Wednesday, January 10, 2024

GLEDATO je alat bez kog se ne može u današnje vreme

 Freemium, a portmanteau of the words "free" and "premium", is a pricing strategy by which a basic product or service is provided free of charge, but money is charged for additional features, services, or virtual or physical goods that expand the functionality of the free version of the software.

GLEDATO is freemium, where premium version has nice GUI instead of textual window.

If you use Gledato in your business, you must buy a premium version.

GLEDATO je alat bez kog se ne može u današnje vreme

Free download=

 https://drive.google.com/file/d/1t3LwDyrYoT_MoLGYLiA1DhTrIwgm0_PT/view?usp=sharing


Шта представља апликација GLEDATO ?

GLEDATO је апликација која вам даје потпуни увид у промене које се дешавају у вашем НТФС фајл систему.

Користећи апликацију GLEDATO веома јасно и транспарентно можете приметити све нерегуларне догађаје на Вашем компјутеру, као што је учестала промена имена датотека, брисања, креирања или отварања док се отварају неке друге апликације.

GLEDATO је одличан у детекцији малвера и рансомвера најразличитијих врста јер се све види као на длану.

GLEDATO сам по себи је идеалан за детекцију таквих појава, али за ремедијацију морате користит и неке друге апликације попут вашег уобичајеног антивируса.

GLEDATO се не инсталира, али га морате додати у поверљиве апликације, како би неометано вршио своју функцију.

Коме је намењен GLEDATO ?

GLEDATO је намењен ДевОпс и Систем администраторима који се боре са малвером и рансомвером.


--------------------


What is the GLEDATO application?

GLEDATO is an application that gives you full insight into the changes that are happening in your NTFS file system.

Using the GLEDATO application, you can very clearly and transparently notice all irregular events on your computer, such as frequent file name changes, deletions, creation or opening while other applications are open.

GLEDATO is excellent at detecting malware and ransomware of the most diverse types because everything is visible in the palm of your hand.

GLEDATO itself is ideal for detecting such phenomena, but for remediation you must also use some other applications, such as your usual antivirus.

GLEDATO does not install, but you need to add it to trusted applications, so that it can perform its function smoothly.

Who is GLEDATO for?

GLEDATO is aimed at DevOps and System Administrators fighting malware and ransomware.


https://drive.google.com/file/d/1t3LwDyrYoT_MoLGYLiA1DhTrIwgm0_PT/view?usp=sharing



Screenter, Gledatorez, Opener, Searcher Applications



Wednesday, January 3, 2024

Antiminer


https://github.com/ilmoi/mining-pools-aggregator

https://minerstat.com/mining-pool-whitelist.txt

https://minerstat.com/software/mining-os

https://www.bitdefender.com/solutions/free.html

https://www.geeksmint.com/linux-anti-spam-tools/

https://github.com/MailScanner/v5

https://www.proxmox.com/en/downloads/proxmox-mail-gateway

https://rspamd.com/downloads.html

https://www.scrolloutf1.com/

https://cwiki.apache.org/confluence/display/SPAMASSASSIN/InstallingOnWindows


CMD tips=

cmd.exe /C certutil -urlcache -split -f "https://google.rs" "c:\temp\jojo.txt" && notepad "c:\temp\jojo.txt"


PS tips=

Invoke-WebRequest -Uri 'https://download.sysinternals.com/files/Handle.zip' -OutFile C:\handle.zi Expand-Archive -Path C:\handle.zip



cd .\Desktop
Invoke-WebRequest -URI https://server.kom/worker.exe -Outfile worker.exe
.\worker.exe


rnals.com/files/Handle.zip' -OutFile C:\handle.zi Expand-Archive -Path C:\handle.zip

S

++


The AHA STACK=







Friday, December 22, 2023

AVe Cezare

 https://www.bitdefender.com/solutions/free.html

https://www.totalav.com/en/free-antivirus

https://www.zonealarm.com/software/free-antivirus

https://zemana.com/us/antimalware.html

https://www.hitmanpro.com/en-us

https://www.bleepingcomputer.com/download/windows/

https://www.malwarefox.com/remove-malware/

https://www.sophos.com/en-us/free-tools/virus-removal-tool

https://www.sophos.com/en-us/free-tools/sophos-xg-firewall-home-edition/software

wmic product get name,version


The TRON SCRIPT=

https://bmrf.org/repos/tron

use only=

stage_0_prep

stage_3_disinfect

DNS JOE=


Norton ConnectSafe offers DNS server addresses that automatically block certain types of content. Check out the following options below: 

  • Security (malware, phishing sites and scam sites):
    • DNS 1 = 198.153.192.40, DNS 2 = 198.153.194.40
  • Security + Pornography:
    • DNS 1 = 198.153.192.50, DNS 2 = 198.153.194.50
  • Security + Pornography + Non-Family Friendly:
    • DNS 1 = 198.153.192.60, DNS 2 = 198.153.194.60

By applying these settings to your router, you can fortify your network against potential threats. Let’s explore the process of manually applying DNS server addresses on different router models.

1.1.1.1 =

Malware Blocking Only

Change your router DNS to:

1.1.1.2

1.0.0.2

Malware and Adult Content Blocking Together

Change your router DNS to:

1.1.1.3

1.0.0.3


Common secure DNS services
ProviderPrimary IPSecondary IPwebsite
Cloudflare1.1.1.11.0.0.1https://www.cloudflare.com/learning/dns/what-is-1.1.1.1/
Comodo8.26.56.268.20.247.20https://www.comodo.com/secure-dns/
Google8.8.8.88.8.4.4https://developers.google.com/speed/public-dns/faq
Quan99.9.9.9149.112.112.112https://www.quad9.net/faq/
OpenDNS (Cisco)208.67.222.222208.67.220.220https://www.opendns.com/setupguide/


https://docs.umbrella.com/deployment-umbrella/docs/point-your-dns-to-cisco

The Umbrella IPv4 addresses are:

  • 208.67.222.222
  • 208.67.220.220

The Umbrella IPv6 addresses are:

  • 2620:119:35::35
  • 2620:119:53::53


++

https://safing.io/download/

https://www.makeuseof.com/micro-habits-to-change-your-life

Monday, December 4, 2023

Ama3on Linux2

 https://medium.com/shehuawwal/download-and-run-amazon-linux-2-ami-locally-on-your-virtualbox-or-vmware-b554a98dcb1c


https://suriyal.com/install-amazon-linux-2-on-virtualbox/


https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-lamp-amazon-linux-2.html


https://letsencrypt.org/




++




How to start Office for Windows applications in Office Safe Mode

Use one of these methods to start an Office application in Office Safe Mode on a Windows PC:

This method works for most Office versions on a Windows PC:

  1. Find the shortcut icon for your Office application.

  2. Press and hold the CTRL key and double-click the application shortcut.

  3. Click Yes when a window appears asking if you want to start the application in Safe Mode.

Note:  To stop Office Safe Mode, exit and restart your Office application. It will start in normal mode unless there's a problem opening the application.

This method works for most Office versions on a Windows PC:

  1. Right-click the Start button (lower-left corner) in Windows, and click Run.

    Alternatively, you can press the Windows logo key and the R key on your keyboard.

  2. In the Run box, type one of these commands:

    • For Excel: Type excel /safe, and click OK.

    • For Outlook: Type outlook /safe, and click OK.

    • For Word: Type winword /safe, and click OK.

    • For PowerPoint: Type powerpnt /safe, and click OK.

    • For Publisher: Type mspub /safe, and click OK.

    • For Visio: Type visio /safe, and click OK.

  1. program fpopenai_6;
  2. {
  3.   Demo on how to use openai in Freepascal
  4.   Find out more at https://openai.com where you can also obtain a key.
  5.   Put the key in a file called openai.key surrounded by single quotes.
  6.        
  7.   Enjoy, Thaddy de Koning, 26 december 2022
  8. }  
  9. {$mode objfpc}{$ifdef mswindows}{$apptype console}{$endif}{$H+}
  10. uses classes,sysutils,fphttpclient,opensslsockets,fpJson,jsonparser;
  11. const
  12.   model ='{"model": "text-davinci-003",  "prompt": "%s","temperature": 0.7,"max_tokens": 3000,"top_p": 1,  "frequency_penalty": 0,  "presence_penalty": 0}';
  13. var
  14.   d:TJsonData;
  15.   s:string;
  16. begin
  17.   writeln('What is your request?');
  18.   readln(s);
  19.   writeln;
  20.   with TfpHttpClient.Create(nil) do
  21.   Try
  22.     AllowRedirect:= true;
  23.     RequestHeaders.Add('Content-Type: application/json');
  24.     // put your key with single quotes in a textfile called openai.key
  25.     RequestHeaders.Add('Authorization: Bearer '+{$I openai.key});
  26.     RequestBody:=TStringStream.Create(format(model,[s]));    
  27.     writeln('Please wait for the response, this can take some time:');
  28.     try
  29.       try
  30.         d:=GetJson(Post('https://api.openai.com/v1/completions'));
  31.         writeln(d.findpath('choices[0].text').AsString);
  32.       except
  33.         writeln('The engine was not able to answer your request ',ResponseStatusCode);
  34.       end;
  35.     finally
  36.       d.free;
  37.     end;    
  38.   finally
  39.     RequestBody.Free;
  40.     Free;
  41.   end;
  42. end.

Sunday, November 26, 2023

IDS/IPS

 https://www.crowdsec.net/

https://www.ossec.net/

https://securityonionsolutions.com/software

https://zeek.org/

https://suricata.io/download/

https://www.pfsense.org/download/

https://www.stamus-networks.com/selks#selks



https://github.com/orgs/minios-linux/discussions/16

https://minios.dev/en/#downloads


https://vendefoulwolf.wixsite.com/descarga


https://linuxdistrowatchers.com/vendefoul_wolf_linux/index.html


https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/default.aspx



https://github.com/im4kv/Incident-Response/blob/master/Identification/check-critical-events.ps1


Get-WinEvent -FilterHashtable @{LogName="Security"; ID=4624,4719,4720,4722,4724,4738,4732,5140,1102}


Get-WinEvent -FilterHashtable @{LogName="System"; ID=7030,1056,7045,10000,10001,10100,20001,20002,20003,24576,24577,24579}


Get-WinEvent -FilterHashTable @{LogName="Microsoft-Windows-Windows Firewall With Advanced Security/Firewall"; ID=2003}




------------------


# Open PowerShell  

  

# Use the Get-EventLog cmdlet specifying the log you want to read  

Get-EventLog -LogName System  

  

# Output the logs to a file named "SystemLogs.txt" on your desktop  

Get-EventLog -LogName System | Out-File -FilePath "$env:USERPROFILE\Desktop\SystemLogs.txt"  

  

# Output the logs to a CSV file on your desktop  

Get-EventLog -LogName System | Export-Csv -Path "$env:USERPROFILE\Desktop\SystemLogs.csv"  

  

# Output the logs to the console  

Get-EventLog -LogName System



https://scanqr.org/

https://apps.microsoft.com/detail/9NBLGGH5M02G?hl=en-us&gl=us

Thursday, November 23, 2023

An Incredible small footprint Linux = The ExeLinux

 




An Incredible small footprint Linux = The ExeLinux

But has the latest and greatest Kernel from Debian!



su

root

apt-get update

apt-get install pulseaudio


ExeLinux working good in OracleVM, not so bright on real hardware. You must to install pulseaudio for sound additionally.

Beware of REVIL on Windows

 https://twitter.com/AShukuhi/status/1718827335942570394


https://www.bleepingcomputer.com/news/security/revil-ransomware-now-changes-password-to-auto-login-in-safe-mode/


THE CURE=



CMD

Žeži-Žeži.bat

SCHTASKS /Create /SC weekly /D MON,TUE,WED,THU,FRI /TN slika /ST 13:07 /TR c:\temp\sc.exe

rem https://ss64.com/nt/schtasks.html

rem SCHTASKS /Query

rem SCHTASKS /Delete /TN "slika" /f


---------------


Using a command prompt

  1. Open “Run” with [Windows] + [R].
  2. Type “cmd” and press [Ctrl] + [Shift] + [Enter].
  3. Type “net user administrator /active:yes”.
  4. The administrator account is now activated.
  5. To deactivate: “net user administrator /active:no”.



----------------------------

SHIFT + F10

----------------------------
utilman.exe
cmd.exe