!AgURMRJcfHMMMRnaqE:openintents.modular.im

DataMatter :|: IRC :: privy.cafe :: SSL port 6697 - Password : dg4lprivy - :|: DemoNSAw Router - privy.cafe :: port 8080 - - Password : dg4lprivy -

134 Members
#DG4L :: community page : +hackers:openintents.modular.im :: Unencrypted room #quasar:openintents.modular.im :: #vxug:vxjes.us :: Community Homepage https:://privy.cafe 34 Servers

Load older messages


SenderMessageTime
4 Jan 2020
@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im
https://raw.githubusercontent.com/StevenBlack/hosts/master/hosts 
https://mirror1.malwaredomains.com/files/justdomains
http://sysctl.org/cameleon/hosts
https://zeustracker.abuse.ch/blocklist.php?download=domainblocklist
https://s3.amazonaws.com/lists.disconnect.me/simple_tracking.txt
https://s3.amazonaws.com/lists.disconnect.me/simple_ad.txt
https://hosts-file.net/ad_servers.txt
11:45:17
@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im invited @krime:vxjes.uskrime .11:45:28
@krime:vxjes.uskrime joined the room.11:45:35
@krime:vxjes.uskrime goddamn atmos, you scared me 11:45:44
@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.imRedacted or Malformed Event11:48:24
@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im *

These are the ones I've been collecting so far:

http://winhelp2002.mvps.org/hosts.txthttps://adaway.org/hosts.txthttps://bitbucket.org/ethanr/dns-blacklists/raw/8575c9f96e5b4a1308f2f12394abd86d0927a4a0/bad_lists/Mandiant_APT1_Report_Appendix_D.txthttps://dnsbl.karelvanhecke.com/adg-ad.txthttps://dnsbl.karelvanhecke.com/adg-mobile.txthttps://dnsbl.karelvanhecke.com/adg-spyware.txthttps://dnsbl.karelvanhecke.com/airelle-ads.txthttps://dnsbl.karelvanhecke.com/airelle-mal.txthttps://dnsbl.karelvanhecke.com/airelle-trc.txthttps://dnsbl.karelvanhecke.com/c2.txthttps://dnsbl.karelvanhecke.com/dga.txthttps://dnsbl.karelvanhecke.com/easylist.txthttps://dnsbl.karelvanhecke.com/easyprivacy.txthttps://dnsbl.karelvanhecke.com/mwpatrol.txthttps://dnsbl.karelvanhecke.com/openphish.txthttps://dnsbl.karelvanhecke.com/openphish_30d.txthttps://dnsbl.karelvanhecke.com/otx.txthttps://dnsbl.karelvanhecke.com/phishtank.txthttps://dnsbl.karelvanhecke.com/shalla-adv.txthttps://dnsbl.karelvanhecke.com/shalla-spyware.txthttps://dnsbl.karelvanhecke.com/shalla-tracker.txthttps://dnsbl.karelvanhecke.com/urlhaus.txthttps://dnsbl.karelvanhecke.com/ut1-ads.txthttps://dnsbl.karelvanhecke.com/ut1-mal.txthttps://dnsbl.karelvanhecke.com/ut1-phi.txthttps://gist.githubusercontent.com/Perflyst/315f86393712a0c2107ee8eb58c6acee/rawhttps://hosts-file.net/ad_servers.txthttps://hosts-file.net/emd.txthttps://hosts-file.net/exp.txthttps://hosts-file.net/grm.txthttps://hosts-file.net/psh.txthttps://hostsfile.mine.nu/hosts0.txthttps://jasonhill.co.uk/pfsense/ytadblock.txthttps://mirror.cedia.org.ec/malwaredomains/immortal_domains.txthttps://mirror1.malwaredomains.com/files/justdomainshttps://pgl.yoyo.org/adservers/serverlist.php?hostformat=hosts;showintro=0https://phishing.army/download/phishing_army_blocklist_extended.txthttps://ransomwaretracker.abuse.ch/downloads/RW_DOMBL.txthttps://raw.githubusercontent.com/anudeepND/blacklist/master/adservers.txthttps://raw.githubusercontent.com/CHEF-KOCH/CKs-FilterList/master/HOSTS/Ads-tracker.txthttps://raw.githubusercontent.com/CHEF-KOCH/CKs-FilterList/master/HOSTS/coinminer.txthttps://raw.githubusercontent.com/CHEF-KOCH/CKs-FilterList/master/HOSTS/Malware.txthttps://raw.githubusercontent.com/CHEF-KOCH/NSABlocklist/master/HOSTShttps://raw.githubusercontent.com/CHEF-KOCH/WebRTC-tracking/master/WebRTC.txthttps://raw.githubusercontent.com/crazy-max/WindowsSpyBlocker/master/data/hosts/spy.txthttps://raw.githubusercontent.com/Dawsey21/Lists/master/main-blacklist.txthttps://raw.githubusercontent.com/deathbybandaid/piholeparser/master/Subscribable-Lists/ParsedBlacklists/AakList.txthttps://raw.githubusercontent.com/deathbybandaid/piholeparser/master/Subscribable-Lists/ParsedBlacklists/Prebake-Obtrusive.txthttps://raw.githubusercontent.com/EnergizedProtection/block/master/unified/formats/domains.txthttps://raw.githubusercontent.com/HorusTeknoloji/TR-PhishingList/master/url-lists.txthttps://raw.githubusercontent.com/matomo-org/referrer-spam-blacklist/master/spammers.txthttps://raw.githubusercontent.com/Perflyst/PiHoleBlocklist/master/android-tracking.txthttps://raw.githubusercontent.com/Perflyst/PiHoleBlocklist/master/SmartTV.txthttps://raw.githubusercontent.com/vokins/yhosts/master/hostshttps://raw.githubusercontent.com/w13d/adblockListABP-PiHole/master/Spotify.txthttps://reddestdream.github.io/Projects/MinimalHosts/etc/MinimalHostsBlocker/minimalhostshttps://s3.amazonaws.com/lists.disconnect.me/simple_ad.txthttps://s3.amazonaws.com/lists.disconnect.me/simple_malvertising.txthttps://s3.amazonaws.com/lists.disconnect.me/simple_tracking.txthttps://smokingwheels.github.io/Pi-hole/allhostshttps://someonewhocares.org/hosts/zero/hostshttps://tspprs.com/dl/abusehttps://tspprs.com/dl/adshttps://tspprs.com/dl/cryptohttps://tspprs.com/dl/drugshttps://tspprs.com/dl/facebookhttps://tspprs.com/dl/fakenewshttps://tspprs.com/dl/fraudhttps://tspprs.com/dl/gamblinghttps://tspprs.com/dl/mainhttps://tspprs.com/dl/malwarehttps://tspprs.com/dl/mischttps://tspprs.com/dl/phishinghttps://tspprs.com/dl/pornhttps://tspprs.com/dl/proxyhttps://tspprs.com/dl/ransomwarehttps://tspprs.com/dl/scamhttps://tspprs.com/dl/spamhttps://tspprs.com/dl/spotifyhttps://tspprs.com/dl/suspicioushttps://tspprs.com/dl/torrenthttps://tspprs.com/dl/trackinghttps://v.firebog.net/hosts/AdguardDNS.txthttps://v.firebog.net/hosts/Airelle-trc.txthttps://v.firebog.net/hosts/BillStearns.txthttps://v.firebog.net/hosts/Easylist.txthttps://v.firebog.net/hosts/Easyprivacy.txthttps://v.firebog.net/hosts/Prigent-Ads.txthttps://v.firebog.net/hosts/Prigent-Malware.txthttps://v.firebog.net/hosts/Prigent-Phishing.txthttps://v.firebog.net/hosts/Shalla-mal.txthttps://v.firebog.net/hosts/static/w3kbl.txthttps://www.dshield.org/feeds/suspiciousdomains_High.txthttps://www.joewein.net/dl/bl/dom-bl-base.txthttps://www.malwaredomainlist.com/hostslist/hosts.txthttps://www.squidblacklist.org/downloads/dg-ads.aclhttps://www.squidblacklist.org/downloads/dg-malicious.aclhttps://zerodot1.gitlab.io/CoinBlockerLists/hostshttps://zerodot1.gitlab.io/CoinBlockerLists/list.txthttps://zerodot1.gitlab.io/CoinBlockerLists/list_browser.txthttps://zerodot1.gitlab.io/CoinBlockerLists/list_optional.txthttps://zeustracker.abuse.ch/blocklist.php?download=domainblocklist```
``
11:48:38
@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im These are the ones I've been collecting so far:
http://winhelp2002.mvps.org/hosts.txt
https://adaway.org/hosts.txt
https://bitbucket.org/ethanr/dns-blacklists/raw/8575c9f96e5b4a1308f2f12394abd86d0927a4a0/bad_lists/Mandiant_APT1_Report_Appendix_D.txt
https://dnsbl.karelvanhecke.com/adg-ad.txt
https://dnsbl.karelvanhecke.com/adg-mobile.txt
https://dnsbl.karelvanhecke.com/adg-spyware.txt
https://dnsbl.karelvanhecke.com/airelle-ads.txt
https://dnsbl.karelvanhecke.com/airelle-mal.txt
https://dnsbl.karelvanhecke.com/airelle-trc.txt
https://dnsbl.karelvanhecke.com/c2.txt
https://dnsbl.karelvanhecke.com/dga.txt
https://dnsbl.karelvanhecke.com/easylist.txt
https://dnsbl.karelvanhecke.com/easyprivacy.txt
https://dnsbl.karelvanhecke.com/mwpatrol.txt
https://dnsbl.karelvanhecke.com/openphish.txt
https://dnsbl.karelvanhecke.com/openphish_30d.txt
https://dnsbl.karelvanhecke.com/otx.txt
https://dnsbl.karelvanhecke.com/phishtank.txt
https://dnsbl.karelvanhecke.com/shalla-adv.txt
https://dnsbl.karelvanhecke.com/shalla-spyware.txt
https://dnsbl.karelvanhecke.com/shalla-tracker.txt
https://dnsbl.karelvanhecke.com/urlhaus.txt
https://dnsbl.karelvanhecke.com/ut1-ads.txt
https://dnsbl.karelvanhecke.com/ut1-mal.txt
https://dnsbl.karelvanhecke.com/ut1-phi.txt
https://gist.githubusercontent.com/Perflyst/315f86393712a0c2107ee8eb58c6acee/raw
https://hosts-file.net/ad_servers.txt
https://hosts-file.net/emd.txt
https://hosts-file.net/exp.txt
https://hosts-file.net/grm.txt
https://hosts-file.net/psh.txt
https://hostsfile.mine.nu/hosts0.txt
https://jasonhill.co.uk/pfsense/ytadblock.txt
https://mirror.cedia.org.ec/malwaredomains/immortal_domains.txt
https://mirror1.malwaredomains.com/files/justdomains
https://pgl.yoyo.org/adservers/serverlist.php?hostformat=hosts;showintro=0
https://phishing.army/download/phishing_army_blocklist_extended.txt
https://ransomwaretracker.abuse.ch/downloads/RW_DOMBL.txt
https://raw.githubusercontent.com/anudeepND/blacklist/master/adservers.txt
https://raw.githubusercontent.com/CHEF-KOCH/CKs-FilterList/master/HOSTS/Ads-tracker.txt
https://raw.githubusercontent.com/CHEF-KOCH/CKs-FilterList/master/HOSTS/coinminer.txt
https://raw.githubusercontent.com/CHEF-KOCH/CKs-FilterList/master/HOSTS/Malware.txt
https://raw.githubusercontent.com/CHEF-KOCH/NSABlocklist/master/HOSTS
https://raw.githubusercontent.com/CHEF-KOCH/WebRTC-tracking/master/WebRTC.txt
https://raw.githubusercontent.com/crazy-max/WindowsSpyBlocker/master/data/hosts/spy.txt
https://raw.githubusercontent.com/Dawsey21/Lists/master/main-blacklist.txt
https://raw.githubusercontent.com/deathbybandaid/piholeparser/master/Subscribable-Lists/ParsedBlacklists/AakList.txt
https://raw.githubusercontent.com/deathbybandaid/piholeparser/master/Subscribable-Lists/ParsedBlacklists/Prebake-Obtrusive.txt
https://raw.githubusercontent.com/EnergizedProtection/block/master/unified/formats/domains.txt
https://raw.githubusercontent.com/HorusTeknoloji/TR-PhishingList/master/url-lists.txt
https://raw.githubusercontent.com/matomo-org/referrer-spam-blacklist/master/spammers.txt
https://raw.githubusercontent.com/Perflyst/PiHoleBlocklist/master/android-tracking.txt
https://raw.githubusercontent.com/Perflyst/PiHoleBlocklist/master/SmartTV.txt
https://raw.githubusercontent.com/vokins/yhosts/master/hosts
https://raw.githubusercontent.com/w13d/adblockListABP-PiHole/master/Spotify.txt
https://reddestdream.github.io/Projects/MinimalHosts/etc/MinimalHostsBlocker/minimalhosts
https://s3.amazonaws.com/lists.disconnect.me/simple_ad.txt
https://s3.amazonaws.com/lists.disconnect.me/simple_malvertising.txt
https://s3.amazonaws.com/lists.disconnect.me/simple_tracking.txt
https://smokingwheels.github.io/Pi-hole/allhosts
https://someonewhocares.org/hosts/zero/hosts
https://tspprs.com/dl/abuse
https://tspprs.com/dl/ads
https://tspprs.com/dl/crypto
https://tspprs.com/dl/drugs
https://tspprs.com/dl/facebook
https://tspprs.com/dl/fakenews
https://tspprs.com/dl/fraud
https://tspprs.com/dl/gambling
https://tspprs.com/dl/main
https://tspprs.com/dl/malware
https://tspprs.com/dl/misc
https://tspprs.com/dl/phishing
https://tspprs.com/dl/porn
https://tspprs.com/dl/proxy
https://tspprs.com/dl/ransomware
https://tspprs.com/dl/scam
https://tspprs.com/dl/spam
https://tspprs.com/dl/spotify
https://tspprs.com/dl/suspicious
https://tspprs.com/dl/torrent
https://tspprs.com/dl/tracking
https://v.firebog.net/hosts/AdguardDNS.txt
https://v.firebog.net/hosts/Airelle-trc.txt
https://v.firebog.net/hosts/BillStearns.txt
https://v.firebog.net/hosts/Easylist.txt
https://v.firebog.net/hosts/Easyprivacy.txt
https://v.firebog.net/hosts/Prigent-Ads.txt
https://v.firebog.net/hosts/Prigent-Malware.txt
https://v.firebog.net/hosts/Prigent-Phishing.txt
https://v.firebog.net/hosts/Shalla-mal.txt
https://v.firebog.net/hosts/static/w3kbl.txt
https://www.dshield.org/feeds/suspiciousdomains_High.txt
https://www.joewein.net/dl/bl/dom-bl-base.txt
https://www.malwaredomainlist.com/hostslist/hosts.txt
https://www.squidblacklist.org/downloads/dg-ads.acl
https://www.squidblacklist.org/downloads/dg-malicious.acl
https://zerodot1.gitlab.io/CoinBlockerLists/hosts
https://zerodot1.gitlab.io/CoinBlockerLists/list.txt
https://zerodot1.gitlab.io/CoinBlockerLists/list_browser.txt
https://zerodot1.gitlab.io/CoinBlockerLists/list_optional.txt
https://zeustracker.abuse.ch/blocklist.php?download=domainblocklist
11:48:51
@voyager:t2bot.ioMatrix Traveler (bot) joined the room.11:50:03
@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im Filter Name
Description
Sub link




Ad & Tracker Filter List
Blocks known Ads & Trackers
CHEF-KOCH's Ad & Tracker Filter List


Android
Blocks ads & trackers and other unneeded Android traffic
CHEF-KOCH's Android FilterList


Adobe
Blocks all Adobe traffic
CHEF-KOCH's Adobe FilterList


Apple
Blocks all Apple traffic
CHEF-KOCH's Apple FilterList


Avast/CCleaner
Blocks all Avast/CCleaner traffic
CHEF-KOCH's Avast/CCleaner FilterList


Cloudflare
Blocks all Cloudflare traffic
CHEF-KOCH's Cloudflare FilterList


Facebook
Blocks all Facebook & services traffic
CHEF-KOCH's Facebook FilterList


Google
Blocks all Google & services traffic
CHEF-KOCH's Google FilterList


Instagram
Blocks all Instagram & services traffic
CHEF-KOCH's Instagram FilterList


Microsoft
Blocks all Microsoft & services traffic
CHEF-KOCH's Microsoft FilterList


Mozilla
Blocks all Mozilla & services traffic
CHEF-KOCH's Mozilla FilterList


Pinterest
Blocks all Pinterest & services traffic
CHEF-KOCH's Pinterest FilterList


App: Skype
Skype Ad-Free
CHEF-KOCH's Skype Ad-Free FilterList


App: Spotify
Spotify Ad-Free
CHEF-KOCH's Spotify Ad-Free FilterList


Fonts
Block all web fonts
CHEF-KOCH's Fonts FilterList


I2P & Onion
Blocklist for bad I2P & Onion domains (not for ad-blockers!)
CHEF-KOCH's I2P & Onion FilterList


Malware
Blocklist for Malware
CHEF-KOCH's Malware FilterList


Wontblock
Unblock the Internet and good pages
CHEF-KOCH's Wontblock FilterList


Torrent
Blocklist for bad Torrent Tracker
CHEF-KOCH's Torrent FilterList


CoinMiners
Block all crypto coin miners
CHEF-KOCH's CoinMiner FilterList
12:10:08
@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im

uMatrix & HOSTS only optional filter lists.

HOSTS and uMatrix only filter lists - please keep in mind that there not sub-clickable (like the above uBO list). There will also be no 127.0.0.1 versions.
Filter NameDescriptionSub linkAd & Tracker Filter ListBlocks additional Ads & TrackersCHEF-KOCH's Ad & Tracker FilterListAdguardBlocks AdGuard related trafficCHEF-KOCH's Adguard FilterListAdobeBlocks all Adobe trafficCHEF-KOCH's Adobe FilterListAppleBlocks all Apple trafficCHEF-KOCH's Apple FilterListAvast/CCleanerBlocks all Avast/CCleaner trafficCHEF-KOCH's Avast/CCleaner FilterListCloudflareBlocks all Cloudflare trafficCHEF-KOCH's Cloudflare FilterListFacebookBlocks all Facebook trafficCHEF-KOCH's Facebook FilterListGoogleBlocks all Google & services trafficCHEF-KOCH's Google FilterListInstagramBlocks all Instagram & services trafficCHEF-KOCH's Instagram FilterListMicrosoftBlocks all Microsoft & services trafficCHEF-KOCH's Microsoft FilterListMozillaBlocks all Mozilla & services trafficCHEF-KOCH's Mozilla FilterListNSA,FBI,CIABlocks all NSA, CIA, FBI etc 'spying' server connectionsCHEF-KOCH's NSA FilterListPinterestBlocks all Pinterest & services trafficCHEF-KOCH's Pinterest FilterListApp: SkypeSkype Ad-FreeCHEF-KOCH's Skype Ad-Free FilterListApp: SpotifySpotify Ad-FreeCHEF-KOCH's Spotify Ad-Free FilterListuMatrixuMatrix / HOSTS based lists (only for uMatrix users!)CHEF-KOCH's uMatrix FilterListGame ListBlocks additional game trackingCHEF-KOCH's Game FilterListCoinMinersBlock all crypto coin minersCHEF-KOCH's CoinMiner FilterList
12:10:20
@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im * [NSA official GitHub Account](https://nationalsecurityagency.github.io) * [USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs](https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/su) * [WikiLeaks Publishes NSA Target List](https://wikileaks.org/nsa-201602/) * [NSA Warns of the Dangers of Quantum Computing (futurism.com)](http://futurism.com/nsa-warns-dangers-quantum-computing/) * [Right to privacy (wikipedia.org)](https://en.wikipedia.org/wiki/Right_to_privacy) * [Patriot Act | Wikipedia](https://en.wikipedia.org/wiki/USA_PATRIOT_Act) + CALEA act + [FISA](https://en.wikipedia.org/wiki/Foreign_Intelligence_Surveillance_Act) * [Cryptome | cryptome.org](http://cryptome.info/0001/ip-tla.htm) * [NSA's Autonomous Systems (AS),](https://www.robtex.net/?_escaped_fragment_=dns%3Dnsa.gov#!dns=nsa.gov) * [33bits | 33bits.org](http://33bits.org/) * [What an IP Address Can Reveal About You | priv.gc.ca](https://www.priv.gc.ca/information/research-recherche/2013/ip_201305_e.asp) * [Randomtalker web-privacy](http://randomwalker.info/web-privacy/) * [https://bosnadev.com/2015/04/14/facebook-chats-are-being-scanned-by-a-cia-funded-company/](Chats Are Being Scanned By A CIA Funded Company) * [Mobile Security Wiki | mobilesecuritywiki.com](https://mobilesecuritywiki.com/) * [Researcher at Kaspersky Labs have discovered a list of domains used by the NSA to install malware on victim's PC around the world.](https://www.hackread.com/here-is-a-list-of-urls-used-by-the-nsa-to-install-malware-on-pcs-worldwide/) * [NSA PRISM Keywords For Domestic Spying | Business Insider](http://www.businessinsider.com/nsa-prism-keywords-for-domestic-spying-2013-6?IR=T) * [Windows and the backdoor question from 1999 | CNN](http://edition.cnn.com/TECH/computing/9909/03/windows.nsa.02/) * [Psssst: Wanna Buy a Used Spy Website? | Wired](http://www.wired.com/2015/03/nsa_domains/) * [Understanding NSA Malware | Schneier on Security](https://www.schneier.com/blog/archives/2015/02/understanding_n.html) * [Check if NSA warrantless surveillance is looking at your IP traffic | Lookingglassnews](http://www.lookingglassnews.org/viewstory.php?storyid=6861) * [Sensitive IP addresses | Wikipedia](https://en.wikipedia.org/wiki/Wikipedia:Sensitive_IP_addresses) * [Do Not Scan - Government IP list | PeerBlock Forums](http://forums.peerblock.com/read.php?8,14794,14794) * [Hardened user.js for Firefox to stop data leackage | GitHub](https://github.com/pyllyukko/user.js) * [Firefox Zero-Day Exploit used by FBI to shutdown Child porn on Tor Network hostin; Tor Mail Compromised](https://thehackernews.com/2013/08/Firefox-Exploit-Tor-Network-child-pornography-Freedom-Hosting.html) * [Entire set of 5,300+ .gov domains as .csv file | GitHub](https://gsa.github.io/data/dotgov-domains/2014-12-01-full.csv) * [SS7 hack shown demonstrated to track anyone | 60 Minutes](http://www.9jumpin.com.au/show/60minutes/stories/2015/august/phone-hacking/) * [SSL Blacklist](https://sslbl.abuse.ch/blacklist/) * [MITM-Proxy](https://mitmproxy.org/doc/howmitmproxy.html) + [Lagado proxy test](http://www.lagado.com/proxy-test) + [Lagado cache test](http://www.lagado.com/tools/cache-test) * [Detect Superfish, Komodia and Privdog | filippo](https://filippo.io/Badfish/) * [SSL eye prism protection | digi77](https://www.digi77.com/ssl-eye-prism-protection/) * [NSAPlaySet](http://www.nsaplayset.org/) * [Global surveillance disclosures (2013–present) | Wikipedia](https://en.wikipedia.org/wiki/Global_surveillance_disclosures_(2013%E2%80%93present)) * [Attacking Tor: how the NSA targets users' online anonymity |TheGuardian](http://www.theguardian.com/world/2013/oct/04/tor-attacks-nsa-users-online-anonymity) * [Using a Power Law Distribution to describe Big Data | Arxiv.org](http://arxiv.org/abs/1509.00504) * [5 reasons you need to be tracking Big Data security analytics (monitor.us)](http://blog.monitor.us/2015/09/5-reasons-you-need-to-be-tracking-big-data-security-analytics/) * [FBI, intel chiefs decry “deep cynicism” over cyber spying programs (arstechnica.com)](http://arstechnica.com/tech-policy/2015/09/fbi-intel-chiefs-decry-deep-cynicism-over-cyber-spying-programs/) * [Internet-Wide Scan Data Repository (scans.io)](https://scans.io/) * [.onion (ietf.org)](https://www.ietf.org/blog/2015/09/onion/) * [Mail tester to check you eMail security score](http://www.mail-tester.com/) + [eMail defense](https://emailselfdefense.fsf.org/en/) * [List of United States mobile virtual network oprators](https://en.m.wikipedia.org/wiki/List_of_United_States_mobile_virtual_network_operators) * If you are interested in switching away from Google, take a look at https://github.com/sovereign/sovereign * [Julian Assange: Debian Is Owned by the NSA (igurublog.wordpress.com)](https://igurublog.wordpress.com/2014/04/08/julian-assange-debian-is-owned-by-the-nsa/) * [Vodafone Australia admits hacking Fairfax journalist's phone (theguardian.com)](http://www.theguardian.com/business/2015/sep/13/vodafone-australia-admits-hacking-fairfax-journalists-phone) * [Hacking Team, Computer Vulnerabilities, and the NSA (schneier.com)](https://www.schneier.com/blog/archives/2015/09/hacking_team_co.html) * [Big Data and Environmental Sustainability: A Conversation Starter (in Brief) (medium.com)](https://medium.com/@AlanKeeso/big-data-and-environmental-sustainability-a-conversation-starter-in-brief-4052d0b2f0ae) * [ISPs don’t have First Amendment right to edit Internet, FCC tells court (arstechnica.com)](http://arstechnica.com/tech-policy/2015/09/isps-dont-have-1st-amendment-right-to-edit-internet-fcc-tells-court/) * [Homeland Security websites vulnerable to cyber attack: audit (reuters.com)](http://www.reuters.com/article/2015/09/15/us-usa-cybersecurity-idUSKCN0RF2DC20150915) * [Now you can find out if GCHQ illegally spied on you (privacyinternational.org)](https://www.privacyinternational.org/?q=illegalspying) * [Hacking Team, Computer Vulnerabilities, and the NSA (georgetown.edu)](http://journal.georgetown.edu/hacking-team-and-the-nsa/) * [New Federalist platform lets [government] agencies quickly launch websites (gsa.gov)](https://18f.gsa.gov/2015/09/15/federalist-platform-launch/) * [Government spying spooks French citizens (straitstimes.com)](http://www.straitstimes.com/world/europe/government-spying-spooks-french-citizens) * [NSA Plans to Develop Encryption That Could Stump Quantum Computers (wired.com)](http://www.wired.com/2015/09/tricky-encryption-stump-quantum-computers/) * [Japanese government orders closure of university social science/humanities depts (timeshighereducation.com)](https://www.timeshighereducation.com/news/social-sciences-and-humanities-faculties-close-japan-after-ministerial-decree) * [Tollow (reqrypt.org)](https://reqrypt.org/tallow.html) * [Chinese government firms sell products that subvert censorship (larrysalibra.com)](https://www.larrysalibra.com/hop-over-the-great-firewall-with-government-help/) * [The Tricky Encryption That Could Stump Quantum Computers (wired.com)](http://www.wired.com/2015/09/tricky-encryption-stump-quantum-computers/) * [GCHQ tried to track Web visits of “every visible user on Internet” (arstechnica.com)](http://arstechnica.com/security/2015/09/gchq-tried-to-track-web-visits-of-every-visible-user-on-internet/) * [A Q&A with NSA Whistleblower Edward Snowden (fusion.net)(http://fusion.net/story/201737/edward-snowden-interview/) * [Skype Alternatives, Part 2: Edward Snowden’s Recommendations (cointelegraph.com)](http://cointelegraph.com/news/114689/skype-alternatives-part-2-edward-snowdens-recommendations) * [The FBI has no trouble spying on encrypted communications (boingboing.net)](http://boingboing.net/2015/09/29/the-fbi-has-no-trouble-spying.html) * [Encryption doesn't stop the FBI (theintercept.com)](https://theintercept.com/2015/09/28/hacking/) * [NSA runs its spying activities on Red Hat Linux](http://www.itwire.com/opinion-and-analysis/open-sauce/68567-nsa-runs-its-spying-activities-on-red-hat-linux) * [How the NSA can break trillions of encrypted Web and VPN connections ](http://arstechnica.com/security/2015/10/how-the-nsa-can-break-trillions-of-encrypted-web-and-vpn-connections/) Videos ------------ * [Greenwald Vs. NSA debate (youtube.com)](https://www.youtube.com/watch?t=12&v=sfPjgUgoLaQ) * [A Conversation with Edward Snowden (Part 1) [Podcast] (startalkradio.net)](http://www.startalkradio.net/show/a-conversation-with-edward-snowden-part-1/) Papers ------------ * [Detect IP spoofing with 97 chance of success](https://sce.carleton.ca/~abdou/CPV_TDSC.pdf) * [ENCRYPT Act of 2016](https://assets.documentcloud.org/documents/2708079/LIEU-027-Xml-ENCRYPT-Act-of-2016.pdf) * [Google PDF Search: “not for public release”](https://www.google.com/search?as_q=&as_epq=not+for+public+release&as_oq=&as_eq=&as_nlo=&as_nhi=&lr=&cr=&as_qdr=all&as_sitesearch=&as_occt=any&safe=images&as_filetype=pdf&as_rights=&gws_rd=ssl) * [Password guidance - simplifying your approach (GCHQ) [pdf] (gov.uk)](https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/458857/Password_guidance_-_simplifying_your_approach.pdf) * [ISP wins 11-year battle to reveal warrantless FBI spying [pdf] (calyxinstitute.org)](https://www.calyxinstitute.org/sites/all/documents/08_28_2015_REDACTED_Decision_and_Order.pdf) * [TheIntercept Documents](https://theintercept.com/document/2015/09/25/legalities) * [Speicherfristen von Verkehrsdaten im Mobilfunk (spiegel.de)](http://www.spiegel.de/media/media-37689.pdf)12:15:09
@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im^ this is why u should use demonsaw 12:15:32
@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.imencryption of matrix alone is not enough unlike a salting u can change every hours.12:15:59
@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.imds provide 2 sha512 layers by default + tls + the private onion routing12:16:22
@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.imif we consider the user using dnscrypt + vpn ( let say wireguard ) 12:16:42
@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.imand can add a extra group encryption layers which is also control the salt another sha51212:16:59
@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.imand account cannot be remotely accessed - the absence of meta data is also a big factor12:17:17
@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im According to EGMR mass surveillance is now official against human rights.
You still can help keep the fight up against any surveillance programs!
12:44:24
@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im

Anti-DPI (deep package inspection) tools (they don't replace a good VPN!)

NSA Resources and public program(s)

12:44:45
@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im

Snowden documents compilations

12:45:06
@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im

Known compromised ISP Providers

Needs more evidence

  • Easybell
  • L8NT
  • Charter
  • Suddenlink

ISP which are known to fight for privacy and a free internet

  • Bahnhof (Swedish)
  • Sonic (US)
12:45:22
@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im

Blockchain monitoring

  • OAKSTAR (sub-project MONKEYROCKET)
  • SHIFTINGSHADOW
  • ORANGECRUSH
  • YATCHSHOP
  • ORANGEBLOSSOM
  • SILVERZEPHYR
  • BLUEZEPHYR
  • COBALTFALCON

Videos

12:45:36
@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im Using special programs or a VPN in order to defeat surveillance is not enough.
You can directly help to stop it by filling out the 'take action'
documents/proposal which helps to fight against spying, surveillance and
other non-acceptable government actions.
CampaignOrganizationStatusTell Congress to Reinstate the Open Internet OrderEFFOpenNo Airport Biometric SurveillanceEFFOpenCheck Your Reps: Tell Congress to Save the Open InternetEFFOpenOakland: Stand Up for Community Control of Police Spy TechEFFOpenHelp California Secure Net Neutrality Protections: Support S.B. 822EFFOpenStop SESTA/FOSTAStop Sesta/EFFOpenStand Up for Copyright in the Digital AgeMozilla/EFFOpenAn Open Letter to Our Community On Congress’s Vote to Extend NSA Spying From EFF Executive Director Cindy CohnCindy Cohn (EFF)ClosedAn Open Letter to Our Community On Congress’s Vote to Extend NSA Spying From EFF Executive Director Cindy CohnCindy Cohn (EFF)ClosedA.B. 1584Jerry Brown (EFF)WonTell Congress: Stop the Burr-Feinstein Backdoor ProposalEFFWon
12:46:27
@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.imhttps://www.documentcloud.org/public/search/projectid:45842-Termination-Letters13:00:57
@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.imhttps://webtransparency.cs.princeton.edu/webcensus/13:22:31
@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.imPrivy DemoNSAw router will be open for the week end then we will change the password , you can find informations about it in my uplauded files or join directy privy.cafe port : 8080 :: password dg4lprivy , after that weekend . we will release challenges, ctf to complete in order to join or being invited by a current member I uplauded around 200G myself , chrono , juji and couple others also uplaud great content DM me if you have any questions14:47:47
@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im Linux Internals

Misc.  Internals

  1. C Function Calls Convention on the Stack
  2. The Anatomy of an Executable
  3. Introducing Character Sets & Encoding
  4. An Introduction to Writing System & Unicode
Many But Finite – Computer System Sieries
Operating System
Assembly
  1. x86 nasm Assembly Quick Reference
  2. Intel Pentium Instruction Set
  3. Win32 Assembly
  4. cgasm – Offline Assembly Documentation
  5. x86 Op Code & Instruction Reference
  6. Linux System Call Table
  7. Linux Sys Call Ref
  8. NASM Tutorial
Debugging
  1. Getting Started with windbg ( User mode )
  2. Getting Started with windbg ( Kernel mode )
  3. Getting Started with windbg #1
  4. Getting Started with windbg #2
  5. Getting Started with windbg #3
  6. GDB Command Reference
[ Videos ]
  1. Debug : The Secret Lives of Debuggers
15:35:29
@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im

Rev-Eng

[ Workshops ] Reverse Engineering Workshops Collection
  1. Nnamon’s Reverse Engineering & Exploitation Workshop
  2. Reverse Engineering Workshop – Sprout 2018
  3. Reversing Workshop : Solving Flare-on 2016
  4. Reverse Engineering Malware 101 – Malware Unicorn

Exp-Dev

[ Series ] Security Sift ‘s Windows exploitation Blog Posts

  1. Basics
  2. Introduction to Stack Overflow
  3. Changing offsets & Rebased modules
  4. Locating shellcode jump
  5. Locating shellcode Egg hunting
  6. SEH exploits
  7. Unicode Buffer Overflows
[ Series ] Corelan.be Windows Exploit Development blog posts
  1. https://www.corelan.be/index.php/articles/ ( Windows )
  2. https://www.corelan.be/index.php/forum/exploit-writing-tutorials-linux/ ( Linux )
[Series ] Sploitfun Linux Exploitation Tutorials Series
  1. Classic Stack Based Buffer Overflow
  2. Integer Overflow
  3. Off-by-One Stack Based
  4. Bypassing NX using return to libc
  5. Bypassing NX using chained return to libc
  6. Bypassing ASLR using return to PLT
  7. Bypassing ASLR using Bruteforce
  8. Bypassing ASLR using GOT Overwrite and GOT Deference
  9. Understanding glibc malloc()
  10. Heap Overflow using unlink()
  11. Heap Overflow using Malloc Maleficarum
  12. Off-by-one Heap Based
  13. Use After Free
15:35:37
@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im
[ Series ] Dhaval Kapil’s Linux Exploitation Tutorials
  1. Buffer Overflow Exploit
  2. Shellcode Injection
  3. Heap Exploitation Book
[ Series ] The Amazing King – Windows Exploitation Tutorials
  1. Overview
  2. Stack Corruption for newbies
  3. EIP Redirection
  4. Execution Arbitary Code
  5. SFP overwrite
  6. Format Strings Bug
[ Series ] The Grey Corner Windows Exploitation Tutorials
  1. Simple Stack based BoF Tutorial for vulnerable server
  2. SEH based BoF Tutorial for vulnerable server
  3. Egg Hunter based Exploit for vulnerable server
  4. Restricted Character Set exploit for vulneraable server
[ Series ] Fuzzy Security’s Windows + Linux exploitation Tutorials
  1. http://www.fuzzysecurity.com/tutorials.html
[ Series ] Azeria Labs for ARM Exploitation
  1. https://azeria-labs.com/
[Series ] GB_Master’s x86 Exploitation Tutorials
  1. Assembly 101 – Part 1 – Basic
  2. Assembly 101 – Part 2 – Conditional jumps , Logic and Shifiting
  3. Assembly 101 – Part 3 – Multiplications , Repetition and Switches
  4. Exploitation 101 – Part 1 – Stack gets over its Head
  5. Exploitation 101 – Part 2 – Born in a Shell
  6. Exploitation 101 – Part 3 – Heap Overflow , Unlink me , would you please?
  7. Exploitation 101 – Part 4 – First Witchy House
  8. Exploitation 101 – Part 5 – House of Mind : Undead and Loving it
  9. Exploitation 101 – Part 6 – House of Force : Jedi Overflow
  10. Exploitation 101 – Part 7 – House of Lore : People and Traditions
  11. Exploitation 101 – Part 8 – House of Spirit : Friendly Stack Overflow
  12. Exploitation 101 – Part 9 – Off-by-One and Uninvited friend joins the Party
  13. Exploitation 101 – Part 10 – Integer Overflow : Adding one more ….AAAAAAnd it’s gone
  14. Exploitation 101 – Part 11 – Format Strings : I will tell ya what to say
[ Series ] Metasploit Unleashed – Exploit Development
  1. Exploit Module Format
  2. Exploit Mixins
  3. Exploit Targets
  4. Exploit Payloads
  5. Getting Shell
15:35:47
@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im@1zkrhczgyqx7ycxvrxvha8sn6omphokrd:openintents.modular.im
[ Tutorials ] Exploit Dev Tutorials from multiple resources
  1. Stack : BoF with edb-debugger
  2. Stack : Stack Based Overflow on x64 Linux
  3. Stack : Binary Exploitation ELIF5 – ( Part 1 / Part 2 )
  4. Shellcode : Shellcoding for Windows & Linux
  5. Shellcode : Understanding Shellcode : Reverse Shell
  6. Shellcode : How to write an egg hunter shellcode
  7. Shellcode : Shellcode Debugging with Ollydgb
  8. Shellcode : Shellcode without Socket
  9. Shellcode : Shellcode Obfuscation #1
  10. Shellcode : Shellcode Obfuscation #2
  11. Binary : GOT & PLT for Pwning
  12. Binary : What are the GOT & PLT – part 1
  13. Binary : CPU , Memory and Buffer Overflow
  14. Mitigation : Bypass ASLR + NX ( Part 1 , Part 2 )
  15. Mitigation : New bypass & Protection Techniques for ASLR on Linux
  16. Mitigation : Return to PLT , GOT to bypass ASLR remotely
  17. Mitigation : Return to libc on Modern 32 bit and 64 bit  Linux
  18. Mitigation : Make Stack Execution again
  19. Mitigation : Can we bruteforce ASLR?
  20. Mitigation : ROPping to Victory – Radare2 + pwntools ( Part 1 )
  21. Mitigation : ROPping to Victory – Split ( Part 2 )
  22. Mitigation : ROPping to Victory – Call me may be ( Part 3 )
  23. Mitigation : Introduction to Returned-Oriented-Programming ROP
  24. Mitigation : Introduction to ROP
  25. Mitigation : x64 Bit Linux ROP
  26. Mitigation : Return to LibC without function calls
  27. Mitigation : x86 / x64 BoF Exploits & Borrowed code chunks exploitation techniques
  28. Mitigation : Defeating DEP – The Immunity Debugger way
  29. Mitigation : Blind ROP ( BROP ) Lab / Paper
  30. Mitigation : Advanced Buffer Overflow Method
  31. Mitigation : Exploiting the Random Number Generator – ASLR Bypass
  32. Mitigation : Fun with Info Leaks ( DEP + ASLR Bypass )
  33. Mitigation : Bypassig Memory Protections – The Future of Exploitation
  34. Format Strings : GOT overwrite to change control flow remotely on ASLR
  35. Format Strings : Defeating Stack Canary, NX and ASLR remotely on 64 bit
  36. Format Strings : Exploiting Format String Vulnerabilities
  37. Format Strings : Exploiting Format String – Getting the shell
  38. Format Strings : Maximum Over-kill Two – from Format String to RCE
  39. Heap : Exim Off-by-one RCE Exploiting CVE 2018-6789 with fully mitigations bypass
  40. Heap : CVE 2018-6789 Walkthrough
  41. Heap : Road to Exim RCE – Abusing unsafe memory allocator in the most popular MTA
  42. Heap : From heap to RIP
  43. Heap : GlibC malloc() for Exploiters / (Markdown Version)
  44. Heap : heapwn – Collection of Heap pwnables binaries
  45. Heap : how2heap – Educational Heap Exploitation Collection
  46. Heap : ptmalloc fanzine – Heap Meta-data Corruption Series
  47. Heap : Play with file structures – Yet another Binary exploit technique
  48. Heap : Exploiting the wilderness
  49. Heap : Heap Feng Shui in JavaScript
  50. Heap : Project HeartBleed
  51. Heap : An Introduction to Use-After-Free
  52. Heap : Walking Heap using Py-dbg
  53. Null-ptr Def : Large Memory Management Vulnerabilities
[ PDF ] Biarny Exploitation Papers and Slides
  1. Slide : Linux Interactive Exploit Development with GDB & Peda
  2. Slide : Understanding Heap by breaking it
  3. Book : Hackin9 – Build your own exploits
[ Videos ] Collection of Binary Exploitation random videos
  1. Exploit Tips & Techniques
  2. 23c3 : Unusual Bugs
  3. ASLR Bypass – Bruteforce
  4. ASLR Bypass – Ret2esp
  5. ASLR Bypass – Ret2reg
15:35:59

Show newer messages


Back to Room ListRoom Version: 5