Wednesday, 27 February 2019

Last Day on Earth Mod v1.11.6 (Unlimited Money, All Craft Free, Etc..)



Game Info :-

The survival shooter Last Day on Earth is set in a post apocalyptic world: in 2027 the world saw an outbreak of an unknown infection that destroyed almost all the human race. And it didn’t stop there. All those dead started turning into zombies and those few survivors that have resistance in their blood are trying to survive on the ruins of the once great world.

And now the survival of your character is only in your power! Keep an eye on your character’s life stats such as hunger and thirst, collect valuable resources for crafting, create weapons and transport of different types or use what you have at hand: a bat or a road sign. Everything will come in handy for killing dozens... hundreds…thousands of zombies!

Defeat intruders to your land not only with your power but also cunning – construct fortifications with traps or go raid other survivors’ territories for the sake of rare loot and resources. After all people can do anything to survive.

Hardcore fans will have plenty to do in tough seasonal locations. Before going to a desperate trip, equip your survivor with the most crushing weapon to hunt wild animals and destroy crowds of mutated zombies. One can reach seasonal location on a transport that’s available for crafting. Moreover if you pass the wall on the west of the map you will enter an online location where with a special costume on, you will be able to interact with other players.

Explore the large and deep-laid world of Last Day on Earth! Upgrade your hero, equip your house, loot abandoned territories, hunt wild animals and other survivors – the new world has new rules.

Will you survive in conditions like these? If so, what price are you ready to pay?

Download Link's :-

DOWNLOAD

PUBLIC ENEMY 23 - Burned By The Night 1985

This rare mini 12'' by Public Enemy 23 from Hamburg was released on Gabba Gabba Hey Records and the band consisted of Franky and Esther (vocals), Gale (guitars), Jenne (bass) and Fingers (drums) and I first came in touch with the band through a song on the blessed Slam-Brigade Haifischbar compilation via Weird System (1991). They rocked the clubs of the Reeperbahn in the 80s with their refreshing Punk'n'Roll in which they celebrated numerous Gassenhauer plus own goodies and which coat they gave them can you recognize by these six songs. I would say: Lost Little Nugget!

- Great Thx to Nolti -


Kali Linux 2019.1 Released - What's new?

Kali Linux 2019.1 Released - What's new?

Since the first release in 2013 with 1.0.0, Kali Linux has updated 24 different versions (in this time) with many upgrades and bug fixes. You can read Kali Linux Release History below:
 * Kali Linux 2019.1 – 18th February, 2019 – The First 2019 Kali Rolling release. Read details here.
 * Kali Linux 2018.4 – 29th October, 2018 – The Fourth 2018 Kali Rolling release. Read details here.
 * Kali Linux 2018.3 – 27th August, 2018 – The Third 2018 Kali Rolling release. Read details here.
 * Kali Linux 2018.2 – 30th April, 2018 – The Second 2018 Kali Rolling release. Read details here.
 * Kali Linux 2018.1 – 6th February, 2018 – The first 2018 Kali Rolling release. Read details here.
 * Kali Linux 2017.3 – 21st November, 2017 – The third 2017 Kali Rolling release. Read details here.
 * Kali Linux 2017.2 – 20th September, 2017 – The second 2017 Kali Rolling release. Read details here.
 * Kali Linux 2017.1 – 25th April, 2017 – The first 2017 Kali Rolling release. Read details here.
 * Kali Linux 2016.2 – 31st August, 2016 – The second Kali Rolling release. Read details here.
 * Kali Linux 2016.1 – 21st January, 2016 – The first Kali Rolling release. Read details here.
 * Kali Linux 2.0 – 11th August, 2015 – Read details here.
 * Kali Linux 1.1.0a – 13th March, 2015.
 * Kali Linux 1.1.0 – 9th Febuary, 2015 – Read details here.
 * Kali Linux 1.0.9a – 6th October, 2014 – Read details here.
 * Kali Linux 1.0.9 – 25th August, 2014 – Read details here.
 * Kali Linux 1.0.8 – 22nd July, 2014 – Read details here.
 * Kali Linux 1.0.7 – 27th May, 2014 – Read details here.
 * Kali Linux 1.0.6 – 9th January, 2014 – Read details here.
 * Kali Linux 1.0.5 – 5th September, 2013.
 * Kali Linux 1.0.4 – 25th July, 2013.
 * Kali Linux 1.0.3 – 26th April, 2013.
 * Kali Linux 1.0.2 – 27th March, 2013.
 * Kali Linux 1.0.1 – 14th March, 2013.
 * Kali Linux 1.0.0 – 13th March, 2013.

And now, Offensive Security has released Kali Linux 2019.1 with many upgrades and bug fixes. So what's new in Kali Linux 2019.1?

Metasploit Framework newest and many tool upgrades
root@kali:~# msfconsole 

     ,           ,
    /             \
   ((__---,,,---__))
      (_) O O (_)_________
         \ _ /            |\
          o_o \   M S F   | \
               \   _____  |  *
                |||   WW|||
                |||     |||


       =[ metasploit v5.0.2-dev                           ]
+ -- --=[ 1852 exploits - 1046 auxiliary - 325 post       ]
+ -- --=[ 541 payloads - 44 encoders - 10 nops            ]
+ -- --=[ 2 evasion                                       ]
+ -- --=[ ** This is Metasploit 5 development branch **   ]


msf5 >
   Metasploit Framework 5.0 is a massive update that includes database and automation APIs, new evasion capabilities, and usability improvements throughout. Check out their in-progress release notes to learn about all the new goodness.
   Kali Linux 2019.1 also includes updated packages for theHarvester, DBeaver, and more. For the complete list of updates, fixes, and additions, please refer to the Kali Bug Tracker Changelog.

ARM Updates: The 2019.1 Kali Linux release for ARM includes the return of Banana Pi and Banana Pro, both of which are on the 4.19 kernel. Veyron has been moved to a 4.19 kernel and the Raspberry Pi images have been simplified so it is easier to figure out which one to use. There are no longer separate Raspberry Pi images for users with TFT LCDs because we now include re4son’s kalipi-tft-config script on all of them, so if you want to set up a board with a TFT, run kalipi-tft-config and follow the prompts.

Download or Upgrade to Kali Linux 2019.1
   If you would like to check out this latest and greatest Kali release, you can find download links for ISOs and Torrents on the Kali Linux Downloads page along with links to the Offensive Security virtual machine and ARM images, which have also been updated to 2019.1. If you already have a Kali installation you’re happy with, you can easily upgrade with the following command:
   apt update && apt -y full-upgrade

Ensuring your Installation is Updated
   To double check your version, first make sure your Kali Linux package repositories are correct.
root@kali:~# cat /etc/apt/sources.list
deb http://http.kali.org/kali kali-rolling main non-free contrib

   Then after running apt -y full-upgrade, you may require a reboot before checking:
root@kali:~# grep VERSION /etc/os-release
VERSION="2019.1"
VERSION_ID="2019.1"
root@kali:~#
root@kali:~# uname -a
Linux kali 4.19.0-kali1-amd64 #1 SMP Debian 4.19.13-1kali1 (2019-01-03) x86_64 GNU/Linux

   If you come across any bugs in Kali Linux, please open a report on their bug tracker. Offensive Security will never be able to fix what they don’t know about.


Uploading Sitemap In Google

Help Center Get Clicked! SEO How do I Submit my XML Sitemap to Google Search Console? Step 1. Submit your site to Google Search Console From the Google Search Console Dashboard click on the Add a Property on the top right of the screen.

 When the Add a Property pop up appears enter the full address to your shop (including the https://part). This could look something like https://www.myshop.com not like mystore.myshopify.com

 Step 2. Verify your site Google needs to make sure that you are the owner of the site you are submitting. There are a few ways to do this, the quickest way is if you have Google Analytics already on your shop. If you have Google Analytics on your shop then you can click on the Alternate Methods tab.

 Now select the Google Analytics option and click on the Verify button. If you do not have Google Analytics installed, you can still verify you site in a variety of ways. Google has a guide for verifying your site with Google Search Console. Take a look at the guide for more information on the verification process.

 Step 3. Add your Sitemap From your search console, on the Sitemaps section, click on the gray bar that says No Sitemaps. Now on the new page click on the button on the top right of your screen that says Add/Test Sitemap. On the popup that appears, after your site name enter sitemap.xml and click on the submit button. If a link appears saying to refresh the page, then click on it. Now your sitemap should display and it should say “Pending”. xml sitemap google submission You’re All Done!\

 Your XML sitemap is now submitted to Google! As you continue to use your shop to add products, and other types of content your sitemap will update automatically. Your sitemap will update automatically and will keep Google informed of any changes. Important Note: Make sure that you’re submitting your XML sitemap URL, and not your HTML sitemap URL. If you accidentally submit your HTML sitemap URL to Google Search Console, you’ll get an error. Your XML sitemap is your website URL plus “/sitemap.xml” at the end.


Tuesday, 26 February 2019

SniffAir - An Open-source Wireless Security Framework

About SniffAir
   SniffAir is an open-source wireless security framework which provides the ability to easily parse passively collected wireless data as well as launch sophisticated wireless attacks. SniffAir takes care of the hassle associated with managing large or multiple pcap files while thoroughly cross-examining and analyzing the traffic, looking for potential security flaws. Along with the prebuilt queries, SniffAir allows users to create custom queries for analyzing the wireless data stored in the backend SQL database. SniffAir is built on the concept of using these queries to extract data for wireless penetration test reports. The data can also be leveraged in setting up sophisticated wireless attacks included in SniffAir as modules.

   SniffAir is developed by @Tyl0us and @theDarracott.

Install and run SniffAir
   git clone https://github.com/Tylous/SniffAir
   cd SniffAir
   sudo bash setup.sh
   pip install -r requirements.txt
   sudo python SniffAir.py

Start with SniffAir
   First create or load a new or existing workspace using the command workspace create <workspace> or workspace load <workspace> command. To view all existing workspaces use the workspace list command and workspace delete <workspace> command to delete the desired workspace:

>>  [default]# workspace
     Manages workspaces
 Command Option: workspaces [create|list|load|delete]
>>  [default]# workspace create demo
[+]  Workspace demo created

Load data into a desired workplace from a pcap file using the command offline_capture <the full path to the pcap file>. To load a series of pcap files use the command offline_capture_list <the full path to the file containing the list of pcap name> (this file should contain the full patches to each pcap file). Use the live_capture <interface name> command to capture live wireless traffic using a wireless interface.

>>  [demo]# offline_capture /root/sniffair/demo.pcapdump
[+] Importing /root/sniffair/demo.pcapdump
\
[+] Completed
[+] Cleaning Up Duplicates
[+] ESSIDs Observed

Show Command
   The show command displays the contents of a table, specific information across all tables or the available modules, using the following syntax:

 >>  [demo]# show table AP
+------+-----------+-------------------+-------------------------------+--------+-------+-------+----------+--------+
|   ID | ESSID     | BSSID             | VENDOR                        |   CHAN |   PWR | ENC   | CIPHER   | AUTH   |
|------+-----------+-------------------+-------------------------------+--------+-------+-------+----------+--------|
|    1 | HoneyPot  | c4:6e:1f:##:##:## | TP-LINK TECHNOLOGIES CO. LTD. |      4 |   -17 | WPA2  | TKIP     | MGT    |
|    2 | Demo      | 80:2a:a8:##:##:## | Ubiquiti Networks Inc.        |     11 |   -19 | WPA2  | CCMP     | PSK    |
|    3 | Demo5ghz  | 82:2a:a8:##:##:## | Unknown                       |     36 |   -27 | WPA2  | CCMP     | PSK    |
|    4 | HoneyPot1 | c4:6e:1f:##:##:## | TP-LINK TECHNOLOGIES CO. LTD. |     36 |   -29 | WPA2  | TKIP     | PSK    |
|    5 | BELL456   | 44:e9:dd:##:##:## | Sagemcom Broadband SAS        |      6 |   -73 | WPA2  | CCMP     | PSK    |
+------+-----------+-------------------+-------------------------------+--------+-------+-------+----------+--------+
 >>  [demo]# show SSIDS
---------
HoneyPot
Demo
HoneyPot1
BELL456
Hidden
Demo5ghz
---------

   The query command can be used to display a unique set of data based on the parememters specificed. The query command uses sql syntax.

Inscope: The inscope <SSID> command can be used to add a SSID to the inscope tables, loading all related data to the inscope_AP, inscope_proberequests and inscope_proberesponses tables. To view a summary of all inscope SSIDS run the SSID_Info command.

Modules
   Modules can be used to analyze the data contained in the workspaces or perform offensive wireless attacks using the use <module name> command. For some modules additional variables may need to be set. They can be set using the set command set <variable name> <variable value>:

 >>  [demo]# show modules
Available Modules
=================
[+] Auto EAP - Automated Brute-Force Login Attack Against EAP Networks
[+] Auto PSK - Automated Brute-Force Passphrase Attack Against PSK Networks
[+] AP Hunter - Discover Access Point Within  a Certain Range Using a Specific Type of Encrpytion
[+] Captive Portal - Web Based Login Portal to Capture User Entered Credentials (Runs as an OPEN Network)
[+] Certificate Generator - Generates a Certificate Used by Evil Twin Attacks
[+] Exporter - Exports Data Stored in a Workspace to a CSV File
[+] Evil Twin - Creates a Fake Access Point, Clients Connect to Divulging MSCHAP Hashes or Cleartext Passwords
[+] Handshaker - Parses Database or .pcapdump Files Extracting the Pre-Shared Handshake for Password Guessing (Hashcat or JTR Format)
[+] Mac Changer - Changes The Mac Address of an Interface
[+] Probe Packet - Sends Out Deauth Packets Targeting SSID(s)
[+] Proof Packet - Parses Database or .pcapdump Files Extracting all Packets Related to the Inscope SSDIS
[+] Hidden SSID - Discovers the Names of HIDDEN SSIDS
[+] Suspicious AP - Looks for Access Points that: Is On Different Channel, use a Different Vendor or Encrpytion Type Then the Rest of The Network
[+] Wigle Search SSID - Queries wigle for SSID (i.e. Bob's wifi)
[+] Wigle Search MAC - Queries wigle for all observations of a single mac address
 >>  [demo]# 
 >>  [demo]# use Captive Portal
 >>  [demo][Captive Portal]# info
Globally Set Varibles
=====================
 Module: Captive Portal
 Interface: 
 SSID: 
 Channel: 
 Template: Cisco (More to be added soon)
 >>  [demo][Captive Portal]# set Interface wlan0
 >>  [demo][Captive Portal]# set SSID demo
 >>  [demo][Captive Portal]# set Channel 1
 >>  [demo][Captive Portal]# info
Globally Set Varibles
=====================
 Module: Captive Portal
 Interface: wlan0
 SSID: demo
 Channel: 1
 Template: Cisco (More to be added soon)
 >>  [demo][Captive Portal]# 

   Once all varibles are set, then execute the exploit or run command to run the desired attack.

Export: To export all information stored in a workspace’s tables using the Exporter module and setting the desired path.

Acknowledgments: Sniffiar contains work from the following repoisoties: