mattizz'z weblog

Een rustpunt in barre tijden

Dit leek te werken. Stream openen en pas dan P2P Stream geautomatiseerd installeren. Plexus versie 0.1.4

### Installation ###

For this to work, you need the Plexus Addon already installed in Kodi. The Plexus Kodi addon was discontinued by the developer but it still works. You can find it easily on the web.

Then open a virtual terminal, for example via SSH, and run the following commands (you can copy/paste to terminal):

cd ~/.kodi/userdata/addon_data/program.plexus
sudo rm -r acestream
tar xfv acestream_rpi_3.1.5.tar.gz

Done. Then you can play acestreams again.

PS: If you are running an OS as root, like OpenELEC, you may need to remove the “sudo” on the second line.

How to install and configure Tor to work with ZeroNet on Mac OSX

Guide mac tor zeronet guide mac tor zeronet

I figured I’d make a quick guide, since I just had to explain this, and more mac users seem to be coming onto zeronet with very little instructions on how to do things. So without further ado, here’s how to set up ZeroNet with Tor on Mac.
1. Make sure you have homebrew installed. Mac Ports apparently works too, but I use brew. For convenience, the terminal command to install homebrew is:
/usr/bin/ruby -e “$(curl -fsSL”
2. Run brew install tor in the terminal to download/install the tor daemon.
3. After it’s done downloading and installing, navigate to the /usr/local/etc/tor folder on your computer. The easiest way to do this is to open finder and hit cmd+shift+g and paste it in there. You should see a torrc.sample file.
4. Copy the torrc.sample file and rename the copy to just torrc with no extension. Open it up in a plain-text editor. You should probably a plain-text editor or a code editor like sublime to prevent auto-formatting from messing it up. Avoid using mac’s built-in one.
5. Look for #ControlPort 9051 and simply remove the #.
6. Two lines down you should see #CookieAuthentication 1 remove the # from this one too.
7. Save the file and exit. Then launch tor using tor in the terminal.
8. Restart zeronet and it’ll run with tor. If you want to use tor for every connection (rather than just having one for a bridge or to access tor-only peers) then on the zero net homepage, click on the tor button in the top right, and hit ‘enable tor for every connection’ at the bottom. Then restart zeronet a second time. You can disable it in the same way.

ZeroNet starten op MAC OSX:

Uitleg hier:
Het ZeroNet bestand vanuit de Finder in een terminal trekken en starten:


1.On the Ubuntu server run this command:
sudo sshfs -o uid=1000 -o gid=1000 -o allow_other admin@xx.xx.xx.xx:/music /media/music
The Synology music map is now connected with the VPS and in the Emby library all the music is visible on the path /media/music 🙂

Niet getest:
2. sudo mount -t davfs /mnt/

Dark Web OSINT With Python and OnionScan

July 28th, 2016

You may have heard of this awesome tool called OnionScan that is used to scan hidden services in the dark web looking for potential data leaks. Recently the project released some cool visualizations and a high level description of what their scanning results looked like. What they didn’t provide is how to actually go about scanning as much of the dark web as possible, and then how to produce those very cool visualizations that they show.

At a high level we need to do the following:

Setup a server somewhere to host our scanner 24/7 because it takes some time to do the scanning work.
Get TOR running on the server.
Get OnionScan setup.
Write some Python to handle the scanning and some of the other data management to deal with the scan results.
Write some more Python to make some cool graphs. (Part Two of the series)

Let’s get started!
Setting up a Digital Ocean Droplet

If you already use Amazon, or have your own Linux server somewhere you can skip this step. For the rest of you, you can use my referral link here to get a $10 credit with Digital Ocean that will get you a couple months free (full disclosure I make money in my Digital Ocean account if you start paying for your server, feel free to bypass that referral link and pay for your own server). I am assuming you are running Ubuntu 16.04 for the rest of the instructions:

The first thing you need to do is to create a new Droplet by clicking on the big Create Droplet button.
Next select a Ubuntu 16.04 configuration, and select the $5.00/month option (unless you want something more powerful).
You can pick a datacenter wherever you like, and then scroll to the bottom and click Create.

It will begin creating your droplet, and soon you should receive an email with how to access your new Linux server. If you are on Mac OSX or Linux get your terminal open. If you are on Windows then grab Putty from here.

On Mac OSX it is: Finder -> Applications -> Utilities -> Terminal
On Linux: Click your start menu and search for Terminal

Now you are going to SSH into your new server. Windows Putty users just punch the IP address in that you received in your email and hit Enter. You will be authenticating as the root user and then type in the password you were provided in your email.

For Mac OSX and Linux people you will type the following into your terminal:
ssh root@IPADDRESS
You will be forced enter your password a second time, and then you have to change your password. Once that is done you should now be logged into your server.
Installing Prerequisites

Now we need to install the prerequisites for our upcoming code and for OnionScan. Follow each of these steps carefully and the instructions are the same for Mac OSX, Linux or Windows because the commands are all being run on the server.

Feel free to copy and paste each command instead of typing it out. Hit Enter on your keyboard after each step and watch for any problems or errors.
apt-get update
apt-get install tor git bison libexif-dev
apt-get install python-pip
apt-get install python-pip
pip install stem

Now we need to install the Go requirements (OnionScan is written in Go). The following instructions are from Ryan Frankel’s post here.
bash < <(curl -s -S -L [[ -s "$HOME/.gvm/scripts/gvm" ]] && source "$HOME/.gvm/scripts/gvm" source /root/.gvm/scripts/gvm gvm install go1.4 --binary gvm use go1.4

Ok beauty we have Go installed. Now let’s get OnionScan setup by entering the following:

go get
go install

Now if you just type:

(eg onionscan 6pxmfodfdstgndoy.onion)

And hit Enter you should get the onionscan command line usage information. If this all worked then you have successfully installed OnionScan. If you for some reason close your terminal and you can’t run the onionscan binary anymore just simply do a:
gvm use go1.4
and it will fix it for you.

Now we need to make a small modification to the TOR configuration to allow our Python script to request a new identity (a new IP address) which we will use when we run into scanning trouble later on. We have to enable this by doing the following:
tor –hash-password PythonRocks
This will give you output that will include the bottom line that looks like this:
Copy this line and then type:

nano -w /etc/tor/torrc

This will open a simple text editor. Now go to the bottom of the file by hitting the following keystrokes (or endlessly scrolling down):


Paste in the following values at the bottom of the file:

ControlPort 9051
HashedControlPassword 16:3E73307B3E434914604C25C498FBE5F9B3A3AE2FB97DAF70616591AAF8

Now hit CTRL+O to write the file and CTRL+X to exit the file editor. Now type:
service tor restart

This will restart TOR and it should have our new settings in place. Note that if you want to use a password other than PythonRocks you will have to follow the steps above substituting your own password in place, and you will also have to later change the associated Python code.

We are almost ready to start writing some code. The last step is to grab my list of .onion addresses (at last count around 7182 addresses) so that your script has a starting point to start scanning hidden services.


Whew! We are all setup and ready to start punching out some code. At this point you can switch to your local machine or if you are comfortable writing code on a Linux server by all means go for it. I find it easier to use WingIDE on my local machine personally.

A Note About Screen

You notice that both sets of instructions I have you run the screen command. This is a handy way to keep your session alive even if you get disconnected from your server. When you want to jump back into that session, you simply SSH back into the server and execute:
screen -rx

This will be handy later on when you start doing your scanning work, as it can take days for it to complete fully.

Hele artikel hier

Voorbeeld van resultaat:

onionscan 3g2upl4pq6kufc4m.onion
2016/08/08 04:00:55 Starting Scan of 3g2upl4pq6kufc4m.onion
2016/08/08 04:00:55 This might take a few minutes..

————— OnionScan Report —————
High Risk Issues: 0
Medium Risk Issues: 0
Low Risk Issues: 0
Informational Issues: 4

Info: Missing X-Frame-Options HTTP header discovered!
Why this is bad: Provides Clickjacking protection. Values: deny – no rendering within a frame, sameorigin
– no rendering if origin mismatch, allow-from: DOMAIN – allow rendering if framed by frame loaded from DOMAIN
To fix, use X-Frame-Options: deny
Info: Missing X-XSS-Protection HTTP header discovered!
Why this is bad: This header enables the Cross-site scripting (XSS) filter built
into most recent web browsers. It’s usually enabled by default anyway,
so the role of this header is to re-enable the filter for this particular website if it was disabled by the user.
To fix, use X-XSS-Protection: 1; mode=block
Info: Missing X-Content-Type-Options HTTP header discovered!
Why this is bad: The only defined value, “nosniff”, prevents browsers
from MIME-sniffing a response away from the declared content-type.
This reduces exposure to drive-by download attacks and sites serving user
uploaded content that, by clever naming, could be treated as executable or dynamic HTML files.
To fix, use X-Content-Type-Options: nosniff
Info: Missing X-Content-Type-Options HTTP header discovered!
Why this is bad: Content Security Policy requires careful tuning and precise definition of the policy.
If enabled, CSP has significant impact on the way browser renders pages (e.g., inline
JavaScript disabled by default and must be explicitly allowed in policy).
CSP prevents a wide range of attacks, including Cross-site scripting and other cross-site injections.
To fix, use Content-Security-Policy: default-src ‘self’

Omdat Kodi standaard een te kleine cache heeft om langer IPTV te kunnen streamen is hier een tip om dit op te lossen en dat is de cache vergroten door het bestand advancedsettings.xml te creëren en te plaatsten op deze locatie:


A safe setting for most devices with 1GB of RAM that should help most users “on the edge”. All protocols get cached, cache rate fills up pretty much as fast as possible, and cache size is 150MB, using 400MB of ram total.



Hele artikel hier

Een briljante oplossing om comments op een Facebook pagina allemaal automatisch open te klikken ipv dat met de hand 1 voor 1 te doen. Hier de link naar de uitleg:

Expand All Facebook Comments

The bookmarklet clicks on the following links, sequentially. That is, it clicks and waits for the new content, which is recursively checked for new links:

View more comments
View previous replies
View more replies
View [x] more replies
[x] replies
[user] replied

Om een snelkoppeling te maken van het via mono uitvoerbare exe-bestand van NetworkMiner, creëer het volgende script en noem dat bijvoorbeeld NetworkMiner:

#get the bundle’s MacOS directory full path
DIR=$(cd “$(dirname “$0″)”; pwd)

#change these values to match your app

#set up environment

#mono version check

VERSION_MSG=”$APPNAME requires the Mono Framework version $REQUIRED_MAJOR.$REQUIRED_MINOR or later.”

MONO_VERSION=”$(mono –version | grep ‘Mono JIT compiler version ‘ | cut -f5 -d\ )”
MONO_VERSION_MAJOR=”$(echo $MONO_VERSION | cut -f1 -d.)”
MONO_VERSION_MINOR=”$(echo $MONO_VERSION | cut -f2 -d.)”
if [ -z “$MONO_VERSION” ] \
osascript \
-e “set question to display dialog \”$VERSION_MSG\” with title \”$VERSION_TITLE\” buttons {\”Cancel\”, \”Download…\”} default button 2″ \
-e “if button returned of question is equal to \”Download…\” then open location \”$DOWNLOAD_URL\””
exit 1

#get an exec command that will work on the current OS version
OSX_VERSION=$(uname -r | cut -f1 -d.)
if [ $OSX_VERSION -lt 9 ]; then # If OSX version is 10.4
MONO_EXEC=”exec mono”
MONO_EXEC=”exec -a \”$PROCESS_NAME\” mono”

#create log file directory if it doesn’t exist
mkdir -p “`dirname \”$LOG_FILE\”`”

#run app using mono

Het ikoon van de snelkoppeling wijzigen gaat als volgt:

Uw eigen afbeelding of een afbeelding van het internet gebruiken
Kopieer de afbeelding die u wilt gebruiken naar het klembord.

U kunt dit bijvoorbeeld doen door de afbeelding in Voorvertoning te openen en achtereenvolgens ‘Wijzig’ > ‘Selecteer alles’ en ‘Wijzig’ > ‘Kopieer’ te kiezen.
Selecteer het bestand of de map waarvan u het symbool wilt vervangen en kies ‘Archief’ > ‘Toon info’.
Klik boven in het infovenster op de afbeelding of het symbool om de afbeelding of het symbool te selecteren en kies vervolgens ‘Wijzig’ > ‘Plak’.

Meer hier: