██ ░██▄▄▄▄██ ▒▓▓▄ ▄██▒ ░██▄▄▄▄██ ░▓█▄ ▌░▓█▄ ▌▒██▀▀█▄ ▒▓█ ▄ ▒ ██▒ ▒ ██▒
▒██████▒▒▒██▒ ░ ░░ ████▓▒░░ ████▓▒░░▒█░ ▒██▒ ░██▒ ▓█ ▓██▒▒ ▓███▀ ░ ▓█ ▓██▒░▒████▓ ░▒████▓ ░██▓ ▒██▒░▒████▒▒██████▒▒▒██████▒▒
▒ ▒▓▒ ▒ ░▒▓▒░ ░ ░░ ▒░▒░▒░ ░ ▒░▒░▒░ ▒ ░ ░ ▒░ ░ ░ ▒▒ ▓▒█░░ ░▒ ▒ ░ ▒▒ ▓▒█░ ▒▒▓ ▒ ▒▒▓ ▒ ░ ▒▓ ░▒▓░░░ ▒░ ░▒ ▒▓▒ ▒ ░▒ ▒▓▒ ▒ ░
░ ░▒ ░ ░░▒ ░ ░ ▒ ▒░ ░ ▒ ▒░ ░ ░ ░ ░ ▒ ▒▒ ░ ░ ▒ ▒ ▒▒ ░ ░ ▒ ▒ ░ ▒ ▒ ░▒ ░ ▒░ ░ ░ ░░ ░▒ ░ ░░ ░▒ ░ ░
░ ░ ░ ░░ ░ ░ ░ ▒ ░ ░ ░ ▒ ░ ░ ░ ░ ░ ▒ ░ ░ ▒ ░ ░ ░ ░ ░ ░ ░░ ░ ░ ░ ░ ░ ░ ░ ░
░ ░ ░ ░ ░ ░ ░ ░░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░
░ ░ ░
\033[0m*"
echo -e " \e[1;31m *---------------------* \e[0m"
printf " \e[1;31m|\e[0m \033[1;32mWelcome Hacker\033[0m \e[1;31m|\e[0m\n"
printf " \e[1;31m|\e[0m\033[1;32m Keep Safe! \033[0m\e[1;31m|\e[0m\n"
echo -e " \e[1;31m *---------------------*\e[0m"
printf " \e[1;31m/ \ \e[0m \n"
printf " \e[1;31m/ \ \e[0m \n"
day=$(date +%A)
User=$(whoami)
echo -e " \e[1;37m ------------------ ----------------\e[0m"
echo -e " \e[1;37m|\e[0m\033[6mToday is : $day\033[0m\e[1;37m|\e[0m\e[1;37m |\e[0m \033[6mUser Is : $User\033[0m\e[1;37m |\e[0m"
echo -e " \e[1;37m ------------------ ----------------\e[0m"
echo -e " *_____________________*"
echo -e " |\033[1;32mYour Wifi Mac-Address\033[0m|"
echo "*----------------------*---------------------*"
ifconfig eth0 down
macchanger -r eth0
echo "*--------------------------------------------*"
echo " *_________________________*"
echo -e " |\033[1;32mYour Ethernet Mac-Address\033[0m|"
echo "*---------------------*-------------------------*"
macchanger -r eth0
ifconfig eth0 up
echo "*-----------------------------------------------*"
echo -e " *\033[1;32m 🅷🅰🆅🅴 🅰 🅽🅸🅲🅴 🅳🅰🆈! \033[0m*"
echo -e " *\033[1;32mType macchanger --show wlan0 OR macchanger --show eth0 \033[0m*"

1
download/exherbo.sh Normal file
View File

@ -0,0 +1 @@
docker pull exherbo/exherbo-x86_64-pc-linux-gnu-base

1
download/fedora.sh Normal file
View File

@ -0,0 +1 @@
docker pull fedora

8
download/gorilazadah.ps1 Normal file
View File

@ -0,0 +1,8 @@
Set-ExecutionPolicy Bypass -Scope Process -Force; [System.Net.ServicePointManager]::SecurityProtocol = [System.Net.ServicePointManager]::SecurityProtocol -bor 3072; iex ((New-Object System.Net.WebClient).DownloadString('https://chocolatey.org/install.ps1'))
choco feature enable -n=allowGlobalConfirmation
choco feature enable -n useFipsCompliantChecksums
choco upgrade all
choco install pswindowsupdate
Add-WUServiceManager -ServiceID 7971f918-a847-4430-9279-4a52d1efe18d -Confirm:$false
Install-WindowsUpdate -MicrosoftUpdate -AcceptAll
Get-WuInstall -AcceptAll -IgnoreReboot

1
download/kali.sh Normal file
View File

@ -0,0 +1 @@
docker pull kalilinux/kali-bleeding-edge

39
download/macchanger.sh Normal file
View File

@ -0,0 +1,39 @@
#!/bin/bash
echo -e " *\033[1;32m
██████ ██▓███ ▒█████ ▒█████ █████▒ ███▄ ▄███▓ ▄▄▄ ▄████▄ ▄▄▄ ▓█████▄ ▓█████▄ ██▀███ ▓█████ ██████ ██████
▒██ ▒ ▓██░ ██▒▒██▒ ██▒▒██▒ ██▒▓██ ▒ ▓██▒▀█▀ ██▒▒████▄ ▒██▀ ▀█ ▒████▄ ▒██▀ ██▌▒██▀ ██▌▓██ ▒ ██▒▓█ ▀ ▒██ ▒ ▒██ ▒
░ ▓██▄ ▓██░ ██▓▒▒██░ ██▒▒██░ ██▒▒████ ░ ▓██ ▓██░▒██ ▀█▄ ▒▓█ ▄ ▒██ ▀█▄ ░██ █▌░██ █▌▓██ ░▄█ ▒▒███ ░ ▓██▄ ░ ▓██▄
▒ ██▒▒██▄█▓▒ ▒▒██ ██░▒██ ██░░▓█▒ ░ ▒██ ▒██ ░██▄▄▄▄██ ▒▓▓▄ ▄██▒ ░██▄▄▄▄██ ░▓█▄ ▌░▓█▄ ▌▒██▀▀█▄ ▒▓█ ▄ ▒ ██▒ ▒ ██▒
▒██████▒▒▒██▒ ░ ░░ ████▓▒░░ ████▓▒░░▒█░ ▒██▒ ░██▒ ▓█ ▓██▒▒ ▓███▀ ░ ▓█ ▓██▒░▒████▓ ░▒████▓ ░██▓ ▒██▒░▒████▒▒██████▒▒▒██████▒▒
▒ ▒▓▒ ▒ ░▒▓▒░ ░ ░░ ▒░▒░▒░ ░ ▒░▒░▒░ ▒ ░ ░ ▒░ ░ ░ ▒▒ ▓▒█░░ ░▒ ▒ ░ ▒▒ ▓▒█░ ▒▒▓ ▒ ▒▒▓ ▒ ░ ▒▓ ░▒▓░░░ ▒░ ░▒ ▒▓▒ ▒ ░▒ ▒▓▒ ▒ ░
░ ░▒ ░ ░░▒ ░ ░ ▒ ▒░ ░ ▒ ▒░ ░ ░ ░ ░ ▒ ▒▒ ░ ░ ▒ ▒ ▒▒ ░ ░ ▒ ▒ ░ ▒ ▒ ░▒ ░ ▒░ ░ ░ ░░ ░▒ ░ ░░ ░▒ ░ ░
░ ░ ░ ░░ ░ ░ ░ ▒ ░ ░ ░ ▒ ░ ░ ░ ░ ░ ▒ ░ ░ ▒ ░ ░ ░ ░ ░ ░ ░░ ░ ░ ░ ░ ░ ░ ░ ░
░ ░ ░ ░ ░ ░ ░ ░░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░
░ ░ ░
\033[0m*"
echo -e " \e[1;31m *---------------------* \e[0m"
printf " \e[1;31m|\e[0m \033[1;32mWelcome Hacker\033[0m \e[1;31m|\e[0m\n"
printf " \e[1;31m|\e[0m\033[1;32m Keep Safe! \033[0m\e[1;31m|\e[0m\n"
echo -e " \e[1;31m *---------------------*\e[0m"
printf " \e[1;31m/ \ \e[0m \n"
printf " \e[1;31m/ \ \e[0m \n"
day=$(date +%A)
User=$(whoami)
echo -e " \e[1;37m ------------------ ----------------\e[0m"
echo -e " \e[1;37m|\e[0m\033[6mToday is : $day\033[0m\e[1;37m|\e[0m\e[1;37m |\e[0m \033[6mUser Is : $User\033[0m\e[1;37m |\e[0m"
echo -e " \e[1;37m ------------------ ----------------\e[0m"
echo -e " *_____________________*"
echo -e " |\033[1;32mYour Wifi Mac-Address\033[0m|"
echo "*----------------------*---------------------*"
ifconfig wlan0 down
macchanger -r wlan0
echo "*--------------------------------------------*"
echo " *_________________________*"
echo -e " |\033[1;32mYour Ethernet Mac-Address\033[0m|"
echo "*---------------------*-------------------------*"
macchanger -r wlan0
ifconfig wlan0 up
echo "*-----------------------------------------------*"
echo -e " *\033[1;32m 🅷🅰🆅🅴 🅰 🅽🅸🅲🅴 🅳🅰🆈! \033[0m*"
echo -e " *\033[1;32mType macchanger --show wlan0 OR macchanger --show eth0\033[0m*"

51
download/paranoid.sh Normal file
View File

@ -0,0 +1,51 @@
echo -e "
\033[1;32m
.d8888b. 888 d8888 888 888~~~
d88P Y88b 888 d88888 888 888~~~~~
888 888 888 d88P888 888 888~~~~~~~
888 888 .d88b. 8888b. 88888b. d88P 888 888 888~ ~ ~~~~~~
888 888 d8P Y8b 88b 888 88b d88P 888 888 888~~~~ ~~~~~~
888 888 888 88888888 .d888888 888 888 d88P 888 888 888~~~~~~~~
Y88b d88P 888 Y8b. 888 888 888 888 d8888888888 888 888~~ ~ ~~
Y8888P 888 Y8888 Y888888 888 888 d88P 888 888 888~~
// \\
||========================================================================||
𝓢𝓮𝓬𝓾𝓻𝓮 𝓭𝓮𝓵𝓮𝓽𝓮 𝔂𝓸𝓾𝓻 𝓽𝓮𝓶𝓹, 𝓽𝓻𝓪𝓼𝓱 𝓪𝓷𝓭 𝓯𝓻𝓮𝓮 𝓭𝓲𝓼𝓴 𝓼𝓹𝓪𝓬𝓮 ||
===========================================================================
𝒞𝓇𝑒𝒶𝓉𝑒𝒹 𝐵𝓎 𝒞𝓇𝒾𝓈𝓉𝒾𝒶𝓃 𝒞. 𝑀𝑜𝒾𝓈és
--------------------------------------\033[0m"
day=$(date +%A)
User=$(whoami)
now=$(date +"%T")
echo -e " \e[1;37m ||\e[0m\033[6m Today is : $day\033[0m\e[1;37m|\e[0m\e[1;37m || Time: $now ||\e[0m \033[6m User Is : $User\033[0m\e[1;37m ||\e[0m"
echo "----------------------------------------------------------------------"
echo "|| 𝓢𝓲𝔃𝓮 𝓸𝓯 𝓕𝓲𝓵𝓮𝓼 ||"
echo "----------------------------------------------------------------------"
du -h --max-depth=1 /tmp/ /var/log/ /var/cache/ ~/.cache/
echo "----------------------------------------------------------------------"
echo "|| 𝓒𝓵𝓮𝓪𝓷𝓲𝓷𝓰 ||"
echo "----------------------------------------------------------------------"
cd /
rm -rfv ~/var/log/*
rm -rfv ~/var/cache/*
rm -rfv ~/.cache/*
rm -rfv ~/tmp/*
rm -rfv ~/usr/src/tmp/*
rm -rfv ~/.bash_history
rm -rfv /zero.yes /zero.file
echo " "
echo "----------------------------------------------------------------------"
echo "|| 𝓒𝓵𝓮𝓪𝓷𝓲𝓷𝓰 𝓕𝓻𝓮𝓮 𝓤𝓹 𝓢𝓹𝓪𝓬𝓮 ||"
echo "----------------------------------------------------------------------"
dd if=/dev/urandom of=zero.small.file bs=1024 count=102400
shred -z zero.small.file
cat /dev/urandom > zero.file
sync
rm zero.small.file
shred -z zero.file
sync
rm zero.file
echo "----------------------------------------------------------------------"
echo "|| 𝟙𝟘𝟘% 𝓒𝓵𝓮𝓪𝓷 ||"
echo "---------------------------------------------------------------------"
exit 0

5
download/torando.sh Normal file
View File

@ -0,0 +1,5 @@
sudo iptables -t nat -A OUTPUT -p tcp -m owner --uid-owner USERAQUI -m tcp -j REDIRECT --to-ports 9040
sudo iptables -t nat -A OUTPUT -p udp -m owner --uid-owner USERAQUI -m udp --dport 53 -j REDIRECT --to-ports 53
sudo iptables -t filter -A OUTPUT -p tcp -m owner --uid-owner USERAQUI -m tcp --dport 9040 -j ACCEPT
sudo iptables -t filter -A OUTPUT -p udp -m owner --uid-owner USERAQUI -m udp --dport 53 -j ACCEPT
sudo iptables -t filter -A OUTPUT -m owner --uid-owner USERAQUI -j DROP

5
download/toroff.sh Normal file
View File

@ -0,0 +1,5 @@
sudo iptables -t nat -D OUTPUT -p tcp -m owner --uid-owner USERAQUI -m tcp -j REDIRECT --to-ports 9040
sudo iptables -t nat -D OUTPUT -p udp -m owner --uid-owner USERAQUI -m udp --dport 53 -j REDIRECT --to-ports 53
sudo iptables -t filter -D OUTPUT -p tcp -m owner --uid-owner USERAQUI -m tcp --dport 9040 -j ACCEPT
sudo iptables -t filter -D OUTPUT -p udp -m owner --uid-owner USERAQUI -m udp --dport 53 -j ACCEPT
sudo iptables -t filter -D OUTPUT -m owner --uid-owner USERAQUI -j DROP

BIN
download/vncrevolver.zip Normal file

Binary file not shown.

1
download/void.sh Normal file
View File

@ -0,0 +1 @@
docker pull voidlinux/voidlinux

View File

@ -25,14 +25,14 @@
(define home-page
(static-page
"Home"
"https://cristiancmoises.github.io/site/index.html"
"/index.html"
`(,(centered-image "images/mainframe_256x256.gif"))))
;; Static "About" page
(define about-page
(static-page
"About"
"https://cristiancmoises.github.io/site/about.html"
"/about.html"
`((h1 "About")
(p "This is the personal website of Cristian Cezar Moisés."
" I am a student. (Pronouns: "
@ -76,16 +76,16 @@
(br)
(h2 "Return "
,(link* "Home"
"https://cristiancmoises.github.io/site/")
"/")
"?"))))
;; Collection of miscellaneous posts
(define %misc
`(("Recent Posts" "https://cristiancmoises.github.io/site/misc.html" ,misc-posts)))
;; Collection of projects posts
(define %projects
`(("Recent Posts" "/projects.html" ,projects-posts)))
;; Collection of research-related posts
(define %research
`(("Published Work" "https://cristiancmoises.github.io/site/research.html" ,research-posts)))
`(("Published Work" "/research.html" ,research-posts)))
;; Build site
(site #:title
@ -97,10 +97,11 @@
#:readers
(list commonmark-reader*)
#:builders
(list (blog #:theme default-theme #:collections %misc)
(list (blog #:theme default-theme #:collections %projects)
(blog #:theme default-theme #:collections %research)
home-page
about-page
not-found
(static-directory "css")
(static-directory "download")
(static-directory "images")))

BIN
images/anon.gif Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 2.2 MiB

BIN
images/brute.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 105 KiB

BIN
images/clean.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 35 KiB

BIN
images/dark.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 138 KiB

BIN
images/dockervm.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 208 KiB

BIN
images/faster1.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 57 KiB

BIN
images/faster2.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 32 KiB

BIN
images/faster3.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 55 KiB

BIN
images/faster4.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 33 KiB

BIN
images/go.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 216 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 2.6 MiB

BIN
images/mask.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 119 KiB

BIN
images/open.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 383 KiB

BIN
images/open1.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 198 KiB

BIN
images/open2.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 92 KiB

BIN
images/paranoid.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 126 KiB

BIN
images/profile.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 69 KiB

BIN
images/revolver.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 305 KiB

BIN
images/snow.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 27 KiB

BIN
images/st.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 98 KiB

BIN
images/steg.gif Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 317 KiB

BIN
images/steghide.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 48 KiB

BIN
images/stegoshare.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 12 KiB

BIN
images/stegroute.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 71 KiB

BIN
images/tor.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 27 KiB

BIN
images/torando.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 329 KiB

69
posts/brute.md Normal file
View File

@ -0,0 +1,69 @@
title:💪 Brutefox
date: 2024-02-15 23:00
tags: projects
summary: Firefox with steroids
---
Firefox with steroids
---
#### 💬 Tutorial on Youtube [here](https://www.youtube.com/embed/FlC7b2z4kHQ)
🇧🇷 Para o tutorial em português clique [aqui](https://github.com/cristiancmoises/brutefox/blob/main/LEIA-ME.md)
![brute](/images/brute.png)
> ### START FIREFOX AND DIGIT IN THE SEARCH BOX:
about:config
_*Then press enter_
> ### Paste the command and search, then change the value:
network.http.pipelining |True
network.http.pipelining.maxrequests |32
network.http.proxy.pipelining |True
network.dns.disableIPv6 |True
plugin.expose_full_path |True
nglayout.initialpaint.delay |0
content.notify.backoffcount |5
ui.submenuDelay |0
browser.cache.memory.capacity |32768
layout.spellcheckDefault |2
browser.download.animateNotifications|False
security.dialog_enable_delay |0
network.prefetch-next |False
browser.newtabpage.activity-stream.feeds.telemetry |False
browser.newtabpage.activity-stream.telemetry |False
browser.ping-centre.telemetry |False
toolkit.telemetry.archive.enabled |False
toolkit.telemetry.bhrPing.enabled |False
toolkit.telemetry.enabled |False
toolkit.telemetry.firstShutdownPing.enabled |False
toolkit.telemetry.hybridContent.enabled |False
toolkit.telemetry.newProfilePing.enabled |False
toolkit.telemetry.reportingpolicy.firstRun |False
toolkit.telemetry.shutdownPingSender.enabled |False
toolkit.telemetry.unified |False
toolkit.telemetry.updatePing.enabled |False
reader.parse-on-load.enabled |False
reader.parse-on-load.force-enabled |False
browser.pocket.enabled |False
loop.enabled |False
### INSTALL SOME ADDONS TO INCREASE THE SECURITY:
![image](https://github.com/cristiancmoises/brutefox/assets/86272521/f93b99c3-b7dc-40a8-8a80-9eb7bc007fe5)
[Ublock](https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/)
![image](https://github.com/cristiancmoises/brutefox/assets/86272521/f9c52e17-b859-4318-80a0-8d45f26da806)
[PrivacyBadger](https://addons.mozilla.org/en-US/firefox/addon/privacy-badger17/)
![image](https://github.com/cristiancmoises/brutefox/assets/86272521/dccd79b3-c58b-404e-a30b-deba0b8abeab)
[CanvasBlocker](https://addons.mozilla.org/en-US/firefox/addon/canvasblocker/)
![image](https://github.com/cristiancmoises/brutefox/assets/86272521/cfb0b18a-bd20-4754-ad88-72ee4cd48d2c)
[BrowSec](https://addons.mozilla.org/en-US/firefox/addon/browsec/)
____________________________________________________________________
### FOR PARANOIDS:
![image](https://github.com/cristiancmoises/brutefox/assets/86272521/e6aa98fd-6dc8-4a2f-abe5-79f822e131f5)
[NOScript](https://addons.mozilla.org/en-US/firefox/addon/noscript/)
![image](https://github.com/cristiancmoises/brutefox/assets/86272521/724a9ca5-3943-4441-8dcb-3e344a1242b8)
[LibreJS](https://ftp.gnu.org/gnu/librejs/librejs-7.21.0.xpi)
______________________________________________________________________
### BONUS - A TRUE DARK BROWSER
![image](https://github.com/cristiancmoises/brutefox/assets/86272521/db293502-20d8-45ea-be6b-c417f6160371)
[AmoledTheme](https://addons.mozilla.org/en-US/firefox/addon/all-back-no-highlight/)
![image](https://github.com/cristiancmoises/brutefox/assets/86272521/2fcb5977-8270-48cd-9307-f363ee0bdbc3)
[DarkBG](https://addons.mozilla.org/en-US/firefox/addon/dark-background-light-text/)
_______________________________________________________________________

30
posts/clean.md Normal file
View File

@ -0,0 +1,30 @@
title: 🧹 Clean All
date: 2024-02-10 19:00
tags: projects
summary: Secure delete trash, temp and free space
---
Secure delete trash, temp and free space
---
![clean](/images/clean.png)
# DOWNLOAD
## [clearner.sh](/download/clearner.sh)
## [cleanall.sh](/download/cleanall.sh)
## [paranoid.sh](/download/paranoid.sh)
### <> HOW IT WORKS: </>
- Download the cleanall.sh;
- Permission: chmod +x cleanall.sh
- Then run ./cleanall.sh
#### <> Versions: </>
- cleanall.sh (Clean all + Free Disk Space [fastly])
- cleaner.sh (Fast clean, dont clean free disk space)
- paranoid.sh (Clean all + Free Disk Space with urandom)
_______________________________________________________
If you want run it in reboot:
- crontab -e
- @reboot /home/Download/cleanall.sh
> Have a nice day! :)

48
posts/dockervm.md Normal file
View File

@ -0,0 +1,48 @@
title:📦 DockerVM
date: 2024-02-18 00:00
tags: projects
summary: Use docker like Qemu/VmWare/VirtualBox
---
Use docker like Qemu/VmWare/Virtualbox
---
![dockervm](/images/dockervm.png)
### [Exherbo](/download/exherbo.sh)
### [Fedora](/download/fedora.sh)
### [Kali](/download/kali.sh)
### [Void](/download/void.sh)
### ACCESS THE SYSTEM IN THE CONTAINER
docker run -it IMAGE_ID_HERE /bin/bash
### START ALL STOPPED CONTAINERS
docker start $(docker ps -a -q --filter "status=exited")
### RUN THE LAST STOPPED CONTAINER:
docker start -a -i 'docker ps -q -l'
### LIST ALL IMAGES
docker images
### LIST ALL CONTAINERS
docker ps -a
### RE-ACCESS THE SYSTEMS
docker exec -it CONTAINER_ID_HERE /bin/bash
# NOVNC
### GRAPHICAL INTERFACE
apt install xfce-desktop xorg -y
### CONFIGURE A PASSWORD FOR ROOT ON KALI
passwd
### FIREWALL - HOST CONFIG
iptables -A INPUT -i docker0 -j ACCEPT
### CONFIG FOR KALI LINUX
apt update && apt upgrade && apt install novnc x11vnc tigervnc-standalone-server dbus-x11 python-py python3-pip -y
### NUMPY INSTALL
user > pip install numpy
user > pip3 install numpy
### START DBUS
dbus-launch
### START VNCSERVER
vncserver
### START NOVNC
/usr/share/novnc/utils/novnc_proxy --listen 8081 --vnc localhost:5900
### ACESS VIA BROWSER
CONTAINER_IP:8081/vnc.html
### FIX SOME HOSTNAME BUGS
echo $(hostname -I | cut -d\ -f1) $(hostname) | sudo tee -a /etc/hosts

49
posts/fasteros.md Normal file
View File

@ -0,0 +1,49 @@
title: Faster⚡OS
date: 2024-02-13 23:00
tags: projects
summary: My Web Operating System
---
My Web Operating System
---
### Free.
A web operating system for you!
### Easy.
Just click [here](https://fasteros.vercel.app) and visit now.
For the android app click[here](https://play.google.com/store/apps/details/FasterOS?id=com.faster.os)
## Screenshots
![faster1](/images/faster1.png)
![faster2](/images/faster2.png)
![faster3](/images/faster3.png)
![faster4](/images/faster4.png)
## Description
All files are running on your local computer. Convert, play music, and more with this.
FasterOS is a web operating system created for help users in daily tasks and for help security enthusiasts and students.
#### 🖥️ Run linux systems
#### ⤴️ Upload files
#### 📥 Download files
#### 🌐 Browse in built-in browser
#### 🖼️ Convert images: bmp,gif,png,jpeg,jpg,psd,svg,tiff
#### 🎵 Convert Audio: aac,mp3,ogg,wav
#### 💼 Convert Sheets: xlsx,csv,numbers,ods,xls
#### 🗜️ Compress and extract files
#### 🧠 Learn about: Linux, Windows, Hacking, Data Security and Forensics
#### 💀 The system has a list of tutorials and hacking tools
#### 🔎 Malware list for analysis
#### 🎮 Games and Emulators
### 🛡️ Security:
#### 👉 You can turn off your cell phone so that your settings remain saved in the app
### 🔒 Privacy:
#### 👉 All data is cleared on clicking shutdown
### GOALS:
#### 🧭 Study assistant
#### ⏱️ Speed up the production process
#### 🏆 Help the community
#### 🇧🇷 Official Language

40
posts/gorilazada.md Normal file
View File

@ -0,0 +1,40 @@
title:🦍 Gorilazadah
date: 2024-02-18 23:00
tags: projects
summary: Awesome script for update and clean Windows
---
Awesome Script for Clean and Update your Windows
---
> Para a versão em português clique [🇧🇷](https://github.com/cristiancmoises/gorilazadah/blob/main/LEIA-ME.md)
![go](/images/go.png)
___________________
#### You dont have time for checking windows updates and softwares every time?
### This script is for you!
# Download
## [Gorilazada](/download/gorilazadah.ps1)
## [Clean](/downlaod/clean.bat)
## Usage:
In the windows gui perform the following steps:
1.) Open the Local Group Policy Editor by hitting "Win + R" and typing: **gpedit.msc** followed by **Ctrl + Shift + Enter**.
2.) Navigate to Computer **Configuration\Windows Settings\Scripts (Startup/Shutdown).
3.) In the results pane, double-click Shutdown.
4.) Select the powershell tab
5.) In the Shutdown Properties dialog box, click **Add**.
6.) In the Script Name box, type the path to the script, or click Browse to search **gorilazadah.ps1** in the Netlogon shared folder on the domain controller.
7.) Now add the **clean.bat** into scripts (Configuration\Windows Settings\Scripts)(double-click Shutdown).
All cache are cleaned by the **clean.bat** (Include all temp from Microsoft Teams)
Now all an administrator has to do is reboot the computer to perform windows updates smoothly.
The same steps can be performed in GPO to acomplish the same thing on multiple Windows machines at the same time. **#profit**

19
posts/live.md Normal file
View File

@ -0,0 +1,19 @@
title:🐡 OpenBsd Portfolio
date: 2024-02-15 03:00
tags: projects
summary: OpenBsd Portfolio
---
My OpenBsd Portfolio
---
### Creation
I needed a cool portfolio... so i created [this](https://cristiancezarmoises.vercel.app).
Well. My hacking spirit ever want learn more; then i use threejs and reactjs to create a interative portfolio (check [here](https://interativo.vercel.app)).
But it's not sufficient for me.
After a few months of hard work i finished one of my best creations: A interactive [OpenBSD portfolio](https://live-one.vercel.app) with another two websites(listed above) inside.
# Screenshots
![open](/images/open.png)
![open1](/images/open1.png)
![open2](/images/open2.png)

23
posts/servervm.md Normal file
View File

@ -0,0 +1,23 @@
title: 🖥️ ServerVM
date: 2024-02-16 19:00
tags: projects
summary: Graphical interface for servers using VNC
---
Graphical Interface for Servers with NoVnc
---
apt install novnc psmisc x11vnc tigervnc-standalone-server xterm terminator wget dbus-x11 python-py python3-pip xfce4 xorg -y
# StartVnc Server
tigervncserver -geometry 1366x768 -xstartup /usr/bin/terminator
# Start NOVNC
/usr/share/novnc/utils/launch.sh --listen 8080 --vnc localhost:5901
# Access Your Server:
http://SERVERIP:8080/vnc.html
# Kill the connection:
fuser -k 8080/tcp

50
posts/space.md Normal file
View File

@ -0,0 +1,50 @@
title: 👾 Space Invaders
date: 2024-02-15 19:00
tags: projects
summary: SSH for hacking
---
### Amazing tricks for hacking [SSH]
---
![mask](/images/mask.png)
## POWER UP YOUR SEGFAULT ACCESS WITH SOME TRICKS! LET'S HACK!
### Automation with SSH for Hacking
![tor](/images/tor.png)
#### First steps:
Debian: |
apt update && apt upgrade && apt install sshpass pssh torsocks -y
Fedora:
dnf update && dnf upgrade && dnf install sshpass pssh tor torsocks -y
Gentoo:
emerge sshpass pssh tor torsocks
#### START TOR!
##### SYSTEMD USERS
systemctl enable tor
systemctl start tor
##### OPENRC USERS
rc-service tor enable
rc-service tor start
### Are you prepared? OK... start with this:
torify sshpass -p "segfault" pssh -A -i -H "root@lsd.segfault.net:22" uname -a
### [_Tutorial YouTube_](https://www.youtube.com/embed/OqZiuoV75wQ)
## Do you want go deep? OK...
![dark](/images/dark.png)
## DEEEEEEEEP TUTORIAL...
### [_Tutorial YouTube_](https://youtu.be/fTgD2YGEvrE)
Go to Segfault interactive shell [here](https://shell.segfault.net)
##### When your machine starts, do this:
ssh@lsd.segfault.net
##### Before access complete do this:
ssh@adm.segfault.net
## And repeat to infinity!
![tunnel](https://github.com/cristiancmoises/spaceinvaders/assets/86272521/a4a527f9-b749-476c-b517-480a5f173143)
> # Knowledge is power. Use it.

25
posts/spoof.md Normal file
View File

@ -0,0 +1,25 @@
title:👻 SpoofMac
date: 2024-02-11 23:00
tags: projects
summary: Change mac address
---
Change mac address on reboot
---
![spoof](https://user-images.githubusercontent.com/86272521/158036393-e9df6c24-c152-481a-9c57-f6deee207fd8.png)
# Download
## [SpoofMac](/download/spoofmac.sh)
[eth0](/download/eth0.sh)
[enp6s0](/download/enp6s0)
### <> SPOOF YOUR MAC ADDRESS: </>
- *Install macchanger*;
- First run ifconfig and take your interface name;
- In the script i use: wlan0 (I created the enp6s0 script to enp6s0 interfaces)
- Download the macchanger.sh;
- chmod +x macchanger.sh
- crontab -e
- @reboot /home/Download/macchanger.sh
> Have a nice day! :)

118
posts/stego.md Normal file
View File

@ -0,0 +1,118 @@
title:🕵️ Awesome Steganography
date: 2024-02-16 00:30
tags: projects
summary: Awesome tools for Steganography
---
Awesome Tools for Steganography 🕵️
---
_Para o tutorial em português clique [aqui 🇧🇷](https://github.com/cristiancmoises/awesome-steganography/blob/main/Leia-me.md)_
# Table Of Contents
![st](/images/st.png)
* [`Introduction`](##Steganography?)
* [`Hidden with GUI`](#Stegoshare)
* [`Hidden with TCP`](#Steganoroute)
* [`Low file size`](#Snow)
* [`Popular Tool`](#Steghide)
## Steganography?
> Steganography is the art and science of writing hidden messages in such a way that no-one apart from the sender and intended recipient even realizes there is a hidden message.By contrast, cryptography obscures the meaning of a message, but it does not conceal the fact that there is a message. Today, the term steganography includes the concealment of digital information within computer files. For example, the sender might start with an ordinary-looking image file, then adjust the color of every 100th pixel to correspond to a letter in the alphabet—a change so subtle that someone who isn't actively looking for it is unlikely to notice it.
The larger the cover message is (in data content terms—number of bits) relative to the hidden message, the easier it is to hide the letter.
Stated somewhat more formally, the objective for making steganographic encoding difficult to detect is to ensure that the changes to the carrier (the original signal) due to the injection of the payload (the signal to covertly embed) are visually (and ideally, statistically) negligible; that is to say, the changes are indistinguishable from the noise floor of the carrier.
For this reason, digital pictures (which contain large amounts of data) are used to hide messages on the Internet and on other communication media. For example: a 24-bit bitmap will have 8 bits representing each of the three color values (red, green, and blue) at each pixel. If we consider just the blue there will be 28 different values of blue. The difference between 11111111 and 11111110 in the value for blue intensity is likely to be undetectable by the human eye. Therefore, the least significant bit can be used (more or less undetectably) for something else other than color information. If we do it with the green and the red as well we can get one letter of ASCII text for every three pixels.
# Stegoshare:
![stegoshare](/images/stegoshare.png)
The program uses 3 least significant bits (LSB) for red and blue channels and 2 LSB for the green channel. Using lossless compression (PNG), StegoShare provides about 40% capacity (in the 250Mb images you can hide 100Mb file).
Visually images looks that there are no any files embedded, human eye cannot detect the difference.
128-bit encryption makes detecting hidden file more difficult.
## Features
> Simple and easy to use
> Works on any platform that runs Java
### Running:
apt install wget openjdk-8-jdk openjdk-8-jre
wget http://downloads.sourceforge.net/stegoshare/StegoShare.jar
java -jar StegoShare.jar
### On Gentoo:
emerge openjdk
emerge jre
wget http://downloads.sourceforge.net/stegoshare/StegoShare.jar
java -jar StegoShare.jar
# Steganoroute:
![stegnoroute](/images/stegroute.png)
Is a tool to send steganographed text messages to another computer over the network. The receiver must make a traceroute to the sender using the mtr program (and pressing d once to switch the display mode to the continuous graph).
This tool, the sender, creates several fake hops and makes them answer the ICMP packets (or not) to write the letters one by one on the mtr client screen.
## Features
> It can print upper and lower-case letters.
> It can print in normal or color-inverse mode.
> It can loop forever.
> It should work on your own localhost computer, on your LAN and over the Internet.
> Is uses the Sinclair ZX Spectrum (1982) font.
> You can select the TTL value on demand and therefore 'move' the text up and down the mtr graph.
#### Warning! _You can filter the IP address that should receive the traceroute. If you don't filter it, every traceroute coming out of the server will mysteriously add fake hops to any destination!You can feel the sensation of being MITMed by the top intelligence organizations in the world by using the conspiracy mode!
## Running:
apt install git mtr python3 python-scapy
git clone https://github.com/stratosphereips/steganoroute.git
cd ./steganoroute
iptables -I INPUT -p icmp --icmp-type 8 -j DROP
python3 ./steganoroute.py -i lo -m "MATRIX has You!" -l
mtr -t yourlocalLANip
_*MTR command used to list the message_
### On Gentoo:
emerge mtr
emerge python
emerge scapy
git clone https://github.com/stratosphereips/steganoroute.git
cd ./steganoroute
iptables -I INPUT -p icmp --icmp-type 8 -j DROP
python3 ./steganoroute.py -i lo -m "MATRIX has You!" -l
mtr -t yourlocalLANip
_*MTR command used to list the message_
# Snow:
![Snow](/images/snow.png)
A lightweight tool that uses whitespace and tabs to hide information inside text files. Unlike other steganographic tools, snow does not rely on binary formats to encode secret data. This can be incredibly useful in cases where it is not possible to share large binary files.
## Features
> Produces small files
> Output text can be used on any program that accepts plain text
### Running:
apt install stegsnow
stegsnow -C -m "Encrypted Message Here" -p "angrypassword" infile outfile
stegsnow -C -p "angrypassword" outfile
### On Gentoo:
wget https://darkside.com.au/snow/snow.zip
unzip snow.zip
cd snow
make
cp snow /bin/
snow -C -m "Encrypted Message Here" -p "angrypassword" infile outfile
snow -C -p "angrypassword" outfile
# Steghide
![steghide](/images/steghide.png)
One of the most popular steganographic tools today.
It is a simple command line program that encodes text inside images. Steghide works by creating a random list of bits inside your dummy file and inserts your secret data in between those bits.
## Features
> Quick and easy to use
> Uses checksums to verify the integrity of data
### Running:
apt install steghide
cd steghide
steghide embed -ef topsecretfile.txt -cf photo.jpg -sf photoX.jpg
steghide extract sf photoX.jpg
### On Gentoo:
wget https://ufpr.dl.sourceforge.net/project/steghide/steghide/0.5.1/steghide-0.5.1.zip
cd steghide
./configure
make
make check
make install
steghide embed -ef topsecretfile.txt -cf photo.jpg -sf photoX.jpg
steghide extract sf photoX.jpg
![stego](/images/steg.gif)

89
posts/torando.md Normal file
View File

@ -0,0 +1,89 @@
title:🛡️ Torando
date: 2024-02-17 19:00
tags: projects
summary: Tor VPN on whole system
---
Tor VPN on whole system
---
![torando](/images/torando.png)
🇧🇷 Para o tutorial em português clique [aqui](https://github.com/cristiancmoises/torando/blob/main/LEIA-ME.md)
_____________________________________________
# Download
## [Torando](/download/torando.sh)
## [Toroff](/download/toroff.sh)
## Do you need the tor package to run this. Instal tor first!
> DEBIAN:
apt update && apt upgrade && apt install tor torsocks -y
> GENTOO:
emerge tor torsocks
> ARCH:
pacman tor torsocks -Syu
> OPENSUSE:
zypper install tor torsocks -y
## FIRST STEP - CHANGE THE CONFIG
Clone the repo and open the _torando.sh_ and change USERAQUI for your username.
Do the same on _toroff.sh_
git clone https://github.com/cristiancmoises/torando
cd torando
chmod +x *
nano torando.sh
## EDIT TORRC
nano /etc/tor/torrc
Then paste in the end:
VirtualAddrNetwork 10.192.0.0/10
AutomapHostsOnResolve 1
TransPort 9040
DNSPort 53
## NOW EDIT THE RESOLV.CONF
nano /etc/resolv.conf
## FOR SECURITY
chattr +i /etc/resolv.conf
## THEN REMOVE ALL AND PASTE
nameserver 127.0.0.1
## FIREFOX CONFIG - NO DNS LEAK
_Go to the firefox and digit *about:config* then press enter._
about:config
> #### OK, Now paste the command and search, then change the value:
network.proxy.socks_remote_dns |True
browser.safebrowsing.enabled |True
browser.safebrowsing.malware.enabled |False
## NOW YOU CAN TURN ON THE TORANDO.SH!
cd torando
./torando.sh
## FOR DISABLE
cd torando
./toroff.sh
## BONUS! EDIT YOUR BASHRC/FISH OR WHATEVER...
nano .bashrc
### INCLUDE:
alias torando="./torando.sh"
alias toroff="./offtor.sh"
## THAT'S ALL!
![anon](/images/anon.gif)

93
posts/vnc.md Normal file
View File

@ -0,0 +1,93 @@
title: 💥 VNC Revolver
date: 2024-02-14 19:00
tags: projects
summary: Search for open VNC Servers
---
Search for open VNC servers around the world
---
![vnc](/images/revolver.png)
# DOWNLOAD
## [vncrevolver](/download/vncrevolver.zip)
# Table Of Contents
* [`Dependencies`](#required)
* [`Install`](#install)
* [`Features`](#features)
* [`Usage`](#commands)
## Required:
pip install pydantic
pip install asyncvnc
pip install aiohttp
# Install:
git clone https://github.com/cristiancmoises/vncrevolver
cd vncrevolver
# Features
| Some Features |
|------------------------------------------------------------------------------------|
| 🌎 _Search for many open Vnc Servers around the world_ |
| 📍 _Filter by country_ |
| 🔢 _List more than one_ |
| 🖥️ _List by Client name_ |
| ✅ _Checks them for vulnerabilities by rebooting the machine via Ctrl+ALT+DEL, obtaining root access through the operating system bootloader easyly._ |
# Commands
## BASIC:
python -m vncrevolver
## DEEP SEARCH:
python -m vncrevolver --clientname ubuntu --count 10
## CTRL + ALT + DEL | CHECK
python -m vncrevolver --clientname ubuntu --count 10 --check_crt_alt_del
## CHECK A SPECIFIC ADDRESS:
python -m vncrevolver --check_crt_alt_del 123.12.1.23:5901
> # START ME UP!
$ python -m vncrevolver --help
usage: vncrevolver [-h] [--clientname CLIENTNAME] [--country COUNTRY] [--asn ASN] [--count COUNT] [--check_crt_alt_del [CHECK_CRT_ALT_DEL]] [--show_failed] [--screen_delay SCREEN_DELAY]
optional arguments:
-h, --help show this help message and exit
--clientname CLIENTNAME
Filter by client name, note that it is case-sensitive!
--country COUNTRY Filter by ISO 3166-1 alpha-2 country code
--asn ASN Filter by ASN
--count COUNT Number of VNCs to find
--check_crt_alt_del [CHECK_CRT_ALT_DEL]
If you specify this parameter without a value, only those VNCs from the search that pass the ctrl_alt_del check will be returned. If a value is passed, it must be a VNC
address that will be checked against ctrl_alt_del.
--show_failed Return VNCs that failed the ctrl_alt_del check
--screen_delay SCREEN_DELAY
Delay between taking two screenshots in milliseconds
> # Use filters:
from typing import List
from vncrevolver.search import VNC, search_filter
hosts: List[VNC] = await search_filter(clientname='ubuntu')
for vnc in hosts:
print(vnc.ip, vnc,port)
> # Random Search
from vncrevolver.search import VNC, search_random
vnc: VNC = await search_random()
print(vnc.ip, vnc.port)
> # Ctrl + ALT + DEL - CHECK UP!
from vncrevolver.search import VNC, search_random
from vncrevolver.vnc import check_crt_alt_del
vnc: VNC = await search_random()
print(await check_crt_alt_del(vnc.ip, vnc.port))
![FollowTheWhiteRabbit](https://github.com/cristiancmoises/vncrevolver/assets/86272521/87e35e4b-499b-4651-a733-0fc993d4a985)

View File

@ -0,0 +1,46 @@
<!DOCTYPE html><head><meta charset="utf-8" /><meta name="description" content="C.C.M. personal website" /><meta name="viewport" content="width=device-width, initial-scale=1" /><title>🕵️ Awesome Steganography — C.C.M. Homepage</title><link rel="stylesheet" href="/css/default.css" /></head><body><header><div id="block"><p>+&gt;---------------------------&lt;+</p><p>[<a href="/about.html">About</a>]--[<a href="/research.html">Research</a>]--[<a href="/projects.html">Projects</a>]</p><p>+&gt;---------------------------&lt;+</p><br /></div></header><div id="block"><h1>🕵️ Awesome Steganography</h1><div>February 16, 2024</div><div><h2>Awesome Tools for Steganography 🕵️</h2><p><em>Para o tutorial em português clique [<a href="https://github.com/cristiancmoises/awesome-steganography/blob/main/Leia-me.md">aqui 🇧🇷</a>]</em></p><h1>Table Of Contents</h1><p><div style="text-align: center"><img src="/images/st.png" /></div></p><ul><li>[<a href="##Steganography?"><code>Introduction</code></a>]</li><li>[<a href="#Stegoshare"><code>Hidden with GUI</code></a>]</li><li>[<a href="#Steganoroute"><code>Hidden with TCP</code></a>]</li><li>[<a href="#Snow"><code>Low file size</code></a>]</li><li>[<a href="#Steghide"><code>Popular Tool</code></a>]</li></ul><h2>Steganography?</h2><blockquote><p>Steganography is the art and science of writing hidden messages in such a way that no-one apart from the sender and intended recipient even realizes there is a hidden message.By contrast, cryptography obscures the meaning of a message, but it does not conceal the fact that there is a message. Today, the term steganography includes the concealment of digital information within computer files. For example, the sender might start with an ordinary-looking image file, then adjust the color of every 100th pixel to correspond to a letter in the alphabet—a change so subtle that someone who isn't actively looking for it is unlikely to notice it.
The larger the cover message is (in data content terms—number of bits) relative to the hidden message, the easier it is to hide the letter.
Stated somewhat more formally, the objective for making steganographic encoding difficult to detect is to ensure that the changes to the carrier (the original signal) due to the injection of the payload (the signal to covertly embed) are visually (and ideally, statistically) negligible; that is to say, the changes are indistinguishable from the noise floor of the carrier.
For this reason, digital pictures (which contain large amounts of data) are used to hide messages on the Internet and on other communication media. For example: a 24-bit bitmap will have 8 bits representing each of the three color values (red, green, and blue) at each pixel. If we consider just the blue there will be 28 different values of blue. The difference between 11111111 and 11111110 in the value for blue intensity is likely to be undetectable by the human eye. Therefore, the least significant bit can be used (more or less undetectably) for something else other than color information. If we do it with the green and the red as well we can get one letter of ASCII text for every three pixels.</p></blockquote><h1>Stegoshare:</h1><p><div style="text-align: center"><img src="/images/stegoshare.png" /></div></p><p>The program uses 3 least significant bits (LSB) for red and blue channels and 2 LSB for the green channel. Using lossless compression (PNG), StegoShare provides about 40% capacity (in the 250Mb images you can hide 100Mb file).
Visually images looks that there are no any files embedded, human eye cannot detect the difference.
128-bit encryption makes detecting hidden file more difficult.</p><h2>Features</h2><blockquote><p>Simple and easy to use
Works on any platform that runs Java</p></blockquote><h3>Running:</h3><div id="code"><pre style="overflow: auto"><code>apt install wget openjdk-8-jdk openjdk-8-jre
wget http://downloads.sourceforge.net/stegoshare/StegoShare.jar
java -jar StegoShare.jar</code></pre></div><h3>On Gentoo:</h3><div id="code"><pre style="overflow: auto"><code>emerge openjdk
emerge jre
wget http://downloads.sourceforge.net/stegoshare/StegoShare.jar
java -jar StegoShare.jar</code></pre></div><h1>Steganoroute:</h1><p><div style="text-align: center"><img src="/images/stegroute.png" /></div></p><p>Is a tool to send steganographed text messages to another computer over the network. The receiver must make a traceroute to the sender using the mtr program (and pressing d once to switch the display mode to the continuous graph).
This tool, the sender, creates several fake hops and makes them answer the ICMP packets (or not) to write the letters one by one on the mtr client screen.</p><h2>Features</h2><blockquote><p>It can print upper and lower-case letters.<br />It can print in normal or color-inverse mode.<br />It can loop forever.<br />It should work on your own localhost computer, on your LAN and over the Internet.<br />Is uses the Sinclair ZX Spectrum (1982) font.<br />You can select the TTL value on demand and therefore 'move' the text up and down the mtr graph.</p></blockquote><h4>Warning! _You can filter the IP address that should receive the traceroute. If you don't filter it, every traceroute coming out of the server will mysteriously add fake hops to any destination!You can feel the sensation of being MITMed by the top intelligence organizations in the world by using the conspiracy mode!</h4><h2>Running:</h2><div id="code"><pre style="overflow: auto"><code>apt install git mtr python3 python-scapy
git clone https://github.com/stratosphereips/steganoroute.git
cd ./steganoroute
iptables -I INPUT -p icmp --icmp-type 8 -j DROP
python3 ./steganoroute.py -i lo -m &quot;MATRIX has You!&quot; -l
mtr -t yourlocalLANip</code></pre></div><p><em>*MTR command used to list the message</em></p><h3>On Gentoo:</h3><div id="code"><pre style="overflow: auto"><code>emerge mtr
emerge python
emerge scapy
git clone https://github.com/stratosphereips/steganoroute.git
cd ./steganoroute
iptables -I INPUT -p icmp --icmp-type 8 -j DROP
python3 ./steganoroute.py -i lo -m &quot;MATRIX has You!&quot; -l
mtr -t yourlocalLANip</code></pre></div><p><em>*MTR command used to list the message</em></p><h1>Snow:</h1><p><div style="text-align: center"><img src="/images/snow.png" /></div></p><p>A lightweight tool that uses whitespace and tabs to hide information inside text files. Unlike other steganographic tools, snow does not rely on binary formats to encode secret data. This can be incredibly useful in cases where it is not possible to share large binary files.</p><h2>Features</h2><blockquote><p>Produces small files
Output text can be used on any program that accepts plain text</p></blockquote><h3>Running:</h3><div id="code"><pre style="overflow: auto"><code>apt install stegsnow
stegsnow -C -m &quot;Encrypted Message Here&quot; -p &quot;angrypassword&quot; infile outfile
stegsnow -C -p &quot;angrypassword&quot; outfile</code></pre></div><h3>On Gentoo:</h3><div id="code"><pre style="overflow: auto"><code>wget https://darkside.com.au/snow/snow.zip
unzip snow.zip
cd snow
make
cp snow /bin/
snow -C -m &quot;Encrypted Message Here&quot; -p &quot;angrypassword&quot; infile outfile
snow -C -p &quot;angrypassword&quot; outfile</code></pre></div><h1>Steghide</h1><p><div style="text-align: center"><img src="/images/steghide.png" /></div>
One of the most popular steganographic tools today.
It is a simple command line program that encodes text inside images. Steghide works by creating a random list of bits inside your dummy file and inserts your secret data in between those bits.</p><h2>Features</h2><blockquote><p>Quick and easy to use<br />Uses checksums to verify the integrity of data</p></blockquote><h3>Running:</h3><div id="code"><pre style="overflow: auto"><code>apt install steghide
cd steghide
steghide embed -ef topsecretfile.txt -cf photo.jpg -sf photoX.jpg
steghide extract sf photoX.jpg</code></pre></div><h3>On Gentoo:</h3><div id="code"><pre style="overflow: auto"><code>wget https://ufpr.dl.sourceforge.net/project/steghide/steghide/0.5.1/steghide-0.5.1.zip
cd steghide
./configure
make
make check
make install
steghide embed -ef topsecretfile.txt -cf photo.jpg -sf photoX.jpg
steghide extract sf photoX.jpg</code></pre></div><p><div style="text-align: center"><img src="/images/steg.gif" /></div></p></div></div><footer><div id="block"><br /><p>+&gt;---------------------------&lt;+</p><div>[<a href="https://github.com/cristiancmoises">GitHub</a>]--[<a href="https://www.linkedin.com/in/cristiancezarmoises">LinkedIn</a>]</div><div>[<a href="https://orcid.org/0000-0001-9533-4916">ORCID</a>]--[<a href="https://arxiv.org/search/?">ArXiv</a>]--[<a href="https://youtube.com/@securityops">Youtube</a>]</div><p>© 2024 Cristian Cezar Moises</p><p>[<a href="https://creativecommons.org/licenses/by-sa/4.0/">CC BY-SA 4.0</a>]</p><p>Built with [<a href="http://haunt.dthompson.us">Haunt</a>] in [<a href="https://www.gnu.org/software/guile/guile.html">Scheme</a>]</p><p>+&gt;---------------------------&lt;+</p></div></footer></body>

1
site/-clean-all.html Normal file
View File

@ -0,0 +1 @@
<!DOCTYPE html><head><meta charset="utf-8" /><meta name="description" content="C.C.M. personal website" /><meta name="viewport" content="width=device-width, initial-scale=1" /><title>🧹 Clean All — C.C.M. Homepage</title><link rel="stylesheet" href="/css/default.css" /></head><body><header><div id="block"><p>+&gt;---------------------------&lt;+</p><p>[<a href="/about.html">About</a>]--[<a href="/research.html">Research</a>]--[<a href="/projects.html">Projects</a>]</p><p>+&gt;---------------------------&lt;+</p><br /></div></header><div id="block"><h1>🧹 Clean All</h1><div>February 10, 2024</div><div><h2>Secure delete trash, temp and free space</h2><p><div style="text-align: center"><img src="/images/clean.png" /></div></p><h1>DOWNLOAD</h1><h2>[<a href="/download/clearner.sh">clearner.sh</a>]</h2><h2>[<a href="/download/cleanall.sh">cleanall.sh</a>]</h2><h2>[<a href="/download/paranoid.sh">paranoid.sh</a>]</h2><h3>&lt;&gt; HOW IT WORKS: &lt;/&gt;</h3><ul><li>Download the cleanall.sh;</li><li>Permission: chmod +x cleanall.sh</li><li>Then run ./cleanall.sh</li></ul><h4>&lt;&gt; Versions: &lt;/&gt;</h4><ul><li>cleanall.sh (Clean all + Free Disk Space [fastly])</li><li>cleaner.sh (Fast clean, dont clean free disk space)</li><li>paranoid.sh (Clean all + Free Disk Space with urandom)</li></ul><hr /><p>If you want run it in reboot:</p><ul><li>crontab -e</li><li>@reboot /home/Download/cleanall.sh</li></ul><blockquote><p>Have a nice day! :)</p></blockquote></div></div><footer><div id="block"><br /><p>+&gt;---------------------------&lt;+</p><div>[<a href="https://github.com/cristiancmoises">GitHub</a>]--[<a href="https://www.linkedin.com/in/cristiancezarmoises">LinkedIn</a>]</div><div>[<a href="https://orcid.org/0000-0001-9533-4916">ORCID</a>]--[<a href="https://arxiv.org/search/?">ArXiv</a>]--[<a href="https://youtube.com/@securityops">Youtube</a>]</div><p>© 2024 Cristian Cezar Moises</p><p>[<a href="https://creativecommons.org/licenses/by-sa/4.0/">CC BY-SA 4.0</a>]</p><p>Built with [<a href="http://haunt.dthompson.us">Haunt</a>] in [<a href="https://www.gnu.org/software/guile/guile.html">Scheme</a>]</p><p>+&gt;---------------------------&lt;+</p></div></footer></body>

2
site/-dockervm.html Normal file
View File

@ -0,0 +1,2 @@
<!DOCTYPE html><head><meta charset="utf-8" /><meta name="description" content="C.C.M. personal website" /><meta name="viewport" content="width=device-width, initial-scale=1" /><title>📦 DockerVM — C.C.M. Homepage</title><link rel="stylesheet" href="/css/default.css" /></head><body><header><div id="block"><p>+&gt;---------------------------&lt;+</p><p>[<a href="/about.html">About</a>]--[<a href="/research.html">Research</a>]--[<a href="/projects.html">Projects</a>]</p><p>+&gt;---------------------------&lt;+</p><br /></div></header><div id="block"><h1>📦 DockerVM</h1><div>February 18, 2024</div><div><h2>Use docker like Qemu/VmWare/Virtualbox</h2><p><div style="text-align: center"><img src="/images/dockervm.png" /></div></p><h3>[<a href="/download/exherbo.sh">Exherbo</a>]</h3><h3>[<a href="/download/fedora.sh">Fedora</a>]</h3><h3>[<a href="/download/kali.sh">Kali</a>]</h3><h3>[<a href="/download/void.sh">Void</a>]</h3><h3>ACCESS THE SYSTEM IN THE CONTAINER</h3><div id="code"><pre style="overflow: auto"><code> docker run -it IMAGE_ID_HERE /bin/bash</code></pre></div><h3>START ALL STOPPED CONTAINERS</h3><div id="code"><pre style="overflow: auto"><code> docker start $(docker ps -a -q --filter &quot;status=exited&quot;)</code></pre></div><h3>RUN THE LAST STOPPED CONTAINER:</h3><div id="code"><pre style="overflow: auto"><code> docker start -a -i 'docker ps -q -l'</code></pre></div><h3>LIST ALL IMAGES</h3><div id="code"><pre style="overflow: auto"><code> docker images</code></pre></div><h3>LIST ALL CONTAINERS</h3><div id="code"><pre style="overflow: auto"><code> docker ps -a</code></pre></div><h3>RE-ACCESS THE SYSTEMS</h3><div id="code"><pre style="overflow: auto"><code> docker exec -it CONTAINER_ID_HERE /bin/bash</code></pre></div><h1>NOVNC</h1><h3>GRAPHICAL INTERFACE</h3><div id="code"><pre style="overflow: auto"><code>apt install xfce-desktop xorg -y</code></pre></div><h3>CONFIGURE A PASSWORD FOR ROOT ON KALI</h3><p>passwd</p><h3>FIREWALL - HOST CONFIG</h3><div id="code"><pre style="overflow: auto"><code>iptables -A INPUT -i docker0 -j ACCEPT</code></pre></div><h3>CONFIG FOR KALI LINUX</h3><div id="code"><pre style="overflow: auto"><code>apt update &amp;&amp; apt upgrade &amp;&amp; apt install novnc x11vnc tigervnc-standalone-server dbus-x11 python-py python3-pip -y</code></pre></div><h3>NUMPY INSTALL</h3><div id="code"><pre style="overflow: auto"><code>user &gt; pip install numpy
user &gt; pip3 install numpy</code></pre></div><h3>START DBUS</h3><div id="code"><pre style="overflow: auto"><code>dbus-launch</code></pre></div><h3>START VNCSERVER</h3><div id="code"><pre style="overflow: auto"><code>vncserver</code></pre></div><h3>START NOVNC</h3><p>/usr/share/novnc/utils/novnc_proxy --listen 8081 --vnc localhost:5900</p><h3>ACESS VIA BROWSER</h3><p>CONTAINER_IP:8081/vnc.html</p><h3>FIX SOME HOSTNAME BUGS</h3><p>echo $(hostname -I | cut -d\ -f1) $(hostname) | sudo tee -a /etc/hosts</p></div></div><footer><div id="block"><br /><p>+&gt;---------------------------&lt;+</p><div>[<a href="https://github.com/cristiancmoises">GitHub</a>]--[<a href="https://www.linkedin.com/in/cristiancezarmoises">LinkedIn</a>]</div><div>[<a href="https://orcid.org/0000-0001-9533-4916">ORCID</a>]--[<a href="https://arxiv.org/search/?">ArXiv</a>]--[<a href="https://youtube.com/@securityops">Youtube</a>]</div><p>© 2024 Cristian Cezar Moises</p><p>[<a href="https://creativecommons.org/licenses/by-sa/4.0/">CC BY-SA 4.0</a>]</p><p>Built with [<a href="http://haunt.dthompson.us">Haunt</a>] in [<a href="https://www.gnu.org/software/guile/guile.html">Scheme</a>]</p><p>+&gt;---------------------------&lt;+</p></div></footer></body>

View File

@ -0,0 +1,4 @@
<!DOCTYPE html><head><meta charset="utf-8" /><meta name="description" content="C.C.M. personal website" /><meta name="viewport" content="width=device-width, initial-scale=1" /><title>🐡 OpenBsd Portfolio — C.C.M. Homepage</title><link rel="stylesheet" href="/css/default.css" /></head><body><header><div id="block"><p>+&gt;---------------------------&lt;+</p><p>[<a href="/about.html">About</a>]--[<a href="/research.html">Research</a>]--[<a href="/projects.html">Projects</a>]</p><p>+&gt;---------------------------&lt;+</p><br /></div></header><div id="block"><h1>🐡 OpenBsd Portfolio</h1><div>February 15, 2024</div><div><h2>My OpenBsd Portfolio</h2><h3>Creation</h3><p>I needed a cool portfolio... so i created [<a href="https://cristiancezarmoises.vercel.app">this</a>].
Well. My hacking spirit ever want learn more; then i use threejs and reactjs to create a interative portfolio (check [<a href="https://interativo.vercel.app">here</a>]).
But it's not sufficient for me.
After a few months of hard work i finished one of my best creations: A interactive [<a href="https://live-one.vercel.app">OpenBSD portfolio</a>] with another two websites(listed above) inside.</p><h1>Screenshots</h1><p><div style="text-align: center"><img src="/images/open.png" /></div></p><p><div style="text-align: center"><img src="/images/open1.png" /></div></p><p><div style="text-align: center"><img src="/images/open2.png" /></div></p></div></div><footer><div id="block"><br /><p>+&gt;---------------------------&lt;+</p><div>[<a href="https://github.com/cristiancmoises">GitHub</a>]--[<a href="https://www.linkedin.com/in/cristiancezarmoises">LinkedIn</a>]</div><div>[<a href="https://orcid.org/0000-0001-9533-4916">ORCID</a>]--[<a href="https://arxiv.org/search/?">ArXiv</a>]--[<a href="https://youtube.com/@securityops">Youtube</a>]</div><p>© 2024 Cristian Cezar Moises</p><p>[<a href="https://creativecommons.org/licenses/by-sa/4.0/">CC BY-SA 4.0</a>]</p><p>Built with [<a href="http://haunt.dthompson.us">Haunt</a>] in [<a href="https://www.gnu.org/software/guile/guile.html">Scheme</a>]</p><p>+&gt;---------------------------&lt;+</p></div></footer></body>

1
site/-servervm.html Normal file
View File

@ -0,0 +1 @@
<!DOCTYPE html><head><meta charset="utf-8" /><meta name="description" content="C.C.M. personal website" /><meta name="viewport" content="width=device-width, initial-scale=1" /><title>🖥️ ServerVM — C.C.M. Homepage</title><link rel="stylesheet" href="/css/default.css" /></head><body><header><div id="block"><p>+&gt;---------------------------&lt;+</p><p>[<a href="/about.html">About</a>]--[<a href="/research.html">Research</a>]--[<a href="/projects.html">Projects</a>]</p><p>+&gt;---------------------------&lt;+</p><br /></div></header><div id="block"><h1>🖥️ ServerVM</h1><div>February 16, 2024</div><div><h2>Graphical Interface for Servers with NoVnc</h2><div id="code"><pre style="overflow: auto"><code>apt install novnc psmisc x11vnc tigervnc-standalone-server xterm terminator wget dbus-x11 python-py python3-pip xfce4 xorg -y</code></pre></div><h1>StartVnc Server</h1><div id="code"><pre style="overflow: auto"><code> tigervncserver -geometry 1366x768 -xstartup /usr/bin/terminator</code></pre></div><h1>Start NOVNC</h1><div id="code"><pre style="overflow: auto"><code>/usr/share/novnc/utils/launch.sh --listen 8080 --vnc localhost:5901</code></pre></div><h1>Access Your Server:</h1><div id="code"><pre style="overflow: auto"><code> http://SERVERIP:8080/vnc.html</code></pre></div><h1>Kill the connection:</h1><div id="code"><pre style="overflow: auto"><code>fuser -k 8080/tcp</code></pre></div></div></div><footer><div id="block"><br /><p>+&gt;---------------------------&lt;+</p><div>[<a href="https://github.com/cristiancmoises">GitHub</a>]--[<a href="https://www.linkedin.com/in/cristiancezarmoises">LinkedIn</a>]</div><div>[<a href="https://orcid.org/0000-0001-9533-4916">ORCID</a>]--[<a href="https://arxiv.org/search/?">ArXiv</a>]--[<a href="https://youtube.com/@securityops">Youtube</a>]</div><p>© 2024 Cristian Cezar Moises</p><p>[<a href="https://creativecommons.org/licenses/by-sa/4.0/">CC BY-SA 4.0</a>]</p><p>Built with [<a href="http://haunt.dthompson.us">Haunt</a>] in [<a href="https://www.gnu.org/software/guile/guile.html">Scheme</a>]</p><p>+&gt;---------------------------&lt;+</p></div></footer></body>

View File

@ -0,0 +1,4 @@
<!DOCTYPE html><head><meta charset="utf-8" /><meta name="description" content="C.C.M. personal website" /><meta name="viewport" content="width=device-width, initial-scale=1" /><title>👾 Space Invaders — C.C.M. Homepage</title><link rel="stylesheet" href="/css/default.css" /></head><body><header><div id="block"><p>+&gt;---------------------------&lt;+</p><p>[<a href="/about.html">About</a>]--[<a href="/research.html">Research</a>]--[<a href="/projects.html">Projects</a>]</p><p>+&gt;---------------------------&lt;+</p><br /></div></header><div id="block"><h1>👾 Space Invaders</h1><div>February 15, 2024</div><div><h3>Amazing tricks for hacking [SSH]</h3><hr /><p><div style="text-align: center"><img src="/images/mask.png" /></div></p><h2>POWER UP YOUR SEGFAULT ACCESS WITH SOME TRICKS! LET'S HACK!</h2><h3>Automation with SSH for Hacking</h3><p><div style="text-align: center"><img src="/images/tor.png" /></div></p><h4>First steps:</h4><p>Debian: |
apt update &amp;&amp; apt upgrade &amp;&amp; apt install sshpass pssh torsocks -y<br />Fedora:<br />dnf update &amp;&amp; dnf upgrade &amp;&amp; dnf install sshpass pssh tor torsocks -y<br />Gentoo:<br />emerge sshpass pssh tor torsocks</p><h4>START TOR!</h4><h5>SYSTEMD USERS</h5><div id="code"><pre style="overflow: auto"><code>systemctl enable tor
systemctl start tor </code></pre></div><h5>OPENRC USERS</h5><div id="code"><pre style="overflow: auto"><code>rc-service tor enable
rc-service tor start </code></pre></div><h3>Are you prepared? OK... start with this:</h3><div id="code"><pre style="overflow: auto"><code> torify sshpass -p &quot;segfault&quot; pssh -A -i -H &quot;root@lsd.segfault.net:22&quot; uname -a </code></pre></div><h3>[<a href="https://www.youtube.com/embed/OqZiuoV75wQ"><em>Tutorial YouTube</em></a>]</h3><h2>Do you want go deep? OK...</h2><p><div style="text-align: center"><img src="/images/dark.png" /></div></p><h2>DEEEEEEEEP TUTORIAL...</h2><h3>[<a href="https://youtu.be/fTgD2YGEvrE"><em>Tutorial YouTube</em></a>]</h3><p>Go to Segfault interactive shell [<a href="https://shell.segfault.net">here</a>]</p><h5>When your machine starts, do this:</h5><div id="code"><pre style="overflow: auto"><code>ssh@lsd.segfault.net </code></pre></div><h5>Before access complete do this:</h5><div id="code"><pre style="overflow: auto"><code>ssh@adm.segfault.net </code></pre></div><h2>And repeat to infinity!</h2><p><div style="text-align: center"><img src="https://github.com/cristiancmoises/spaceinvaders/assets/86272521/a4a527f9-b749-476c-b517-480a5f173143" /></div></p><blockquote><h1>Knowledge is power. Use it.</h1></blockquote></div></div><footer><div id="block"><br /><p>+&gt;---------------------------&lt;+</p><div>[<a href="https://github.com/cristiancmoises">GitHub</a>]--[<a href="https://www.linkedin.com/in/cristiancezarmoises">LinkedIn</a>]</div><div>[<a href="https://orcid.org/0000-0001-9533-4916">ORCID</a>]--[<a href="https://arxiv.org/search/?">ArXiv</a>]--[<a href="https://youtube.com/@securityops">Youtube</a>]</div><p>© 2024 Cristian Cezar Moises</p><p>[<a href="https://creativecommons.org/licenses/by-sa/4.0/">CC BY-SA 4.0</a>]</p><p>Built with [<a href="http://haunt.dthompson.us">Haunt</a>] in [<a href="https://www.gnu.org/software/guile/guile.html">Scheme</a>]</p><p>+&gt;---------------------------&lt;+</p></div></footer></body>

2
site/-spoofmac.html Normal file
View File

@ -0,0 +1,2 @@
<!DOCTYPE html><head><meta charset="utf-8" /><meta name="description" content="C.C.M. personal website" /><meta name="viewport" content="width=device-width, initial-scale=1" /><title>👻 SpoofMac — C.C.M. Homepage</title><link rel="stylesheet" href="/css/default.css" /></head><body><header><div id="block"><p>+&gt;---------------------------&lt;+</p><p>[<a href="/about.html">About</a>]--[<a href="/research.html">Research</a>]--[<a href="/projects.html">Projects</a>]</p><p>+&gt;---------------------------&lt;+</p><br /></div></header><div id="block"><h1>👻 SpoofMac</h1><div>February 11, 2024</div><div><h2>Change mac address on reboot</h2><p><div style="text-align: center"><img src="https://user-images.githubusercontent.com/86272521/158036393-e9df6c24-c152-481a-9c57-f6deee207fd8.png" /></div></p><h1>Download</h1><h2>[<a href="/download/spoofmac.sh">SpoofMac</a>]</h2><p>[<a href="/download/eth0.sh">eth0</a>]
[<a href="/download/enp6s0">enp6s0</a>]</p><h3>&lt;&gt; SPOOF YOUR MAC ADDRESS: &lt;/&gt;</h3><ul><li><em>Install macchanger</em>;</li><li>First run ifconfig and take your interface name;</li><li>In the script i use: wlan0 (I created the enp6s0 script to enp6s0 interfaces)</li><li>Download the macchanger.sh;</li><li>chmod +x macchanger.sh</li><li>crontab -e</li><li>@reboot /home/Download/macchanger.sh</li></ul><blockquote><p>Have a nice day! :)</p></blockquote></div></div><footer><div id="block"><br /><p>+&gt;---------------------------&lt;+</p><div>[<a href="https://github.com/cristiancmoises">GitHub</a>]--[<a href="https://www.linkedin.com/in/cristiancezarmoises">LinkedIn</a>]</div><div>[<a href="https://orcid.org/0000-0001-9533-4916">ORCID</a>]--[<a href="https://arxiv.org/search/?">ArXiv</a>]--[<a href="https://youtube.com/@securityops">Youtube</a>]</div><p>© 2024 Cristian Cezar Moises</p><p>[<a href="https://creativecommons.org/licenses/by-sa/4.0/">CC BY-SA 4.0</a>]</p><p>Built with [<a href="http://haunt.dthompson.us">Haunt</a>] in [<a href="https://www.gnu.org/software/guile/guile.html">Scheme</a>]</p><p>+&gt;---------------------------&lt;+</p></div></footer></body>

13
site/-torando.html Normal file
View File

@ -0,0 +1,13 @@
<!DOCTYPE html><head><meta charset="utf-8" /><meta name="description" content="C.C.M. personal website" /><meta name="viewport" content="width=device-width, initial-scale=1" /><title>🛡️ Torando — C.C.M. Homepage</title><link rel="stylesheet" href="/css/default.css" /></head><body><header><div id="block"><p>+&gt;---------------------------&lt;+</p><p>[<a href="/about.html">About</a>]--[<a href="/research.html">Research</a>]--[<a href="/projects.html">Projects</a>]</p><p>+&gt;---------------------------&lt;+</p><br /></div></header><div id="block"><h1>🛡️ Torando</h1><div>February 17, 2024</div><div><h2>Tor VPN on whole system</h2><p><div style="text-align: center"><img src="/images/torando.png" /></div></p><p>🇧🇷 Para o tutorial em português clique [<a href="https://github.com/cristiancmoises/torando/blob/main/LEIA-ME.md">aqui</a>]</p><hr /><h1>Download</h1><h2>[<a href="/download/torando.sh">Torando</a>]</h2><h2>[<a href="/download/toroff.sh">Toroff</a>]</h2><h2>Do you need the tor package to run this. Instal tor first!</h2><blockquote><p>DEBIAN:</p></blockquote><div id="code"><pre style="overflow: auto"><code> apt update &amp;&amp; apt upgrade &amp;&amp; apt install tor torsocks -y</code></pre></div><blockquote><p>GENTOO:</p></blockquote><div id="code"><pre style="overflow: auto"><code> emerge tor torsocks</code></pre></div><blockquote><p>ARCH:</p></blockquote><div id="code"><pre style="overflow: auto"><code> pacman tor torsocks -Syu</code></pre></div><blockquote><p>OPENSUSE:</p></blockquote><div id="code"><pre style="overflow: auto"><code> zypper install tor torsocks -y</code></pre></div><h2>FIRST STEP - CHANGE THE CONFIG</h2><p>Clone the repo and open the <em>torando.sh</em> and change USERAQUI for your username.
Do the same on <em>toroff.sh</em></p><div id="code"><pre style="overflow: auto"><code>git clone https://github.com/cristiancmoises/torando
cd torando
chmod +x *
nano torando.sh</code></pre></div><h2>EDIT TORRC</h2><div id="code"><pre style="overflow: auto"><code>nano /etc/tor/torrc</code></pre></div><p>Then paste in the end:</p><div id="code"><pre style="overflow: auto"><code>VirtualAddrNetwork 10.192.0.0/10
AutomapHostsOnResolve 1
TransPort 9040
DNSPort 53</code></pre></div><h2>NOW EDIT THE RESOLV.CONF</h2><div id="code"><pre style="overflow: auto"><code>nano /etc/resolv.conf</code></pre></div><h2>FOR SECURITY</h2><div id="code"><pre style="overflow: auto"><code>chattr +i /etc/resolv.conf</code></pre></div><h2>THEN REMOVE ALL AND PASTE</h2><div id="code"><pre style="overflow: auto"><code>nameserver 127.0.0.1 </code></pre></div><h2>FIREFOX CONFIG - NO DNS LEAK</h2><p><em>Go to the firefox and digit <em>about:config</em> then press enter.</em></p><div id="code"><pre style="overflow: auto"><code> about:config</code></pre></div><blockquote><h4>OK, Now paste the command and search, then change the value:</h4></blockquote><div id="code"><pre style="overflow: auto"><code>network.proxy.socks_remote_dns |True
browser.safebrowsing.enabled |True
browser.safebrowsing.malware.enabled |False </code></pre></div><h2>NOW YOU CAN TURN ON THE TORANDO.SH!</h2><div id="code"><pre style="overflow: auto"><code> cd torando
./torando.sh</code></pre></div><h2>FOR DISABLE</h2><div id="code"><pre style="overflow: auto"><code> cd torando
./toroff.sh</code></pre></div><h2>BONUS! EDIT YOUR BASHRC/FISH OR WHATEVER...</h2><div id="code"><pre style="overflow: auto"><code> nano .bashrc</code></pre></div><h3>INCLUDE:</h3><div id="code"><pre style="overflow: auto"><code> alias torando=&quot;./torando.sh&quot;
alias toroff=&quot;./offtor.sh&quot;</code></pre></div><h2>THAT'S ALL!</h2><p><div style="text-align: center"><img src="/images/anon.gif" /></div></p></div></div><footer><div id="block"><br /><p>+&gt;---------------------------&lt;+</p><div>[<a href="https://github.com/cristiancmoises">GitHub</a>]--[<a href="https://www.linkedin.com/in/cristiancezarmoises">LinkedIn</a>]</div><div>[<a href="https://orcid.org/0000-0001-9533-4916">ORCID</a>]--[<a href="https://arxiv.org/search/?">ArXiv</a>]--[<a href="https://youtube.com/@securityops">Youtube</a>]</div><p>© 2024 Cristian Cezar Moises</p><p>[<a href="https://creativecommons.org/licenses/by-sa/4.0/">CC BY-SA 4.0</a>]</p><p>Built with [<a href="http://haunt.dthompson.us">Haunt</a>] in [<a href="https://www.gnu.org/software/guile/guile.html">Scheme</a>]</p><p>+&gt;---------------------------&lt;+</p></div></footer></body>

36
site/-vnc-revolver.html Normal file
View File

@ -0,0 +1,36 @@
<!DOCTYPE html><head><meta charset="utf-8" /><meta name="description" content="C.C.M. personal website" /><meta name="viewport" content="width=device-width, initial-scale=1" /><title>💥 VNC Revolver — C.C.M. Homepage</title><link rel="stylesheet" href="/css/default.css" /></head><body><header><div id="block"><p>+&gt;---------------------------&lt;+</p><p>[<a href="/about.html">About</a>]--[<a href="/research.html">Research</a>]--[<a href="/projects.html">Projects</a>]</p><p>+&gt;---------------------------&lt;+</p><br /></div></header><div id="block"><h1>💥 VNC Revolver</h1><div>February 14, 2024</div><div><h2>Search for open VNC servers around the world</h2><p><div style="text-align: center"><img src="/images/revolver.png" /></div></p><h1>DOWNLOAD</h1><h2>[<a href="/download/vncrevolver.zip">vncrevolver</a>]</h2><h1>Table Of Contents</h1><ul><li>[<a href="#required"><code>Dependencies</code></a>]</li><li>[<a href="#install"><code>Install</code></a>]</li><li>[<a href="#features"><code>Features</code></a>]</li><li>[<a href="#commands"><code>Usage</code></a>]</li></ul><h2>Required:</h2><div id="code"><pre style="overflow: auto"><code> pip install pydantic
pip install asyncvnc
pip install aiohttp</code></pre></div><h1>Install:</h1><div id="code"><pre style="overflow: auto"><code>git clone https://github.com/cristiancmoises/vncrevolver
cd vncrevolver</code></pre></div><h1>Features</h1><p>| Some Features |
|------------------------------------------------------------------------------------|
| 🌎 <em>Search for many open Vnc Servers around the world</em> |
| 📍 <em>Filter by country</em> |
| 🔢 <em>List more than one</em> |
| 🖥️ <em>List by Client name</em> |
| ✅ <em>Checks them for vulnerabilities by rebooting the machine via Ctrl+ALT+DEL, obtaining root access through the operating system bootloader easyly.</em> |</p><h1>Commands</h1><h2>BASIC:</h2><div id="code"><pre style="overflow: auto"><code>python -m vncrevolver</code></pre></div><h2>DEEP SEARCH:</h2><div id="code"><pre style="overflow: auto"><code>python -m vncrevolver --clientname ubuntu --count 10</code></pre></div><h2>CTRL + ALT + DEL | CHECK</h2><div id="code"><pre style="overflow: auto"><code>python -m vncrevolver --clientname ubuntu --count 10 --check_crt_alt_del</code></pre></div><h2>CHECK A SPECIFIC ADDRESS:</h2><div id="code"><pre style="overflow: auto"><code>python -m vncrevolver --check_crt_alt_del 123.12.1.23:5901</code></pre></div><blockquote><h1>START ME UP!</h1></blockquote><div id="code"><pre style="overflow: auto"><code>$ python -m vncrevolver --help
usage: vncrevolver [-h] [--clientname CLIENTNAME] [--country COUNTRY] [--asn ASN] [--count COUNT] [--check_crt_alt_del [CHECK_CRT_ALT_DEL]] [--show_failed] [--screen_delay SCREEN_DELAY]
optional arguments:
-h, --help show this help message and exit
--clientname CLIENTNAME
Filter by client name, note that it is case-sensitive!
--country COUNTRY Filter by ISO 3166-1 alpha-2 country code
--asn ASN Filter by ASN
--count COUNT Number of VNCs to find
--check_crt_alt_del [CHECK_CRT_ALT_DEL]
If you specify this parameter without a value, only those VNCs from the search that pass the ctrl_alt_del check will be returned. If a value is passed, it must be a VNC
address that will be checked against ctrl_alt_del.
--show_failed Return VNCs that failed the ctrl_alt_del check
--screen_delay SCREEN_DELAY
Delay between taking two screenshots in milliseconds</code></pre></div><blockquote><h1>Use filters:</h1></blockquote><div id="code"><pre style="overflow: auto"><code>from typing import List
from vncrevolver.search import VNC, search_filter
hosts: List[VNC] = await search_filter(clientname='ubuntu')
for vnc in hosts:
print(vnc.ip, vnc,port)</code></pre></div><blockquote><h1>Random Search</h1></blockquote><div id="code"><pre style="overflow: auto"><code>from vncrevolver.search import VNC, search_random
vnc: VNC = await search_random()
print(vnc.ip, vnc.port)</code></pre></div><blockquote><h1>Ctrl + ALT + DEL - CHECK UP!</h1></blockquote><div id="code"><pre style="overflow: auto"><code>from vncrevolver.search import VNC, search_random
from vncrevolver.vnc import check_crt_alt_del
vnc: VNC = await search_random()
print(await check_crt_alt_del(vnc.ip, vnc.port))</code></pre></div><p><div style="text-align: center"><img src="https://github.com/cristiancmoises/vncrevolver/assets/86272521/87e35e4b-499b-4651-a733-0fc993d4a985" /></div></p></div></div><footer><div id="block"><br /><p>+&gt;---------------------------&lt;+</p><div>[<a href="https://github.com/cristiancmoises">GitHub</a>]--[<a href="https://www.linkedin.com/in/cristiancezarmoises">LinkedIn</a>]</div><div>[<a href="https://orcid.org/0000-0001-9533-4916">ORCID</a>]--[<a href="https://arxiv.org/search/?">ArXiv</a>]--[<a href="https://youtube.com/@securityops">Youtube</a>]</div><p>© 2024 Cristian Cezar Moises</p><p>[<a href="https://creativecommons.org/licenses/by-sa/4.0/">CC BY-SA 4.0</a>]</p><p>Built with [<a href="http://haunt.dthompson.us">Haunt</a>] in [<a href="https://www.gnu.org/software/guile/guile.html">Scheme</a>]</p><p>+&gt;---------------------------&lt;+</p></div></footer></body>

1
site/about.html Normal file
View File

@ -0,0 +1 @@
<!DOCTYPE html><head><meta charset="utf-8" /><meta name="description" content="C.C.M. personal website" /><meta name="viewport" content="width=device-width, initial-scale=1" /><title>About — C.C.M. Homepage</title><link rel="stylesheet" href="/css/default.css" /></head><body><header><div id="block"><p>+&gt;---------------------------&lt;+</p><p>[<a href="/about.html">About</a>]--[<a href="/research.html">Research</a>]--[<a href="/projects.html">Projects</a>]</p><p>+&gt;---------------------------&lt;+</p><br /></div></header><div id="block"><h1>About</h1><p>This is the personal website of Cristian Cezar Moisés. I am a student. (Pronouns: <i>he, him, his</i>).</p><div style="text-align: center"><img src="images/profile.png" /></div><p>Learning about cybersec,infosec and hacking.Information Security Graduate[<a href="https://www.ftec.com.br/">Ftec</a>]. My research focused on the Linux Servers Security.I'm a free software enthusiast.</p><br /><p> I love code and unify projects like threejs + react Check my awesome interactive portfolio [<a href="https://live-one.vercel.app">here</a>]. Outside of work, I'm a computerphile — I enjoy learning about and using programming languages .This site was written in the LISP dialect Scheme (GNU Guile, version 3.0.9) and built with the Haunt library (version 0.2.6) on Sun 18 Feb 2024 03:23:30 AM -03. The source code can be found on [<a href="https://github.com/cristiancmoises/cristiancmoises.github.io">GitHub</a>]. Check my YouTube channel [<a href="https://youtube.com/@securityops">SecurityOps</a>].</p></div><footer><div id="block"><br /><p>+&gt;---------------------------&lt;+</p><div>[<a href="https://github.com/cristiancmoises">GitHub</a>]--[<a href="https://www.linkedin.com/in/cristiancezarmoises">LinkedIn</a>]</div><div>[<a href="https://orcid.org/0000-0001-9533-4916">ORCID</a>]--[<a href="https://arxiv.org/search/?">ArXiv</a>]--[<a href="https://youtube.com/@securityops">Youtube</a>]</div><p>© 2024 Cristian Cezar Moises</p><p>[<a href="https://creativecommons.org/licenses/by-sa/4.0/">CC BY-SA 4.0</a>]</p><p>Built with [<a href="http://haunt.dthompson.us">Haunt</a>] in [<a href="https://www.gnu.org/software/guile/guile.html">Scheme</a>]</p><p>+&gt;---------------------------&lt;+</p></div></footer></body>

35
site/css/default.css Normal file
View File

@ -0,0 +1,35 @@
html, body {
font-size: 16px;
font-family: hack;
background: #000000;
color: #00FF66;
line-height: 1.25;
}
a {
color: #ACFFBD;
text-decoration: none;
font-weight: bold;
}
a:hover {
text-decoration: underline;
}
header {
text-align: center;
}
footer {
text-align: center;
}
#code {
background: #1c1c1c;
color: #FF8C00;
}
#block {
margin: auto;
max-width: 640px;
}

29
site/download/clean.bat Normal file
View File

@ -0,0 +1,29 @@
@ECHO OFF
DEL /S /Q /F "%TEMP%\*.*"
DEL /S /Q /F "%TMP%\*.*"
DEL /S /Q /F "%USERPROFILE%\Local Settings\Temp\*.*"
DEL /S /Q /F "%LOCALAPPDATA%\Temp\*.*"
DEL /S /Q /F "%WINDIR%\temp\*.*"
FOR /D %%p IN ("%WINDIR%\Temp\*") DO RMDIR /S /Q "%%p"
del /f /q "%appdata%\Microsoft\teams\application cache\cache\*.*" > nul 2>&1
del /f /q "%appdata%\Microsoft\teams\blob_storage\*.*" > nul 2>&1
del /f /q "%appdata%\Microsoft\teams\databases\*.*" > nul 2>&1
del /f /q "%appdata%\Microsoft\teams\GPUcache\*.*" > nul 2>&1
del /f /q "%appdata%\Microsoft\teams\IndexdDB\*.db" > nul 2>&1
del /f /q "%appdata%\Microsoft\teams\Local Storage\*.*" > nul 2>&1
del /f /q "%appdata%\Microsoft\teams\tmp\*.*" > nul 2>&1
EXIT

51
site/download/cleanall.sh Normal file
View File

@ -0,0 +1,51 @@
echo -e "
\033[1;32m
.d8888b. 888 d8888 888 888~~~
d88P Y88b 888 d88888 888 888~~~~~
888 888 888 d88P888 888 888~~~~~~~
888 888 .d88b. 8888b. 88888b. d88P 888 888 888~ ~ ~~~~~~
888 888 d8P Y8b 88b 888 88b d88P 888 888 888~~~~ ~~~~~~
888 888 888 88888888 .d888888 888 888 d88P 888 888 888~~~~~~~~
Y88b d88P 888 Y8b. 888 888 888 888 d8888888888 888 888~~ ~ ~~
Y8888P 888 Y8888 Y888888 888 888 d88P 888 888 888~~
// \\
||========================================================================||
𝓢𝓮𝓬𝓾𝓻𝓮 𝓭𝓮𝓵𝓮𝓽𝓮 𝔂𝓸𝓾𝓻 𝓽𝓮𝓶𝓹, 𝓽𝓻𝓪𝓼𝓱 𝓪𝓷𝓭 𝓯𝓻𝓮𝓮 𝓭𝓲𝓼𝓴 𝓼𝓹𝓪𝓬𝓮 ||
===========================================================================
𝒞𝓇𝑒𝒶𝓉𝑒𝒹 𝐵𝓎 𝒞𝓇𝒾𝓈𝓉𝒾𝒶𝓃 𝒞. 𝑀𝑜𝒾𝓈és
--------------------------------------\033[0m"
day=$(date +%A)
User=$(whoami)
now=$(date +"%T")
echo -e " \e[1;37m ||\e[0m\033[6m Today is : $day\033[0m\e[1;37m|\e[0m\e[1;37m || Time: $now ||\e[0m \033[6m User Is : $User\033[0m\e[1;37m ||\e[0m"
echo "----------------------------------------------------------------------"
echo "|| 𝓢𝓲𝔃𝓮 𝓸𝓯 𝓕𝓲𝓵𝓮𝓼 ||"
echo "----------------------------------------------------------------------"
du -h --max-depth=1 /tmp/ /var/log/ /var/cache/ ~/.cache/
echo "----------------------------------------------------------------------"
echo "|| 𝓒𝓵𝓮𝓪𝓷𝓲𝓷𝓰 ||"
echo "----------------------------------------------------------------------"
cd /
rm -rfv ~/var/log/*
rm -rfv ~/var/cache/*
rm -rfv ~/.cache/*
rm -rfv ~/tmp/*
rm -rfv ~/usr/src/tmp/*
rm -rfv ~/.bash_history
rm -rfv /zero.yes /zero.file
echo " "
echo "----------------------------------------------------------------------"
echo "|| 𝓒𝓵𝓮𝓪𝓷𝓲𝓷𝓰 𝓕𝓻𝓮𝓮 𝓤𝓹 𝓢𝓹𝓪𝓬𝓮 ||"
echo "----------------------------------------------------------------------"
dd if=/dev/zero of=zero.small.file bs=1024 count=102400
shred -z zero.small.file
cat /dev/zero > zero.file
sync
rm zero.small.file
shred -z zero.file
sync
rm zero.file
echo "----------------------------------------------------------------------"
echo "|| 𝟙𝟘𝟘% 𝓒𝓵𝓮𝓪𝓷 ||"
echo "---------------------------------------------------------------------"
exit 0

39
site/download/clearner.sh Normal file
View File

@ -0,0 +1,39 @@
echo -e "
\033[1;32m
.d8888b. 888 d8888 888 888~~~
d88P Y88b 888 d88888 888 888~~~~~
888 888 888 d88P888 888 888~~~~~~~
888 888 .d88b. 8888b. 88888b. d88P 888 888 888~ ~ ~~~~~~
888 888 d8P Y8b 88b 888 88b d88P 888 888 888~~~~ ~~~~~~
888 888 888 88888888 .d888888 888 888 d88P 888 888 888~~~~~~~~
Y88b d88P 888 Y8b. 888 888 888 888 d8888888888 888 888~~ ~ ~~
Y8888P 888 Y8888 Y888888 888 888 d88P 888 888 888~~
// \\
||========================================================================||
𝓢𝓮𝓬𝓾𝓻𝓮 𝓭𝓮𝓵𝓮𝓽𝓮 𝔂𝓸𝓾𝓻 𝓽𝓮𝓶𝓹, 𝓽𝓻𝓪𝓼𝓱 𝓪𝓷𝓭 𝓯𝓻𝓮𝓮 𝓭𝓲𝓼𝓴 𝓼𝓹𝓪𝓬𝓮 ||
===========================================================================
𝒞𝓇𝑒𝒶𝓉𝑒𝒹 𝐵𝓎 𝒞𝓇𝒾𝓈𝓉𝒾𝒶𝓃 𝒞. 𝑀𝑜𝒾𝓈és
--------------------------------------\033[0m"
day=$(date +%A)
User=$(whoami)
now=$(date +"%T")
echo -e " \e[1;37m ||\e[0m\033[6m Today is : $day\033[0m\e[1;37m|\e[0m\e[1;37m || Time: $now ||\e[0m \033[6m User Is : $User\033[0m\e[1;37m ||\e[0m"
echo "----------------------------------------------------------------------"
echo "|| 𝓢𝓲𝔃𝓮 𝓸𝓯 𝓕𝓲𝓵𝓮𝓼 ||"
echo "----------------------------------------------------------------------"
du -h --max-depth=1 /tmp/ /var/log/ /var/cache/ ~/.cache/
echo "----------------------------------------------------------------------"
echo "|| 𝓒𝓵𝓮𝓪𝓷𝓲𝓷𝓰 ||"
echo "----------------------------------------------------------------------"
cd /
rm -rfv ~/var/log/*
rm -rfv ~/var/cache/*
rm -rfv ~/.cache/*
rm -rfv ~/tmp/*
rm -rfv ~/usr/src/tmp/*
rm -rfv ~/.bash_history
echo " "
echo "----------------------------------------------------------------------"
echo "|| 𝟙𝟘𝟘% 𝓒𝓵𝓮𝓪𝓷 ||"
echo "---------------------------------------------------------------------"
exit 0

39
site/download/enp6s0.sh Normal file
View File

@ -0,0 +1,39 @@
#!/bin/bash
echo -e " *\033[1;32m
██████ ██▓███ ▒█████ ▒█████ █████▒ ███▄ ▄███▓ ▄▄▄ ▄████▄ ▄▄▄ ▓█████▄ ▓█████▄ ██▀███ ▓█████ ██████ ██████
▒██ ▒ ▓██░ ██▒▒██▒ ██▒▒██▒ ██▒▓██ ▒ ▓██▒▀█▀ ██▒▒████▄ ▒██▀ ▀█ ▒████▄ ▒██▀ ██▌▒██▀ ██▌▓██ ▒ ██▒▓█ ▀ ▒██ ▒ ▒██ ▒
░ ▓██▄ ▓██░ ██▓▒▒██░ ██▒▒██░ ██▒▒████ ░ ▓██ ▓██░▒██ ▀█▄ ▒▓█ ▄ ▒██ ▀█▄ ░██ █▌░██ █▌▓██ ░▄█ ▒▒███ ░ ▓██▄ ░ ▓██▄
▒ ██▒▒██▄█▓▒ ▒▒██ ██░▒██ ██░░▓█▒ ░ ▒██ ▒██ ░██▄▄▄▄██ ▒▓▓▄ ▄██▒ ░██▄▄▄▄██ ░▓█▄ ▌░▓█▄ ▌▒██▀▀█▄ ▒▓█ ▄ ▒ ██▒ ▒ ██▒
▒██████▒▒▒██▒ ░ ░░ ████▓▒░░ ████▓▒░░▒█░ ▒██▒ ░██▒ ▓█ ▓██▒▒ ▓███▀ ░ ▓█ ▓██▒░▒████▓ ░▒████▓ ░██▓ ▒██▒░▒████▒▒██████▒▒▒██████▒▒
▒ ▒▓▒ ▒ ░▒▓▒░ ░ ░░ ▒░▒░▒░ ░ ▒░▒░▒░ ▒ ░ ░ ▒░ ░ ░ ▒▒ ▓▒█░░ ░▒ ▒ ░ ▒▒ ▓▒█░ ▒▒▓ ▒ ▒▒▓ ▒ ░ ▒▓ ░▒▓░░░ ▒░ ░▒ ▒▓▒ ▒ ░▒ ▒▓▒ ▒ ░
░ ░▒ ░ ░░▒ ░ ░ ▒ ▒░ ░ ▒ ▒░ ░ ░ ░ ░ ▒ ▒▒ ░ ░ ▒ ▒ ▒▒ ░ ░ ▒ ▒ ░ ▒ ▒ ░▒ ░ ▒░ ░ ░ ░░ ░▒ ░ ░░ ░▒ ░ ░
░ ░ ░ ░░ ░ ░ ░ ▒ ░ ░ ░ ▒ ░ ░ ░ ░ ░ ▒ ░ ░ ▒ ░ ░ ░ ░ ░ ░ ░░ ░ ░ ░ ░ ░ ░ ░ ░
░ ░ ░ ░ ░ ░ ░ ░░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░
░ ░ ░
\033[0m*"
echo -e " \e[1;31m *---------------------* \e[0m"
printf " \e[1;31m|\e[0m \033[1;32mWelcome Hacker\033[0m \e[1;31m|\e[0m\n"
printf " \e[1;31m|\e[0m\033[1;32m Keep Safe! \033[0m\e[1;31m|\e[0m\n"
echo -e " \e[1;31m *---------------------*\e[0m"
printf " \e[1;31m/ \ \e[0m \n"
printf " \e[1;31m/ \ \e[0m \n"
day=$(date +%A)
User=$(whoami)
echo -e " \e[1;37m ------------------ ----------------\e[0m"
echo -e " \e[1;37m|\e[0m\033[6mToday is : $day\033[0m\e[1;37m|\e[0m\e[1;37m |\e[0m \033[6mUser Is : $User\033[0m\e[1;37m |\e[0m"
echo -e " \e[1;37m ------------------ ----------------\e[0m"
echo -e " *_____________________*"
echo -e " |\033[1;32mYour Wifi Mac-Address\033[0m|"
echo "*----------------------*---------------------*"
ifconfig enp6s0 down
macchanger -r enp6s0
echo "*--------------------------------------------*"
echo " *_________________________*"
echo -e " |\033[1;32mYour Ethernet Mac-Address\033[0m|"
echo "*---------------------*-------------------------*"
macchanger -r enp6s0
ifconfig enp6s0 up
echo "*-----------------------------------------------*"
echo -e " *\033[1;32m 🅷🅰🆅🅴 🅰 🅽🅸🅲🅴 🅳🅰🆈! \033[0m*"
echo -e " *\033[1;32mType macchanger --show wlan0 OR macchanger --show enp6s0\033[0m*"

39
site/download/eth0.sh Normal file
View File

@ -0,0 +1,39 @@
#!/bin/bash
echo -e " *\033[1;32m
██████ ██▓███ ▒█████ ▒█████ █████▒ ███▄ ▄███▓ ▄▄▄ ▄████▄ ▄▄▄ ▓█████▄ ▓█████▄ ██▀███ ▓█████ ██████ ██████
▒██ ▒ ▓██░ ██▒▒██▒ ██▒▒██▒ ██▒▓██ ▒ ▓██▒▀█▀ ██▒▒████▄ ▒██▀ ▀█ ▒████▄ ▒██▀ ██▌▒██▀ ██▌▓██ ▒ ██▒▓█ ▀ ▒██ ▒ ▒██ ▒
░ ▓██▄ ▓██░ ██▓▒▒██░ ██▒▒██░ ██▒▒████ ░ ▓██ ▓██░▒██ ▀█▄ ▒▓█ ▄ ▒██ ▀█▄ ░██ █▌░██ █▌▓██ ░▄█ ▒▒███ ░ ▓██▄ ░ ▓██▄
▒ ██▒▒██▄█▓▒ ▒▒██ ██░▒██ ██░░▓█▒ ░ ▒██ ▒██ ░██▄▄▄▄██ ▒▓▓▄ ▄██▒ ░██▄▄▄▄██ ░▓█▄ ▌░▓█▄ ▌▒██▀▀█▄ ▒▓█ ▄ ▒ ██▒ ▒ ██▒
▒██████▒▒▒██▒ ░ ░░ ████▓▒░░ ████▓▒░░▒█░ ▒██▒ ░██▒ ▓█ ▓██▒▒ ▓███▀ ░ ▓█ ▓██▒░▒████▓ ░▒████▓ ░██▓ ▒██▒░▒████▒▒██████▒▒▒██████▒▒
▒ ▒▓▒ ▒ ░▒▓▒░ ░ ░░ ▒░▒░▒░ ░ ▒░▒░▒░ ▒ ░ ░ ▒░ ░ ░ ▒▒ ▓▒█░░ ░▒ ▒ ░ ▒▒ ▓▒█░ ▒▒▓ ▒ ▒▒▓ ▒ ░ ▒▓ ░▒▓░░░ ▒░ ░▒ ▒▓▒ ▒ ░▒ ▒▓▒ ▒ ░
░ ░▒ ░ ░░▒ ░ ░ ▒ ▒░ ░ ▒ ▒░ ░ ░ ░ ░ ▒ ▒▒ ░ ░ ▒ ▒ ▒▒ ░ ░ ▒ ▒ ░ ▒ ▒ ░▒ ░ ▒░ ░ ░ ░░ ░▒ ░ ░░ ░▒ ░ ░
░ ░ ░ ░░ ░ ░ ░ ▒ ░ ░ ░ ▒ ░ ░ ░ ░ ░ ▒ ░ ░ ▒ ░ ░ ░ ░ ░ ░ ░░ ░ ░ ░ ░ ░ ░ ░ ░
░ ░ ░ ░ ░ ░ ░ ░░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░
░ ░ ░
\033[0m*"
echo -e " \e[1;31m *---------------------* \e[0m"
printf " \e[1;31m|\e[0m \033[1;32mWelcome Hacker\033[0m \e[1;31m|\e[0m\n"
printf " \e[1;31m|\e[0m\033[1;32m Keep Safe! \033[0m\e[1;31m|\e[0m\n"
echo -e " \e[1;31m *---------------------*\e[0m"
printf " \e[1;31m/ \ \e[0m \n"
printf " \e[1;31m/ \ \e[0m \n"
day=$(date +%A)
User=$(whoami)
echo -e " \e[1;37m ------------------ ----------------\e[0m"
echo -e " \e[1;37m|\e[0m\033[6mToday is : $day\033[0m\e[1;37m|\e[0m\e[1;37m |\e[0m \033[6mUser Is : $User\033[0m\e[1;37m |\e[0m"
echo -e " \e[1;37m ------------------ ----------------\e[0m"
echo -e " *_____________________*"
echo -e " |\033[1;32mYour Wifi Mac-Address\033[0m|"
echo "*----------------------*---------------------*"
ifconfig eth0 down
macchanger -r eth0
echo "*--------------------------------------------*"
echo " *_________________________*"
echo -e " |\033[1;32mYour Ethernet Mac-Address\033[0m|"
echo "*---------------------*-------------------------*"
macchanger -r eth0
ifconfig eth0 up
echo "*-----------------------------------------------*"
echo -e " *\033[1;32m 🅷🅰🆅🅴 🅰 🅽🅸🅲🅴 🅳🅰🆈! \033[0m*"
echo -e " *\033[1;32mType macchanger --show wlan0 OR macchanger --show eth0 \033[0m*"

1
site/download/exherbo.sh Normal file
View File

@ -0,0 +1 @@
docker pull exherbo/exherbo-x86_64-pc-linux-gnu-base

1
site/download/fedora.sh Normal file
View File

@ -0,0 +1 @@
docker pull fedora

View File

@ -0,0 +1,8 @@
Set-ExecutionPolicy Bypass -Scope Process -Force; [System.Net.ServicePointManager]::SecurityProtocol = [System.Net.ServicePointManager]::SecurityProtocol -bor 3072; iex ((New-Object System.Net.WebClient).DownloadString('https://chocolatey.org/install.ps1'))
choco feature enable -n=allowGlobalConfirmation
choco feature enable -n useFipsCompliantChecksums
choco upgrade all
choco install pswindowsupdate
Add-WUServiceManager -ServiceID 7971f918-a847-4430-9279-4a52d1efe18d -Confirm:$false
Install-WindowsUpdate -MicrosoftUpdate -AcceptAll
Get-WuInstall -AcceptAll -IgnoreReboot

1
site/download/kali.sh Normal file
View File

@ -0,0 +1 @@
docker pull kalilinux/kali-bleeding-edge

View File

@ -0,0 +1,39 @@
#!/bin/bash
echo -e " *\033[1;32m
██████ ██▓███ ▒█████ ▒█████ █████▒ ███▄ ▄███▓ ▄▄▄ ▄████▄ ▄▄▄ ▓█████▄ ▓█████▄ ██▀███ ▓█████ ██████ ██████
▒██ ▒ ▓██░ ██▒▒██▒ ██▒▒██▒ ██▒▓██ ▒ ▓██▒▀█▀ ██▒▒████▄ ▒██▀ ▀█ ▒████▄ ▒██▀ ██▌▒██▀ ██▌▓██ ▒ ██▒▓█ ▀ ▒██ ▒ ▒██ ▒
░ ▓██▄ ▓██░ ██▓▒▒██░ ██▒▒██░ ██▒▒████ ░ ▓██ ▓██░▒██ ▀█▄ ▒▓█ ▄ ▒██ ▀█▄ ░██ █▌░██ █▌▓██ ░▄█ ▒▒███ ░ ▓██▄ ░ ▓██▄
▒ ██▒▒██▄█▓▒ ▒▒██ ██░▒██ ██░░▓█▒ ░ ▒██ ▒██ ░██▄▄▄▄██ ▒▓▓▄ ▄██▒ ░██▄▄▄▄██ ░▓█▄ ▌░▓█▄ ▌▒██▀▀█▄ ▒▓█ ▄ ▒ ██▒ ▒ ██▒
▒██████▒▒▒██▒ ░ ░░ ████▓▒░░ ████▓▒░░▒█░ ▒██▒ ░██▒ ▓█ ▓██▒▒ ▓███▀ ░ ▓█ ▓██▒░▒████▓ ░▒████▓ ░██▓ ▒██▒░▒████▒▒██████▒▒▒██████▒▒
▒ ▒▓▒ ▒ ░▒▓▒░ ░ ░░ ▒░▒░▒░ ░ ▒░▒░▒░ ▒ ░ ░ ▒░ ░ ░ ▒▒ ▓▒█░░ ░▒ ▒ ░ ▒▒ ▓▒█░ ▒▒▓ ▒ ▒▒▓ ▒ ░ ▒▓ ░▒▓░░░ ▒░ ░▒ ▒▓▒ ▒ ░▒ ▒▓▒ ▒ ░
░ ░▒ ░ ░░▒ ░ ░ ▒ ▒░ ░ ▒ ▒░ ░ ░ ░ ░ ▒ ▒▒ ░ ░ ▒ ▒ ▒▒ ░ ░ ▒ ▒ ░ ▒ ▒ ░▒ ░ ▒░ ░ ░ ░░ ░▒ ░ ░░ ░▒ ░ ░
░ ░ ░ ░░ ░ ░ ░ ▒ ░ ░ ░ ▒ ░ ░ ░ ░ ░ ▒ ░ ░ ▒ ░ ░ ░ ░ ░ ░ ░░ ░ ░ ░ ░ ░ ░ ░ ░
░ ░ ░ ░ ░ ░ ░ ░░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░
░ ░ ░
\033[0m*"
echo -e " \e[1;31m *---------------------* \e[0m"
printf " \e[1;31m|\e[0m \033[1;32mWelcome Hacker\033[0m \e[1;31m|\e[0m\n"
printf " \e[1;31m|\e[0m\033[1;32m Keep Safe! \033[0m\e[1;31m|\e[0m\n"
echo -e " \e[1;31m *---------------------*\e[0m"
printf " \e[1;31m/ \ \e[0m \n"
printf " \e[1;31m/ \ \e[0m \n"
day=$(date +%A)
User=$(whoami)
echo -e " \e[1;37m ------------------ ----------------\e[0m"
echo -e " \e[1;37m|\e[0m\033[6mToday is : $day\033[0m\e[1;37m|\e[0m\e[1;37m |\e[0m \033[6mUser Is : $User\033[0m\e[1;37m |\e[0m"
echo -e " \e[1;37m ------------------ ----------------\e[0m"
echo -e " *_____________________*"
echo -e " |\033[1;32mYour Wifi Mac-Address\033[0m|"
echo "*----------------------*---------------------*"
ifconfig wlan0 down
macchanger -r wlan0
echo "*--------------------------------------------*"
echo " *_________________________*"
echo -e " |\033[1;32mYour Ethernet Mac-Address\033[0m|"
echo "*---------------------*-------------------------*"
macchanger -r wlan0
ifconfig wlan0 up
echo "*-----------------------------------------------*"
echo -e " *\033[1;32m 🅷🅰🆅🅴 🅰 🅽🅸🅲🅴 🅳🅰🆈! \033[0m*"
echo -e " *\033[1;32mType macchanger --show wlan0 OR macchanger --show eth0\033[0m*"

51
site/download/paranoid.sh Normal file
View File

@ -0,0 +1,51 @@
echo -e "
\033[1;32m
.d8888b. 888 d8888 888 888~~~
d88P Y88b 888 d88888 888 888~~~~~
888 888 888 d88P888 888 888~~~~~~~
888 888 .d88b. 8888b. 88888b. d88P 888 888 888~ ~ ~~~~~~
888 888 d8P Y8b 88b 888 88b d88P 888 888 888~~~~ ~~~~~~
888 888 888 88888888 .d888888 888 888 d88P 888 888 888~~~~~~~~
Y88b d88P 888 Y8b. 888 888 888 888 d8888888888 888 888~~ ~ ~~
Y8888P 888 Y8888 Y888888 888 888 d88P 888 888 888~~
// \\
||========================================================================||
𝓢𝓮𝓬𝓾𝓻𝓮 𝓭𝓮𝓵𝓮𝓽𝓮 𝔂𝓸𝓾𝓻 𝓽𝓮𝓶𝓹, 𝓽𝓻𝓪𝓼𝓱 𝓪𝓷𝓭 𝓯𝓻𝓮𝓮 𝓭𝓲𝓼𝓴 𝓼𝓹𝓪𝓬𝓮 ||
===========================================================================
𝒞𝓇𝑒𝒶𝓉𝑒𝒹 𝐵𝓎 𝒞𝓇𝒾𝓈𝓉𝒾𝒶𝓃 𝒞. 𝑀𝑜𝒾𝓈és
--------------------------------------\033[0m"
day=$(date +%A)
User=$(whoami)
now=$(date +"%T")
echo -e " \e[1;37m ||\e[0m\033[6m Today is : $day\033[0m\e[1;37m|\e[0m\e[1;37m || Time: $now ||\e[0m \033[6m User Is : $User\033[0m\e[1;37m ||\e[0m"
echo "----------------------------------------------------------------------"
echo "|| 𝓢𝓲𝔃𝓮 𝓸𝓯 𝓕𝓲𝓵𝓮𝓼 ||"
echo "----------------------------------------------------------------------"
du -h --max-depth=1 /tmp/ /var/log/ /var/cache/ ~/.cache/
echo "----------------------------------------------------------------------"
echo "|| 𝓒𝓵𝓮𝓪𝓷𝓲𝓷𝓰 ||"
echo "----------------------------------------------------------------------"
cd /
rm -rfv ~/var/log/*
rm -rfv ~/var/cache/*
rm -rfv ~/.cache/*
rm -rfv ~/tmp/*
rm -rfv ~/usr/src/tmp/*
rm -rfv ~/.bash_history
rm -rfv /zero.yes /zero.file
echo " "
echo "----------------------------------------------------------------------"
echo "|| 𝓒𝓵𝓮𝓪𝓷𝓲𝓷𝓰 𝓕𝓻𝓮𝓮 𝓤𝓹 𝓢𝓹𝓪𝓬𝓮 ||"
echo "----------------------------------------------------------------------"
dd if=/dev/urandom of=zero.small.file bs=1024 count=102400
shred -z zero.small.file
cat /dev/urandom > zero.file
sync
rm zero.small.file
shred -z zero.file
sync
rm zero.file
echo "----------------------------------------------------------------------"
echo "|| 𝟙𝟘𝟘% 𝓒𝓵𝓮𝓪𝓷 ||"
echo "---------------------------------------------------------------------"
exit 0

5
site/download/torando.sh Normal file
View File

@ -0,0 +1,5 @@
sudo iptables -t nat -A OUTPUT -p tcp -m owner --uid-owner USERAQUI -m tcp -j REDIRECT --to-ports 9040
sudo iptables -t nat -A OUTPUT -p udp -m owner --uid-owner USERAQUI -m udp --dport 53 -j REDIRECT --to-ports 53
sudo iptables -t filter -A OUTPUT -p tcp -m owner --uid-owner USERAQUI -m tcp --dport 9040 -j ACCEPT
sudo iptables -t filter -A OUTPUT -p udp -m owner --uid-owner USERAQUI -m udp --dport 53 -j ACCEPT
sudo iptables -t filter -A OUTPUT -m owner --uid-owner USERAQUI -j DROP

5
site/download/toroff.sh Normal file
View File

@ -0,0 +1,5 @@
sudo iptables -t nat -D OUTPUT -p tcp -m owner --uid-owner USERAQUI -m tcp -j REDIRECT --to-ports 9040
sudo iptables -t nat -D OUTPUT -p udp -m owner --uid-owner USERAQUI -m udp --dport 53 -j REDIRECT --to-ports 53
sudo iptables -t filter -D OUTPUT -p tcp -m owner --uid-owner USERAQUI -m tcp --dport 9040 -j ACCEPT
sudo iptables -t filter -D OUTPUT -p udp -m owner --uid-owner USERAQUI -m udp --dport 53 -j ACCEPT
sudo iptables -t filter -D OUTPUT -m owner --uid-owner USERAQUI -j DROP

Binary file not shown.

1
site/download/void.sh Normal file
View File

@ -0,0 +1 @@
docker pull voidlinux/voidlinux

2
site/fasteros.html Normal file
View File

@ -0,0 +1,2 @@
<!DOCTYPE html><head><meta charset="utf-8" /><meta name="description" content="C.C.M. personal website" /><meta name="viewport" content="width=device-width, initial-scale=1" /><title>Faster⚡OS — C.C.M. Homepage</title><link rel="stylesheet" href="/css/default.css" /></head><body><header><div id="block"><p>+&gt;---------------------------&lt;+</p><p>[<a href="/about.html">About</a>]--[<a href="/research.html">Research</a>]--[<a href="/projects.html">Projects</a>]</p><p>+&gt;---------------------------&lt;+</p><br /></div></header><div id="block"><h1>Faster⚡OS</h1><div>February 13, 2024</div><div><h2>My Web Operating System</h2><h3>Free.</h3><p>A web operating system for you!</p><h3>Easy.</h3><p>Just click [<a href="https://fasteros.vercel.app">here</a>] and visit now.</p><p>For the android app click[<a href="https://play.google.com/store/apps/details/FasterOS?id=com.faster.os">here</a>]</p><h2>Screenshots</h2><p><div style="text-align: center"><img src="/images/faster1.png" /></div></p><p><div style="text-align: center"><img src="/images/faster2.png" /></div></p><p><div style="text-align: center"><img src="/images/faster3.png" /></div></p><p><div style="text-align: center"><img src="/images/faster4.png" /></div></p><h2>Description</h2><p>All files are running on your local computer. Convert, play music, and more with this.
FasterOS is a web operating system created for help users in daily tasks and for help security enthusiasts and students.</p><h4>🖥️ Run linux systems</h4><h4>⤴️ Upload files</h4><h4>📥 Download files</h4><h4>🌐 Browse in built-in browser</h4><h4>🖼️ Convert images: bmp,gif,png,jpeg,jpg,psd,svg,tiff</h4><h4>🎵 Convert Audio: aac,mp3,ogg,wav</h4><h4>💼 Convert Sheets: xlsx,csv,numbers,ods,xls</h4><h4>🗜️ Compress and extract files</h4><h4>🧠 Learn about: Linux, Windows, Hacking, Data Security and Forensics</h4><h4>💀 The system has a list of tutorials and hacking tools</h4><h4>🔎 Malware list for analysis</h4><h4>🎮 Games and Emulators</h4><h3>🛡️ Security:</h3><h4>👉 You can turn off your cell phone so that your settings remain saved in the app</h4><h3>🔒 Privacy:</h3><h4>👉 All data is cleared on clicking shutdown</h4><h3>GOALS:</h3><h4>🧭 Study assistant</h4><h4>⏱️ Speed up the production process</h4><h4>🏆 Help the community</h4><h4>🇧🇷 Official Language</h4></div></div><footer><div id="block"><br /><p>+&gt;---------------------------&lt;+</p><div>[<a href="https://github.com/cristiancmoises">GitHub</a>]--[<a href="https://www.linkedin.com/in/cristiancezarmoises">LinkedIn</a>]</div><div>[<a href="https://orcid.org/0000-0001-9533-4916">ORCID</a>]--[<a href="https://arxiv.org/search/?">ArXiv</a>]--[<a href="https://youtube.com/@securityops">Youtube</a>]</div><p>© 2024 Cristian Cezar Moises</p><p>[<a href="https://creativecommons.org/licenses/by-sa/4.0/">CC BY-SA 4.0</a>]</p><p>Built with [<a href="http://haunt.dthompson.us">Haunt</a>] in [<a href="https://www.gnu.org/software/guile/guile.html">Scheme</a>]</p><p>+&gt;---------------------------&lt;+</p></div></footer></body>

BIN
site/images/anon.gif Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 2.2 MiB

BIN
site/images/clean.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 35 KiB

BIN
site/images/dark.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 138 KiB

BIN
site/images/dockervm.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 208 KiB

BIN
site/images/faster1.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 57 KiB

BIN
site/images/go.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 216 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 2.6 MiB

BIN
site/images/paranoid.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 126 KiB

BIN
site/images/profile.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 69 KiB

BIN
site/images/revolver.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 305 KiB

BIN
site/images/st.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 98 KiB

BIN
site/images/steg.gif Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 317 KiB

BIN
site/images/steghide.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 48 KiB

BIN
site/images/stegroute.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 71 KiB

BIN
site/images/torando.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 329 KiB

1
site/index.html Normal file
View File

@ -0,0 +1 @@
<!DOCTYPE html><head><meta charset="utf-8" /><meta name="description" content="C.C.M. personal website" /><meta name="viewport" content="width=device-width, initial-scale=1" /><title>Home — C.C.M. Homepage</title><link rel="stylesheet" href="/css/default.css" /></head><body><header><div id="block"><p>+&gt;---------------------------&lt;+</p><p>[<a href="/about.html">About</a>]--[<a href="/research.html">Research</a>]--[<a href="/projects.html">Projects</a>]</p><p>+&gt;---------------------------&lt;+</p><br /></div></header><div id="block"><div style="text-align: center"><img src="images/mainframe_256x256.gif" /></div></div><footer><div id="block"><br /><p>+&gt;---------------------------&lt;+</p><div>[<a href="https://github.com/cristiancmoises">GitHub</a>]--[<a href="https://www.linkedin.com/in/cristiancezarmoises">LinkedIn</a>]</div><div>[<a href="https://orcid.org/0000-0001-9533-4916">ORCID</a>]--[<a href="https://arxiv.org/search/?">ArXiv</a>]--[<a href="https://youtube.com/@securityops">Youtube</a>]</div><p>© 2024 Cristian Cezar Moises</p><p>[<a href="https://creativecommons.org/licenses/by-sa/4.0/">CC BY-SA 4.0</a>]</p><p>Built with [<a href="http://haunt.dthompson.us">Haunt</a>] in [<a href="https://www.gnu.org/software/guile/guile.html">Scheme</a>]</p><p>+&gt;---------------------------&lt;+</p></div></footer></body>

1
site/projects.html Normal file
View File

@ -0,0 +1 @@
<!DOCTYPE html><head><meta charset="utf-8" /><meta name="description" content="C.C.M. personal website" /><meta name="viewport" content="width=device-width, initial-scale=1" /><title>Recent Posts — C.C.M. Homepage</title><link rel="stylesheet" href="/css/default.css" /></head><body><header><div id="block"><p>+&gt;---------------------------&lt;+</p><p>[<a href="/about.html">About</a>]--[<a href="/research.html">Research</a>]--[<a href="/projects.html">Projects</a>]</p><p>+&gt;---------------------------&lt;+</p><br /></div></header><div id="block"><h1>Recent Posts</h1><div><h2><a href="/-gorilazadah.html" style="text-decoration: none;">🦍 Gorilazadah</a></h2><div>February 18, 2024</div><div><h2>Awesome Script for Clean and Update your Windows</h2></div>[<a href="/-gorilazadah.html">read more...</a>]<br /><p style="text-align: center;">--&gt;--&lt;--</p></div><div><h2><a href="/-dockervm.html" style="text-decoration: none;">📦 DockerVM</a></h2><div>February 18, 2024</div><div><h2>Use docker like Qemu/VmWare/Virtualbox</h2></div>[<a href="/-dockervm.html">read more...</a>]<br /><p style="text-align: center;">--&gt;--&lt;--</p></div><div><h2><a href="/-torando.html" style="text-decoration: none;">🛡️ Torando</a></h2><div>February 17, 2024</div><div><h2>Tor VPN on whole system</h2></div>[<a href="/-torando.html">read more...</a>]<br /><p style="text-align: center;">--&gt;--&lt;--</p></div><div><h2><a href="/-servervm.html" style="text-decoration: none;">🖥️ ServerVM</a></h2><div>February 16, 2024</div><div><h2>Graphical Interface for Servers with NoVnc</h2></div>[<a href="/-servervm.html">read more...</a>]<br /><p style="text-align: center;">--&gt;--&lt;--</p></div><div><h2><a href="/-awesome-steganography.html" style="text-decoration: none;">🕵️ Awesome Steganography</a></h2><div>February 16, 2024</div><div><h2>Awesome Tools for Steganography 🕵️</h2></div>[<a href="/-awesome-steganography.html">read more...</a>]<br /><p style="text-align: center;">--&gt;--&lt;--</p></div><div><h2><a href="/-brutefox.html" style="text-decoration: none;">💪 Brutefox</a></h2><div>February 15, 2024</div><div><h2>Firefox with steroids</h2></div>[<a href="/-brutefox.html">read more...</a>]<br /><p style="text-align: center;">--&gt;--&lt;--</p></div><div><h2><a href="/-space-invaders.html" style="text-decoration: none;">👾 Space Invaders</a></h2><div>February 15, 2024</div><div><h3>Amazing tricks for hacking [SSH]</h3></div>[<a href="/-space-invaders.html">read more...</a>]<br /><p style="text-align: center;">--&gt;--&lt;--</p></div><div><h2><a href="/-openbsd-portfolio.html" style="text-decoration: none;">🐡 OpenBsd Portfolio</a></h2><div>February 15, 2024</div><div><h2>My OpenBsd Portfolio</h2></div>[<a href="/-openbsd-portfolio.html">read more...</a>]<br /><p style="text-align: center;">--&gt;--&lt;--</p></div><div><h2><a href="/-vnc-revolver.html" style="text-decoration: none;">💥 VNC Revolver</a></h2><div>February 14, 2024</div><div><h2>Search for open VNC servers around the world</h2></div>[<a href="/-vnc-revolver.html">read more...</a>]<br /><p style="text-align: center;">--&gt;--&lt;--</p></div><div><h2><a href="/fasteros.html" style="text-decoration: none;">Faster⚡OS</a></h2><div>February 13, 2024</div><div><h2>My Web Operating System</h2></div>[<a href="/fasteros.html">read more...</a>]<br /><p style="text-align: center;">--&gt;--&lt;--</p></div><div><h2><a href="/-spoofmac.html" style="text-decoration: none;">👻 SpoofMac</a></h2><div>February 11, 2024</div><div><h2>Change mac address on reboot</h2></div>[<a href="/-spoofmac.html">read more...</a>]<br /><p style="text-align: center;">--&gt;--&lt;--</p></div><div><h2><a href="/-clean-all.html" style="text-decoration: none;">🧹 Clean All</a></h2><div>February 10, 2024</div><div><h2>Secure delete trash, temp and free space</h2></div>[<a href="/-clean-all.html">read more...</a>]<br /><p style="text-align: center;">--&gt;--&lt;--</p></div></div><footer><div id="block"><br /><p>+&gt;---------------------------&lt;+</p><div>[<a href="https://github.com/cristiancmoises">GitHub</a>]--[<a href="https://www.linkedin.com/in/cristiancezarmoises">LinkedIn</a>]</div><div>[<a href="https://orcid.org/0000-0001-9533-4916">ORCID</a>]--[<a href="https://arxiv.org/search/?">ArXiv</a>]--[<a href="https://youtube.com/@securityops">Youtube</a>]</div><p>© 2024 Cristian Cezar Moises</p><p>[<a href="https://creativecommons.org/licenses/by-sa/4.0/">CC BY-SA 4.0</a>]</p><p>Built with [<a href="http://haunt.dthompson.us">Haunt</a>] in [<a href="https://www.gnu.org/software/guile/guile.html">Scheme</a>]</p><p>+&gt;---------------------------&lt;+</p></div></footer></body>

1
site/research.html Normal file
View File

@ -0,0 +1 @@
<!DOCTYPE html><head><meta charset="utf-8" /><meta name="description" content="C.C.M. personal website" /><meta name="viewport" content="width=device-width, initial-scale=1" /><title>Published Work — C.C.M. Homepage</title><link rel="stylesheet" href="/css/default.css" /></head><body><header><div id="block"><p>+&gt;---------------------------&lt;+</p><p>[<a href="/about.html">About</a>]--[<a href="/research.html">Research</a>]--[<a href="/projects.html">Projects</a>]</p><p>+&gt;---------------------------&lt;+</p><br /></div></header><div id="block"><h1>Published Work</h1></div><footer><div id="block"><br /><p>+&gt;---------------------------&lt;+</p><div>[<a href="https://github.com/cristiancmoises">GitHub</a>]--[<a href="https://www.linkedin.com/in/cristiancezarmoises">LinkedIn</a>]</div><div>[<a href="https://orcid.org/0000-0001-9533-4916">ORCID</a>]--[<a href="https://arxiv.org/search/?">ArXiv</a>]--[<a href="https://youtube.com/@securityops">Youtube</a>]</div><p>© 2024 Cristian Cezar Moises</p><p>[<a href="https://creativecommons.org/licenses/by-sa/4.0/">CC BY-SA 4.0</a>]</p><p>Built with [<a href="http://haunt.dthompson.us">Haunt</a>] in [<a href="https://www.gnu.org/software/guile/guile.html">Scheme</a>]</p><p>+&gt;---------------------------&lt;+</p></div></footer></body>