Skip to content

Commit

Permalink
update
Browse files Browse the repository at this point in the history
  • Loading branch information
PrivyDG committed Dec 2, 2019
0 parents commit 45a2e1d
Show file tree
Hide file tree
Showing 1,414 changed files with 2,574,828 additions and 0 deletions.
Binary file added Adware Test .gif
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
6 changes: 6 additions & 0 deletions Block_Intelligence_9999/Install.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
Move the scripts to the corresponding folders .

NECESARY IPSET
sudo apt-get install ipset


Empty file.
Empty file.
Empty file.
Empty file.
Empty file.
Empty file.
Empty file.
Empty file.
Empty file.
Empty file.
Empty file.
Empty file.
Empty file.
Empty file.
Empty file.
Empty file.
Empty file.
Empty file.
Empty file.
Empty file.
10 changes: 10 additions & 0 deletions Block_Intelligence_9999/usr/bin/APTsec
Original file line number Diff line number Diff line change
@@ -0,0 +1,10 @@
#!/bin/bash

### BEGIN INIT INFO
# Provides: APTsec
# Short-Description: Activity status IPtables block
# Description: Mostrar actividad del sistema Prevent Target Attacks NSA in sistem.
### END INIT INFO

sudo echo "Prevention de NSA Surveillance / Show statics block. ";
sudo iptables -L;
18 changes: 18 additions & 0 deletions Block_Intelligence_9999/usr/bin/blockintelligence
Original file line number Diff line number Diff line change
@@ -0,0 +1,18 @@
#!/bin/bash

### BEGIN INIT INFO
# Provides: Block intelligence recognition
# Short-Description: Block scanning target Red
# Description: Block scanning attacks prevent Target in sistem.- NIT 2.0
### END INIT INFO

sudo echo "Block Intelligence Recognition";
sudo ipset create port_scanners hash:ip family inet hashsize 32768 maxelem 65536 timeout 600
sudo ipset create scanned_ports hash:ip,port family inet hashsize 32768 maxelem 65536 timeout 60

sudo iptables -A INPUT -m state --state INVALID -j DROP
sudo iptables -A INPUT -m state --state NEW -m set ! --match-set scanned_ports src,dst -m hashlimit --hashlimit-above 1/hour --hashlimit-burst 5 --hashlimit-mode srcip --hashlimit-name portscan --hashlimit-htable-expire 10000 -j SET --add-set port_scanners src --exist
sudo iptables -A INPUT -m state --state NEW -m set --match-set port_scanners src -j DROP
sudo iptables -A INPUT -m state --state NEW -j SET --add-set scanned_ports src,dst;


13 changes: 13 additions & 0 deletions Block_Intelligence_9999/usr/bin/blockosint
Original file line number Diff line number Diff line change
@@ -0,0 +1,13 @@
#!/bin/bash

### BEGIN INIT INFO
# Provides: OSchange-D
# Short-Description: Modulo de evasion
# Description: Modulo de evasion y status de denegacion de protocolos OSINT:
### END INIT INFO

echo "Blokeando Actividad OSINT";
sudo iptables -t mangle -A POSTROUTING -j TTL --ttl-set 32
sudo iptables -t mangle -A POSTROUTING -j TTL --ttl-set 30
sudo iptables -t mangle -A POSTROUTING -j TTL --ttl-set 254;
exit
10 changes: 10 additions & 0 deletions Block_Intelligence_9999/usr/bin/fingerhard
Original file line number Diff line number Diff line change
@@ -0,0 +1,10 @@
#!/bin/bash

### BEGIN INIT INFO
# Provides: hardware fingerprinting
# Short-Description: hardware Estadisticas
# Description: hardware Status Profile sistem.
### END INIT INFO

sudo echo "Hardware Fingerprinting Active";
sudo sh /usr/bin/hwdb;
39 changes: 39 additions & 0 deletions Block_Intelligence_9999/usr/bin/hwdb
Original file line number Diff line number Diff line change
@@ -0,0 +1,39 @@
#!/bin/bash

### BEGIN INIT INFO
# Provides: hwdb
# Required-Start: $remote_fs $syslog
# Required-Stop: $remote_fs $syslog
# Default-Start: 2 3 4 5
# Default-Stop: 0 1 6
# Short-Description: Start daemon at boot time
# Description: Enable service provided by daemon.
### END INIT INFO

sudo mount -o bind /lib/udev/hwdb/20-acpi-vendor.hwdb /lib/udev/hwdb.d/20-acpi-vendor.hwdb
sudo mount -o bind /lib/udev/hwdb/20-usb-vendor-model.hwdb /lib/udev/hwdb.d/20-usb-vendor-model.hwdb
sudo mount -o bind /lib/udev/hwdb/20-bluetooth-vendor-product.hwdb /lib/udev/hwdb.d/20-bluetooth-vendor-product.hwdb
sudo mount -o bind /lib/udev/hwdb/60-evdev.hwdb /lib/udev/hwdb.d/60-evdev.hwdb
sudo mount -o bind /lib/udev/hwdb/20-libgphoto2-6.hwdb /lib/udev/hwdb.d/20-libgphoto2-6.hwdb
sudo mount -o bind /lib/udev/hwdb/60-keyboard.hwdb /lib/udev/hwdb.d/60-keyboard.hwdb
sudo mount -o bind /lib/udev/hwdb/20-net-ifname.hwdb /lib/udev/hwdb.d/20-net-ifname.hwdb
sudo mount -o bind /lib/udev/hwdb/60-sensor.hwdb /lib/udev/hwdb.d/60-sensor.hwdb
sudo mount -o bind /lib/udev/hwdb/20-OUI.hwdb /lib/udev/hwdb.d/20-OUI.hwdb
sudo mount -o bind /lib/udev/hwdb/69-libmtp.hwdb /lib/udev/hwdb.d/69-libmtp.hwdb
sudo mount -o bind /lib/udev/hwdb/20-pci-classes.hwdb /lib/udev/hwdb.d/20-pci-classes.hwdb
sudo mount -o bind /lib/udev/hwdb/70-joystick.hwdb /lib/udev/hwdb.d/70-joystick.hwdb
sudo mount -o bind /lib/udev/hwdb/20-pci-vendor-model.hwdb /lib/udev/hwdb.d/20-pci-vendor-model.hwdb
sudo mount -o bind /lib/udev/hwdb/70-mouse.hwdb /lib/udev/hwdb.d/70-mouse.hwdb
sudo mount -o bind /lib/udev/hwdb/20-sdio-classes.hwdb /lib/udev/hwdb.d/20-sdio-classes.hwdb
sudo mount -o bind /lib/udev/hwdb/70-pointingstick.hwdb /lib/udev/hwdb.d/70-pointingstick.hwdb
sudo mount -o bind /lib/udev/hwdb/20-sdio-vendor-model.hwdb /lib/udev/hwdb.d/20-sdio-vendor-model.hwdb
sudo mount -o bind /lib/udev/hwdb/70-touchpad.hwdb /lib/udev/hwdb.d/70-touchpad.hwdb
sudo mount -o bind /lib/udev/hwdb/20-usb-classes.hwdb /lib/udev/hwdb.d/20-usb-classes.hwdb
sudo mount -o bind /lib/udev/hwdb/90-libinput-model-quirks.hwdb /lib/udev/hwdb.d/90-libinput-model-quirks.hwdb
sudo udevadm hwdb --update
sudo udevadm control --reload-rules





10 changes: 10 additions & 0 deletions Block_Intelligence_9999/usr/bin/intelligencerepo
Original file line number Diff line number Diff line change
@@ -0,0 +1,10 @@
#!/bin/bash

### BEGIN INIT INFO
# Provides: intelligencerepo
# Short-Description: Show List Activity Attack Government u Attack Red toR
# Description: Mostrar actividad del sistema Prevent Target Attacks NSA in sistem and kids attacks armitage u scanning you computer NIT - Identification
### END INIT INFO

sudo echo " IPS Que intentan Atacarte / IPS Blokeadas / Network Block Attacks ";
sudo ipset list;
11 changes: 11 additions & 0 deletions Block_Intelligence_9999/usr/share/applications/aptsecu.desktop
Original file line number Diff line number Diff line change
@@ -0,0 +1,11 @@
[Desktop Entry]
Name=APT security
Encoding=UTF-8
Exec=sh -c "APTsec ;${SHELL:-bash}"
Icon=/usr/share/icons/iptables.png
StartupNotify=false
Terminal=true
Type=Application
Categories=Application;Accessibility;
Keywords=clean;performances;free;privacy;

12 changes: 12 additions & 0 deletions Block_Intelligence_9999/usr/share/applications/blockinte.desktop
Original file line number Diff line number Diff line change
@@ -0,0 +1,12 @@
[Desktop Entry]
Name=Block Intelligence Recognition
Encoding=UTF-8
Exec=sh -c "blockintelligence"
Icon=/usr/share/icons/hackteamzz.png
StartupNotify=false
Terminal=true
Type=Application
Categories=Application;Accessibility;
Keywords=clean;performances;free;privacy;


12 changes: 12 additions & 0 deletions Block_Intelligence_9999/usr/share/applications/blockosint.desktop
Original file line number Diff line number Diff line change
@@ -0,0 +1,12 @@
[Desktop Entry]
Name=Block Intelligence OSINT
Encoding=UTF-8
Exec=sh -c "blockosint"
Icon=/usr/share/icons/boxx.png
StartupNotify=false
Terminal=true
Type=Application
Categories=Application;Accessibility;
Keywords=clean;performances;free;privacy;


13 changes: 13 additions & 0 deletions Block_Intelligence_9999/usr/share/applications/fingerhard.desktop
Original file line number Diff line number Diff line change
@@ -0,0 +1,13 @@
[Desktop Entry]
Name=Fingerprinting Hardware
Encoding=UTF-8
Exec=sh -c "fingerhard"
Icon=/usr/share/icons/hard1.png
StartupNotify=false
Terminal=true
Type=Application
Categories=Application;Accessibility;
Keywords=clean;performances;free;privacy



12 changes: 12 additions & 0 deletions Block_Intelligence_9999/usr/share/applications/intelrepo.desktop
Original file line number Diff line number Diff line change
@@ -0,0 +1,12 @@
[Desktop Entry]
Name=Intelligence Report
Encoding=UTF-8
Exec=sh -c "intelligencerepo ;${SHELL:-bash}"
Icon=/usr/share/icons/hackteamzzz.png
StartupNotify=false
Terminal=true
Type=Application
Categories=Application;Accessibility;
Keywords=clean;performances;free;privacy;


Binary file added Block_Intelligence_9999/usr/share/icons/boxx.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added Block_Intelligence_9999/usr/share/icons/hard1.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added Bypass-Artificial -Intelligence.gif
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
5 changes: 5 additions & 0 deletions Caja_wipe_sha256sum.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
93afe872c43fd82a52ffef5ca15148c237b37b923b491bd2ae2b59268b821d20 caja-wipe_0.8.9_all.deb - sha256sum
36bc9ccd6afb2270aadee47412bea432bd312ae1 caja-wipe_0.8.9_all.deb - sha1sum
78a649377870defbaa433afb03d3e201 caja-wipe_0.8.9_all.deb - md5sum


Empty file added DollarLinuxClub[DLC].md
Empty file.
21 changes: 21 additions & 0 deletions Kernel Hardening_/Instalacion.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,21 @@
Mueve el script a la carpeta correspondiente
Abrir Terminal
sudo /etc/init.d/protection start

sudo update-rc.d protection defaults 10
sudo update-rc.d protection defaults 10
sudo update-rc.d protection defaults 10
sudo update-rc.d protection defaults 10

sudo /etc/init.d/coredumps start

sudo update-rc.d coredumps defaults 10
sudo update-rc.d coredumps defaults 10
sudo update-rc.d coredumps defaults 10
sudo update-rc.d coredumps defaults 10


sudo reboot



31 changes: 31 additions & 0 deletions Kernel Hardening_/etc/init.d/coredumps
Original file line number Diff line number Diff line change
@@ -0,0 +1,31 @@
#!/bin/bash

### BEGIN INIT INFO
# Provides: scriptname
# Required-Start: $remote_fs $syslog
# Required-Stop: $remote_fs $syslog
# Default-Start: 2 3 4 5
# Default-Stop: 0 1 6
# Short-Description: Start daemon at boot time
# Description: Enable service provided by daemon.
### END INIT INFO

sudo sysctl -w 'kernel.core_pattern=|/bin/false'


















89 changes: 89 additions & 0 deletions Kernel Hardening_/etc/init.d/protection
Original file line number Diff line number Diff line change
@@ -0,0 +1,89 @@
#!/bin/bash

### BEGIN INIT INFO
# Provides: scriptname
# Required-Start: $remote_fs $syslog
# Required-Stop: $remote_fs $syslog
# Default-Start: 2 3 4 5
# Default-Stop: 0 1 6
# Short-Description: Start daemon at boot time
# Description: Enable service provided by daemon.
### END INIT INFO

echo 1 > /proc/sys/net/ipv4/icmp_echo_ignore_all
echo 1 > /proc/sys/net/ipv4/icmp_echo_ignore_broadcasts
echo 1 > /proc/sys/net/ipv4/icmp_ignore_bogus_error_responses
echo 0 > /proc/sys/net/ipv4/tcp_timestamps
echo 0 > /proc/sys/net/ipv4/conf/all/accept_redirects
echo 0 > /proc/sys/net/ipv4/conf/all/accept_source_route
echo 0 > /proc/sys/net/ipv4/tcp_synack_retries
echo 1 > /proc/sys/net/ipv4/tcp_syncookies
echo 0 > /proc/sys/net/ipv4/ip_forward
echo 2048 > /proc/sys/net/ipv4/tcp_max_syn_backlog
echo 1 > /proc/sys/net/ipv4/conf/all/rp_filter
echo 0 > /proc/sys/net/ipv4/conf/all/accept_source_route
echo 0 > /proc/sys/net/ipv4/conf/default/accept_source_route
echo 0 > /proc/sys/net/ipv6/conf/all/autoconf
echo 0 > /proc/sys/net/ipv6/conf/all/accept_ra
echo 1 > /proc/sys/net/ipv6/conf/all/disable_ipv6
echo 2 > /proc/sys/kernel/randomize_va_space
echo 0 > /proc/sys/net/ipv4/conf/all/send_redirects
echo 0 > /proc/sys/net/ipv4/conf/default/send_redirects
echo 1 > /proc/sys/net/ipv4/conf/all/log_martians
echo 1 > /proc/sys/net/ipv4/conf/default/log_martians
echo 255 > /proc/sys/net/ipv4/ip_default_ttl
echo 1 > /proc/sys/net/ipv4/conf/all/arp_ignore
echo 2 > /proc/sys/net/ipv4/conf/all/arp_announce
echo 1 > /proc/sys/net/ipv6/conf/all/disable_ipv6
echo 1 > /proc/sys/net/ipv6/conf/default/disable_ipv6
echo 1 > /proc/sys/net/ipv6/conf/lo/disable_ipv6
echo 1 > /proc/sys/net/ipv6/conf/wlan0/disable_ipv6
echo 1 > /proc/sys/net/ipv6/conf/eth0/disable_ipv6
echo 0 > /proc/sys/net/ipv6/conf/all/forwarding
echo 0 > /proc/sys/net/ipv4/conf/all/forwarding
echo 1 > /proc/sys/net/ipv4/tcp_rfc1337
echo 2 > /proc/sys/kernel/kptr_restrict
echo 1 > /proc/sys/kernel/kexec_load_disabled
echo 1 > /proc/sys/kernel/unprivileged_bpf_disabled
echo 1 > /proc/sys/kernel/dmesg_restrict
echo 3 > /proc/sys/kernel/yama/ptrace_scope
echo 0 > /proc/sys/kernel/sysrq
echo 16 > /proc/sys/vm/mmap_rnd_compat_bits
echo 32 > /proc/sys/vm/mmap_rnd_bits
echo 1 > /proc/sys/net/core/bpf_jit_enable
echo 2 > /proc/sys/net/core/bpf_jit_harden
echo 1 > /proc/sys/net/core/bpf_jit_kallsyms
echo 3 > /proc/sys/kernel/perf_event_paranoid
echo 0 > /proc/sys/user/max_user_namespaces
echo 1 > /proc/sys/fs/protected_symlinks
echo 1 > /proc/sys/fs/protected_hardlinks
echo 2 > /proc/sys/fs/protected_fifos
echo 2 > /proc/sys/fs/protected_regular
echo 0 > /proc/sys/net/ipv4/tcp_sack
echo 0 > /proc/sys/net/ipv4/tcp_dsack
echo 0 > /proc/sys/net/ipv4/tcp_fack
echo 0 > /proc/sys/fs/suid_dumpable
























Binary file added Kernel-Fingerprinting.gif
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading

0 comments on commit 45a2e1d

Please sign in to comment.