Notes


When you ally yourself with monsters, you become one

→ in reply to @note#1661065639

The people mocking the death of Daria Dugina are trying to dehumanize her because they know it was an evil, cowardly thing to do.

And it was done by their allies, which makes THEM complicit in their evil and cowardice.

When you ally yourself with monsters, you become one.

Book list: Philosophy of Technology

Dumping a list of books on the subject Philosophy of Technology:

  • The Concept of the Political, Carl Schmitt
  • Man and Technics, Oswald Spengler
  • This World We Must Leave, Jacques Camatte
  • The Question Concerning Technology, Martin Heidegger
  • Steps to an Ecology of Mind, Gregory Bateson
  • History as a System, José Ortega y Gasset
  • Technics and Civilization, Lewis Mumford
  • The Failure of Technology, Friedrich Georg Jünger
  • The Technological Society, Jacques Ellul
  • Technological Slavery, Theodore Kaczynski
  • Grundrisse, Karl Marx
  • The Worker, Ernst Jünger
The individual > the group

In the age of everyone trying to identify with a label or group, it is more important than ever to remember that the individual > the group.

Android malware samples

Welcome! The purpose of this website is to gather a diverse set of different Android malware samples. So often the Android malware datasets are boring. They have the same or very similar malware families and, if used to practice reverse engineering, may become very repetitive.

I’ve decided to create a list of samples which are different. Each one should give you a different, fun reverse engineering challenge. The samples are divided in three sections: easy, average and difficult. Each one contains a short description of what the malware does (but no spoilers!). All samples are sourced from publicly available websites and link to these websites. Android malware samples

Analysis of MoqHao Android malware

The Roaming Mantis cyber threat actor is currently targeting France with an SMS phishing campaign in order to deliver a malicious Android application. This malware is named MoqHao, it contains its code in an encrypted and compressed resource. Once the resource is launched, MoqHao retrieves the IP address of its Command & Control server by decrypting the ‘About’ section of Imgur’s profile. Analysis of MoqHao Android malware

Daria Dugina was assassinated in a car explosion in Moscow

The daughter of Russian philosopher Alexander Dugin, Daria Dugina, was assassinated in a car explosion in Moscow earlier.

Heroes and terrorists

The world is run by sadistic adrenaline junkies

The world isn’t run by spiritually uplifted individuals, it’s run by sadistic adrenaline junkies.

Hijack libs

DLL Hijacking is, in the broadest sense, tricking a legitimate/trusted application into loading an arbitrary DLL. Defensive measures such as AV and EDR solutions may not pick up on this activity out of the box, and allow-list applications such as AppLocker may not block the execution of the untrusted code. There are numerous examples of threat actors that have been observed to leverage DLL Hijacking to achieve their objectives.

This project provides an curated list of DLL Hijacking candidates. A mapping between DLLs and vulnerable executables is kept and can be searched via this website. Additionally, further metadata such as resources provide more context.

For defenders, this project can provide valuable information when trying to detect DLL Hijacking attempts. Although detecting DLL Hijacking isn’t always without challenge, it is certainly possible to monitor for behavior that may be indicative of abuse. To further support defenders, out-of-the-box Sigma rules are provided through this website. A σSigma feed containing detection rules for all entries part of this project is available too. Hijack libs

SMBploit - scan & exploit vulnerabilities in SMB protocol

Offensive tool to scan & exploit vulnerabilities in Microsoft Windows over the Samba protocol (SMB) SMBv1/SMBv2 using the Metasploit Framework. SMBploit

Zombie apocalypse

I pray every day for a zombie apocalypse so I can assume my rightful place in the world.

Hacking Zyxel IP cameras to gain a root shell

I bought these cameras primarily to use as a test device for work. I needed something that had an ethernet interface and worked as an IP based device. I found them on eBay for around $20 each. I bought two cameras, the model IPC-3605N and the model IPC-4605N. The devices run basically the same hardware it seems, with the IPC-4605N having pan, tilt, & zoom capability.

I generally enjoy figuring out if embedded devices are well built or simply cobbled together, so I spent some time looking at these devices.

TLDR - Do not buy, do not use, and remove all of these devices from service immediately. They are so miserably insecure it took me less than a day of effort to develop a utility to remotely compromise any of them. Keep reading if you want to know how.Hacking Zyxel IP cameras to gain a root shell

Strength in numbers

The majority of people are petty, immoral and stupid. And they’re worthless individually but have a terrible strength in numbers.

People prefer capitalism to life

We’ve created a society where people prefer capitalism to life.

He is afraid of me

Today, I shook God’s hand. His palm was sweaty, because He is afraid of me.

Whores of the word and of the moment

Part of modern suffering stems from the subject’s inhibition towards the world; in modern societies those who are naturally inhibited are crushed by the construction of interpersonal relationships. It is interesting to think that even though the world is moving towards a forced and artificial inhibition promoted by the amount of time connected, still, yes, those with greater dis-inhibition manage to do well in social relationships. Anyway, they seem to win even though they have nothing to offer the world, they are whores of the word and of the moment.

Toshiba Libretto 50CT, 1996

Toshiba Libretto 50CT, 1996

PersistAssist - a fully modular persistence framework

PersistAssist is a fully modular persistence framework written in C#. All persistence techniques contain a cleanup method which will server to remove the persistence aside from the persistence code. This is a WIP so there are many empty classes, the main object of this project initially was to build out a fully modular framework meant to make adding new features as simple as inheriting a class and adding the code. PersistAssist - a fully modular persistence framework

Lower standards

In the year of our lord 2022 we have finally lowered their standards so much that we are only defending the word democracy and western values. There is nothing of substance in those concepts beside their cynical use in marshalling an army of liberals to support the next bombing and proxy war.