click on the add to get paid

Monday 17 July 2017

THE DEEP WEB

First of all, what is the “deep web“?

The deep web (or also “darknet” or “invisible internet”) is not an normal Internet. 90% of these sites have illegal content. The Internet has 5 levels (). The deep web can only be reached with TOR.

What is “marians Web“?

Marianas Web is the deepest deepest deepest part of the Internet/deep web. I never reached it, but i readet a many about it and the only thing what i can say is: u dont want to go there! Marianas Web is a Mystery, a few people say it exists and a few say it doesnt exist. I Think it exists, because the “deep web” cant be the deepest part of the Internet. there must be more!! So if u have any tips for me then please give me.

What can i find on the “deep web“?

Well, almost everything. Sad is that many sites have child porn. When u buy something, u MUST pay with Bitcoin (if they want a CC, dont buy it!). But be carefull! The Police is waiting for you.
I upload a .txt file with some deep web sites that i foundet, when u find more plese tell me.

How do i get in the “deep web“?

Its very simple. U need one software: TOR Browser

Install it and go to the websites with the TOR firefox. The websites load up very slowly, so dont give up when it is loading about 2 min. The websites what u can find in the .txt file r 10000% working
Happy surfing!!

Directories and Link Lists

TORDir – dppmfxaacucguzpc.onion
TorLinks – torlinkbgs6aabns.onion
OnionBookmark – x7yxqg5v4j6yzhti.onion
The Hidden Wiki – kpvz7ki2v5agwt35.onion/wiki/index.php/Main_Page
TorMarks – 4jbxjjrbakmdcmvb.onion
Core.Onion – eqt5g4fuenphqinx.onion
Sites Deep Web – ekwreugkil5ncyyh.onion
Hidden Wiki PasteBin – pastebin.com/ek0cAbxi
Hidden Wiki Mirrors – fkyvwpu7ccsorke2.onion
Tor Onion Link List – f3ew3p7s6lbftqm5.onion/text/TOR.ONION.LINKLIST.txt

Search Engines

TORCH – xmh57jrzrnw6insl.onion
Deep Search – xycpusearchon2mc.onion

Mail and Hosting

Tor Mail – jhiwjjlqpyawmpjx.onion
TorPM – 4eiruntyxxbgfv7o.onion/pm/

Commerce

Black Market Reloaded – 5onwnspjvuk7cwvk.onion/index.php
Silk Road – silkroadvb5piz3r.onion/index.php
High Supplies – phyofa4vi3y4i5iq.onion
C’thulhu – iacgq6y2j2nfudy7.onion
EU Weapons & Ammunition – 4eiruntyxxbgfv7o.onion/snapbbs/2e76676/
HackBB – clsvtzwzdgzkjda7.onion
Fixed Match Buy-in Service – j3vsnvvcfvoduip6.onion
CC4ALL – qhkt6cqo2dfs2llt.onion
Downloaditforyou – 3srxdnetmhbfyisw.onion
Swatting Service – jd2iqa4yt7vqvu5o.onion
PayPal Store – 5xhp3ntcxfpfd5ig.onion

Forums and Post Boards

HackBB – clsvtzwzdgzkjda7.onion
Silk Road Forums – dkn255hz262ypmii.onion/index.php
RedditTor – k6gsb4ibatcico35.onion
qPastebin – 4eiruntyxxbgfv7o.onion/paste/
DoxBin – npieqpvpjhrmdchg.onion
Bittit – ejz7kqoryhqwosbk.onion/

Identification

Onion ID – g6lfrbqd3krju3ek.onion
All Purpose Identities – cf6qjzygqbu2c4z5.onion
Terminal Velocity ID Store – 4eiruntyxxbgfv7o.onion/snapbbs/22ad3c25/threadlist.php
Education and Research

The TOR Library – am4wuhz3zifexz5u.onion
TOR University – ccbn6mrdudb5fbxd.onion/TorUniversity.html
The Human Experiment – xqz3u5drneuzhaeo.onion
Tard’s Library – xsin4xbme24aatvk.onion

Security and Society

AntiSec Embassy – ibhg35kgdvnb7jvw.onion
Parazite – qx7j2selmom4ioxf.onion

Blogs

LookingGlass – tns7i5gucaaussz4.onion/blog/
Hidden Blog – utup22qsb6ebeejs.onion/

Tor infrastructure

hbpvnydyyjbmhx6b.onion/ help run the enter – exit servers and set them up or augment the bandwith for certain countries
a5ec6f6zcxtudtch.onion/tor-i2p-proxy2-en.htm to iepsites
losacd3c5pt25ymv.onion/ not free fast good bridges

Directory
zw3crggtadila2sg.onion/downornot/ down or not test it first
kpvz7ki2v5agwt35.onion/wiki/index.php/List_of_Anonymous_Networks private services
http://ahmia.fi/ just a list of 200 links to sites of which many don’t work anymore
32rfckwuorlf4dlv.onion/ some links
torlinkbgs6aabns.onion/
4jbxjjrbakmdcmvb.onion/complete.html some links
xqz3u5drneuzhaeo.onion/users/noel/forum.php?id=1 active forum about links on deepweb
3suaolltfj2xjksb.onion/hiddenwiki/index.php/Main_Page directory of links
torlinkbgs6aabns.onion/ torlinks

Search

xmh57jrzrnw6insl.onion/ search 1 million onion pages
nstmo7lvh4l32epo.onion/search.php?query=belgium&search=1 search
sc3njt2i2j4fvqa3.onion/ newzbin search of Usenet

Interesting onions

kpvz7ki2v5agwt35.onion/wiki/index.php/Email test security emailservice blog
4eiruntyxxbgfv7o.onion/ anonymous services photo sharing etc

Bookmarks

x7yxqg5v4j6yzhti.onion/ public and private bookmarks onion
ay5kwknh6znfmcbb.onion/torbook/ social network for tor

Chat and forums

4eiruntyxxbgfv7o.onion/snapbbs/736364f4/index.php anonymous irc chat
4eiruntyxxbgfv7o.onion/snapbbs/
ci3hn2uzjw2wby3z.onion/ public chatboard
jhiwjjlqpyawmpjx.onion/ TorMail
a5ec6f6zcxtudtch.onion/anon-email.htm mixmaster anonymous email
a5ec6f6zcxtudtch.onion/anon-news.htm anonymous forums mixmaster
c4wcxidkfhvmzhw6.onion/index.en.html anonymous privacybox as contact for bloggers and journalists
qtt2yl5jocgrk7nu.onion/ encrypted secret keys for people working for or with Indymedia, an alternative worldwide mediaplatform
ueoluw7ltbo6sdx2.onion/ anonymous escrow service paying for payments between seller and buyers

Hosting

xqz3u5drneuzhaeo.onion/ hidden hosting not free anymore php mysql
ms4kc75hlvnfcxgz.onion/ hidden blogging

Books

p2uekn2yfvlvpzbu.onion/ books about
c3jemx2ube5v5zpg.onion/ english a lot SF
xsin4xbme24aatvk.onion/ a lot of military and resistance documents
zqhu3ynqqbqzsq2c.onion/libreria/Hannah Arendt/
c3jemx2ube5v5zpg.onion/?author=view&id=18&letter=B Orwell
zqhu3ynqqbqzsq2c.onion/libreria/ some philosophers
xqz3u5drneuzhaeo.onion/users…a=FreeBibliothecaAlexandrinaAnonyShareUploads many books
utovvyhaflle76gh.onion/sTORage/Books/ books new world order not done yet
kpynyvym6xqi7wz2.onion/files.html older files from the underground – pseudo anarchist bit kiddy
crimethinc.com/books/ alternative anarchistic books and stuff posters and so
am4wuhz3zifexz5u.onion/ but mostly very older books

Filesharing

4eiruntyxxbgfv7o.onion/imgzapr/
utovvyhaflle76gh.onion/sTORage/ upload site
4eiruntyxxbgfv7o.onion/paste/
ocrlwkklxt3ud64u.onion/ tor upload
p7d2k2xiioailnuu.onion/ image upload
i7hknwg4up2jhdkx.onion/ uploader
4eiruntyxxbgfv7o.onion/anonyshares.html max 10mb
4eiruntyxxbgfv7o.onion/snapbbs/3232a619/ filesharing forum login
dg6exbqq42btatnw.onion/ file sharing
ldwvpjcrw5mmekvg.onion/ use some of the 100GB of usable FTP space on a server here
f3ew3p7s6lbftqm5.onion/ onion filestore
zw3crggtadila2sg.onion/imageboard/ chan board very chan
4eiruntyxxbgfv7o.onion/snapbbs/7fbb7e1f/ paparazzi forum log in

Illegal markets

silkroadvb5piz3r.onion/silkroad/register the illegal market
5onwnspjvuk7cwvk.onion/ blackmarket
clsvtzwzdgzkjda7.onion/ active hacking forum and market place
4eiruntyxxbgfv7o.onion/ ads selling stolen creditcards on
clsvtzwzdgzkjda7.onion/viewtopic.php?f=57&t=3631 IDstores on Tor
xqz3u5drneuzhaeo.onion/users/experiments/warehouse3.html fake or not, medical experiments
wkwjr7pn7xubtpx5.onion/ carding forum
wihwaoykcdzabadd.onion/ carders planet just page with services
4eiruntyxxbgfv7o.onion/snapbbs/3e238502/threadlist.php? carders list quite dead
wdnqg3ehh3hvalpe.onion/ PS3 cracking list and root keys
n2wrix623bp7vvdc.onion/hackingservices.html just page with hack services
4eiruntyxxbgfv7o.onion/snapbbs/794b7d4/ cracked games sign up
yj2nu2qygzpjcglm.onion/ one of the so-called hitman for hire

Hackers

3terbsb5mmmdyhse.onion/ hashers that crack passwords
lcvkso2t5t3cmy3x.onion/hackcanada/index.html hack canada
4eiruntyxxbgfv7o.onion/snapbbs/d136fbb/threadlist.php? not very active hackerforum
4eiruntyxxbgfv7o.onion/snapbbs/4b5fce4e/ hackerforums but need to sign up
u32gu6u4cf5zpkzw.onion/ hiring hackers
ugh6gtz44ifx23e7.onion/ rent a hacker service (scam?)
4eiruntyxxbgfv7o.onion/snapbbs/19cc6d6e/ uscyberlabs securityforum login

Documents, info and pastes

4eiruntyxxbgfv7o.onion/paste/browse.php pastes recent public
6sgjmi53igmg7fm7.onion/index.php?title=Main_Page buggedplanet.info copy
f3ew3p7s6lbftqm5.onion/stratfor_full_misc.txt stratfor full text with cvv
zbnnr7qzaxlk5tms.onion/ wikileaks 2010
utovvyhaflle76gh.onion/sTORage/Wikileaks Archives/ collatoral damage
npieqpvpjhrmdchg.onion/doxviewer.php doxing like pastebin
nwycvryrozllb42g.onion/isp-spy/ all the ISP spy files for police interception
nwycvryrozllb42g.onion/ PS3 jailbreak
nwycvryrozllb42g.onion/midasbank/ MIDFirst of all

Click here ---> http://zyan.me/KWDFa to download the .txt file.

Tuesday 30 May 2017

Building a Radio Listening Station To Decode Digital Audio & Police Dispatches


On April 7, 2017, residents in Dallas, Texas, woke to the sound of emergency sirens blaring all over the city. No one could shut them off, and after repeated efforts to contain the situation, the city had to shut down the entire system. While the media reported a sophisticated computer hack was responsible, the truth was much less high-tech.
The sirens in Dallas were controlled by a series of radio signals that weren't encrypted, and anyone could broadcast them with the right equipment. Turns out, someone simply listened in to the radio signal during a test or real emergency that triggered the sirens to go off, then played it back later. This low-tech hack managed to use the principles of signals intelligence to control a system via radio waves.
But how would someone sniff radio signals — and then use them to control or interact with a system?
Things like garage door openers, car keys, and apparently emergency sirens are controlled by radio frequencies that can be eavesdropped on, decoded, or even simply rebroadcast to trigger the same effect. In this series, we will learn to both detect and listen in on these hidden radio frequencies, then rebroadcast or transmit them — on the $35 Raspberry Pi, no less.
Getting Started with a Portable Radio Listening Station
         
                  This build will teach you to detect local radio signals outside the "normal" FM band you're used to tuning into in your car or on your commercial FM radio. We will create a portable listening station to explore the VHF (very high frequency) and UHF (ultra high frequency) spectrums and decode digital audio data to make sense of the sounds in the world around you.
This will start our series on signals intelligence (SIGINT), which is the analysis of signals to discern intelligence about a target. Of course, the first step in analyzing a signal is being able to hear it, so we'll need to dive into talking about both software-defined radio (SDR) and the radio frequency spectrum we'll be pulling the signal from.
The Radio Spectrum
Earn free bitcoin
                 There's an invisible conversation going around us in the radio frequency all the time. Though we can't see it, we transmit our civilization's wireless data overwhelmingly through the radio frequency spectrum.
Visible light sits on that spectrum between 430–770 THz, which is what our biological eyes can sense. But down in the sub-1 GHz range lies much of our radio communication, including FM radio and the communication that takes place between law enforcement and first responders.
Wouldn't it be great if you could peer into this spectrum and make sense of signals of your biological body isn't built to perceive?
The basics of the radio frequency spectrum.
The radio spectrum is huge, so to avoid getting lost, this guide will be quite specific. However, there is a lot to explore and this guide is only the beginning. If you're curious about the signals you're receiving, you can always reference them against this handy chart if you're in the United States. In this guide, 24 MHz to 1.7 GHz is where we'll be operating.
Gather Your Materials
             To accomplish this tutorial, you'll need an SDR dongle and antenna to receive and convert the signal. You'll also need software to interpret the radio signal as well as another software to decode digital speech.
The Software-Defined Radio Receiver
              SDR takes the parts of radio tuning that was normally done by crystals or local oscillators and accomplishes them with software instead. The basic requirements for such a system are a personal computer (or Raspberry Pi), a sound card or signal processor, and an RF receiver to receive the signal. As a result, many of the processes done by dedicated hardware are now done by a computer, making the entire radio system very low cost and flexible.
The team at RTL-SDR created a very cheap software-defined radio receiver that uses a DVB-T television tuner dongle based on the RTL2832U chipset, which they wrote a new software driver for to directly access the signal data. Their SDR kit gets you up and running for a mere $25.
Your other options, if you're feeling fancy, are the $169 Airspy R2 or the $149 SDRPlay. While those are certainly nice, I prefer low-cost, open-source, and commonly used tools for hacking, so we will focus on the RTL-SDR.
I used an RTL-SDR plus two adjustable antennas, but any SDR kit that can tune into around the 400–600 MHz range should do fine. This tutorial will use the RTL-SDR for selectors in our SDR radio program; You may need to modify them to get a different adapter to work.
The SDR Software
Next, we will need software to interpret the radio signal. The open-source GQRX is my tool of choice, after managing to get it working on macOS Sierra and Kali Linux. This guide will cover macOS. However, I will cover the Kali install on a Raspberry Pi another time, as it requires a lot of dependencies and needs the sound cards to be working properly. The macOS build is more straightforward.
The Digital Speech Decoder
My macOS listening post build relies on the ability to decode digital data we intercept live to listen in on conversations. To do so, we will focus on one common type of signal we hope to intercept — digital audio.
Digital audio constitutes a signal of interest because it's frequently used by police and security organizations for communication and is often not encrypted since they are encoded. This, of course, is silly since encoding can be easily broken.
In my city, police do not encrypt dispatch except for tactical channels, it's just encoded as digital audio, so we'll use DSD to break the code live and listen in to their communications. We do this by streaming the audio via UDP (User Datagram Protocol) to DSD running in a terminal window below GQRX that decodes digital audio.
Decoding some digital audio.
Someone might point out that there are websites where you can stream these kinds of signals decoded by someone with a fancy, expensive radio and streamed digitally. That's great, but the stream is from a third party provided over the internet. Source your own data. For the cost of an SDR tuner and the software to run it, you can target specific agencies in your area for data collection.
Install GQRX
GQRX, as pictured above in Kali, required a ton of dependencies. Want to compile them for hours? Me neither, so we'll install them using MacPorts. There is also a version available via Homebrew, but I was disappointed to find it didn't work properly.
First thing's first, MacPorts. Head to the MacPorts homepage and download the appropriate version, ensuring you've downloaded and installed Xcode and the Xcode Command Line Tools. Once Xcode is all ready, install MacPorts via the guided install, and you should be ready to begin installing GQRX.
Run GQRX
To ensure everything is up to date, update MacPorts by typing the following in terminal:
    sudo port selfupdate
Now, the battle begins. To download and install all the dependencies for GQRX, enter:
    sudo port install gqrx
You may get errors while installing, as I did. For my Mac, this took six tries. Each time I chewed through more dependencies before getting an error and having to start the command over, and each time the list of dependencies got smaller until finally, they were all installed. Eventually, your resolve will defeat the machine and you will finish installing the complete list of dependencies.
Once the install is complete, run GQRX by typing the following in a terminal:
    gqrx
Decode Digital Audio with DSD
To install DSD, we will need to install Homebrew since, of course, it's not available in MacPorts. Thanks to Hugh Dev, there is a nicely documented way to install a speech decoder via Homebrew.
To install Homebrew, run the following in terminal (ignore the giant spaces if you see them, they're just once space each):
    ruby -e "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/master/install)"
Once this is complete, we can install DSD. Run the following commands in terminal to install DSD:
    brew install git cmake libsndfile itpp portaudio
    brew install --HEAD mbelib
    git clone https://github.com/szechyjs/dsd.git
    cd dsd & mkdir build && cd build
    cmake ..
    make
    sudo make install
Run "dsd -a" to see a list of available audio sources. We'll need this later to connect the audio from our receiver too. In this case, it's pretty straightforward.
Configure GQRX with the RTL-SDR
If you try to start capture in GQRX with the wrong settings enabled, it will likely crash. Click on the hardware configuration tab (the green chip icon next to the "play" symbol on the top left of the screen) and enter the configuration to match the following configuration.
I/Q input:
    Device: Other...
    Device string: rtl=0
    Input rate: 1800000
    Decimation: None
    Sample rate: 1.800 Msps
    Bandwidth: 2.700000 MHz
    LNB LO: 0.000000 MHz
Audio output:
    Device: Built-in Output
    Sample rate: 48 kHz
Once your configuration matches mine, click okay and then plug in your RLT-SDR with antenna deployed. Due to something I did, I'll remind you to turn down your audio, take out any headphones, and turn down the gain.
Next, click the play button to start the capture.
Capture Unencoded Audio from Our Listening Station
If everything went well, we have the entire spectrum the RTL-SDR can tune into at our disposal. For practice, tune to a channel between 88 and 102 MHz, the standard range for FM radio. Set the "mode" to FM mono (or stereo depending on which sounds better), and click on a strong signal you can see in that range. You should hear audio play. You're tuning into public broadcasts. Explore up and down the frequency to start finding other unencoded broadcasts, using the guide above to understand the signals you find.
Find Encoded Audio to Decode
Look up what frequencies emergency services in your area use and navigate to that set of frequencies. If you live in a city like I do, this should be lit up with transmissions that look like "waterfalls" of data rather than waveforms of FM transmissions. In these frequencies, you may find unencoded dispatch frequencies and private security company two-way radio communication as well, but you must switch modes to hear it.
Switch "mode" to narrow FM and try tuning into an unencoded audio stream if one is available. If one is not, target a waterfall that looks like the one in the picture below. Select the "UDP" option in the audio window as shown below in blue to output our audio to DSD.
Look for streams that turn on and off. Always-on streams are usually trunk relay units or other logistics-related data transmissions that aren't human voices we can decode. Once you find a promising one, let's try decoding it.
With the station locked on and UDP selected, run the following in terminal to check if the output is working.
    nc -u -l localhost 7355
If so, run the following to begin decoding digital speech, with pa:1 the number of the output device we found before.
    nc -l -u localhost 7355 | dsd -i - -o pa:1
As packets are received from the air, they will show up in DSD.
Successful intercept of digital audio from emergency services.
The packets in the photo above are indicative of a digital voice transmission being intercepted and decoded live.
Squeeze Speech Out of a Bad Signal
Some signals won't yield voice because they are encrypted (rather than encoded) or require some tweaking to lock on to. Try narrowing or expanding the filter, adjusting the gain or squelch, or going up or down the spectrum to get a voice stream to begin flowing through DSD. Be creative in your antenna placement and note differences in reception in response to things you do or places you put it.
This build gives you the ability to scan normally invisible spectrums and begin to listen in on those who may think they are communicating in private. While decoding radio broadcasts is legal in the US, things get interesting when we go up to cellular phone and Wi-Fi transmissions.
Make sure to check out my follow-up guide, where I go over broadcasting signals from a Raspberry Pi in the radio spectrum by simply adding a piece of wire.
Thanks for reading, and make sure to keep an eye on my blog for more hacking tutorials. You can ask me questions here or @joelvaiju on instagram.

Wednesday 18 January 2017

Build a Home Made Cell Phone jammer

Technical details:
       

                                  Many cell phones use GSM800 mobile standard to operate, thus my VCO (sweeping oscillator) is tuned to the 800MHz frequency range. It may be quite difficult to make this one to work properly without some skills and good testing tools, but in result you will have the efficient VCO.

        I used clock oscillator for 45MHz as the noise generator for this jammer. It drives the local oscillator port which is located at the mixer. The signal is going out from the local oscillator and passes through the impedance matching network along its way. This helps equate the impedance of 45MHz clock oscillator with the impedance of the mixer's port.

             This port acts like RF input of the signal jammer. The RF output signal passes through the amplifier on the mini-circuit. The output power is increased by additional 15-16dbm in this way. Then the output signal goes to the RF output antenna. RF input has the antenna too.

Jammer operating:
             
                  Why I chose 45MHz clock oscillator? Because GSM800 band transmitted and received signals are always separated by the exact number of frequency and it is that 45MHz. Now picture this: cell phone user dial someone and signal goes off. RF input antenna catches it and jammer modifies this signal and lets it go. This signal have a frequency of cell phone's received signal, so cell phone user would hear his or her own voice in a phone! :)

              I should also mention that this particular cell phone jammer might be used to block the signal of the cell-based car tracking device which records your GPS data and sends it to some bad guys. And it probably can even jam some IED signals if they are controlled by cell phone GSM800 band.
      
           But I hope that there be no situation in this life when that feature will be needed by me, or you, or anyone else.