558f61bfab60ef5e6bec15c8a6434e94249621f53e7838868cdb3206168a0937 *cobaltstrike.jar # Cobalt Strike 4.0 (December 5, 2019) 558f61bfab60ef5e6bec15c8a6434e94249621f53e7838868cdb3206168a0937 Cobalt Strike 4.0 Licensed (cobaltstrike.jar) Tested (On Windows with JRE 1.8) : – Hook.jar is clean (It hooks Authorization method providing the correct informations to validate license etc.) no Funky piece of code found – CobaltStrike.jar Hash : Ok – Lauching TeamServer : Ok –Continue reading "Cobalt Strike 4.0"
Our training examines Sherman Kent's Analytic Doctrine from the cyber perspective as well as the availability and use of OSINT tools. Students are able to understand the cyber intelligence lifecycle, the role and value of cyber intelligence relative to online targeting and collection, in modern organizations, businesses, and governments at the completion of this course and, use of our advisory services.
5 million Database of Islamic Azad University (WTIAU | iauctb | iau-tnb,…) of Iran Includes information for students, staff and professors Students: Username = StudentID Birth Date Natinoal card = Password Major & Section And … ———————————————————- Staff: Username & Password Phone Number Natinoal card First name and last name Birth Date And … ———————————————————-Continue reading "Islamic Azad University DB For Sale 5M Records"
File: OpenBullet Configs by @ iMR_H.rar 2364 configurations for OpenBullet, all of them tested at least once Previous post on OpenBullet settings – https://cybershafarat.com/2020/01/11/dorksearcher/ 8/31/2019 12:41 PM 2,213 (PATCHED)Gamestop config(proxyless).loli 06/30/2019 03:07 AM 1,800 (UPDATED AND FASTER) Reddit.com Captures PostComment Karma, Suspended Requires proxies.loli 05/02/2019 10:22 AM 2,792 000.loli 04/26/2019 09:00 PM 2,118 0day.today.loli 05/13/2019Continue reading "OpenBullet Configuration Listings"
What you receive from Treadstone 71 is detailed information and intelligence on your adversary that far surpasses the technical realm. Where Treadstone 71 service excels is in the ability to provide you with techniques, methods, capabilities, functions, strategies, and programs to not only build a fully functional intelligence capability, but a sustainable program directly aligned with stakeholder requirements.
It is comprised of Flight Data, credentials such as user, email & password, personal information such as IP, address, phone number etc, pilots information including full name, address, etc, aircraft/airport information, training data, customer booking data and much more. iatvair_vamDB vam_live_flights va_parameters v_flights_counter vamevents va_finances user_types reserves pilot_warning country_t routes v_total_data_flight v_top_flights reports award_pilots v_top_departure jumpsContinue reading "Iranian Iatva Air Database for sale"
Oddly enough, according to the published image, either the satellite itself is similar in design to the Israeli samson satellite, whose graphic image on the satellite missile on the messenger is similar to that of the Samson satellite
This second video that you see is related to six in the morning. Published by Al-Alam. In fact, Iran is releasing these two videos, saying: USCentcom statement on Iran’s provocative actions is a big lie. The United States has twice failed to heed warnings and “risky behaviors” twice in two different hours of the day,Continue reading "Iranian Propaganda"
Protests in November 2009 Khamenei’s approved policy of legalizing the killing of protesters led to six months of protests in November 2009 in which hundreds of people were killed, and not a single case has been filed to identify the perpetrators and bring them to justice, based on information gathered from the families of 48Continue reading "Remember, remember 2009 November in Iran"
Understanding your stakeholders and what they need to help make decisions is more than half the battle. This brief covers the old adage “Know your professor, get an A."
The United Nations has said in a statement that North Korea is using Chinese ships to circumvent sanctions. Despite UN sanctions, North Korea was able to boost its trade in coal and petroleum products last year with the help of China’s shipping fleet and circumvent sanctions, the UN Security Council’s Sanctions Committee said in aContinue reading "China continues to help North Korea circumvent sanctions"
The post China continues to help North Korea circumvent sanctions appeared first on The Cyber Shafarat - Treadstone 71.
Hacker claimed to have infiltrated the regional power systems of #Qom province and shared some examples with the general public. These examples include testing open ports as well as entering the FTP server and several other system models. Several published photos are related to #Arak Heavy Water Location and also entering the industrial devices ofContinue reading "Hackers hit Parand and Arak, Iran"
Syrian violations of sanctions with Russian FSB assistance to manufacture ballistic vests – Not discovered by any organization other than Treadstone 71 - No sensors, no aggregation of thousands of taps – Just hard-nosed open-source collection and analysis, and an interesting read of false identities, dispersed purchasing, and deceit.
❇️ Pish web tool ❇️ MITM attack tool ❇️ kill shot pentesting framework ❇️ Facebook Tool Links ❇️ Facebook information gathering ❇️ Facebook Toolkit + bots, dump private data ❇️ Facebook cracking tool Fcrack.py ❇️ Facebook and yahoo account cloner ❇️ Facebook report tool ❇️ Facebook BruteFoRce Tool ❇️ Facebook hacking ASU ❇️ Facebook DownloaderContinue reading "Github Hacking Tools – Iran"
Middle Eastern Cyber Domain – Iran/Syria/Israel
An academic review of these nation-states and their work to achieve cyber operations dominance.
Spy: File Manager SMS Manager Calls Manager Contacts Manager Location Manager Account Manager Camera Manager Shell Terminal Applications MicroPhone Keylogger Link: https://www13.zippyshare.com/v/BOF4n55U/file.html VirusTotal Link: https://www.virustotal.com/gui/url/e2031c859cfc491cb92e7196e796bc24212ce89c46a874ef9a8baf683f3f16c6/detection Spy – File Manager, Camera, Accounts And Many More https://cybershafarat.com/2020/05/12/farzin-karimi/
Information of Mahan Air – Iran The same company that transmitted the corona virus to Iran Data ::: 5.000 Files Price: 250$ ID Telegram:Masterpublic Original File – PDF CFP INPUT MESSAGE DATE TIME REF 051202 سامانه Mahan Air Flight Planning System با آدرس https://preflight.ir هک شده و ۵ هزار نامه این سامانه در حال فروشهContinue reading "Mahan Air – Blamed for COVID-19 in Iran"
Intelligence Games in the Power Grid – Russian Cyber and Kinetic Actions Causing Risk
Unusual purchasing patterns from a Russian firm selling PLCs from a Taiwanese company with massive holes in its product software download site. What could go wrong?
All students, university professors, international activists and other experts are invited to submit their ideas and suggestions on the occasion of World Al-Quds Day in light of the current situation (the spread of #Coronavirus) and as alternatives to the march, by contacting the following IDs Deadline for submission of suggestions and ideas: 17 to 26Continue reading "Iranian incitement of hate against the State of Israel"
The post Iranian incitement of hate against the State of Israel appeared first on The Cyber Shafarat - Treadstone 71.
Much has been written about Mr.Tekide and his crypters used by APT34 (OilRig) and others. Other
organizations have documented information about Mr.Tekide's tools in 'celebrated' cyber attacks against Fortune 500 institutions, governments, educational organizations, and critical infrastructure entities.
However, identifying Mr.Tekide, his background, locations, and his own words has never been openly accomplished. Many believe that following an individual does not pay dividends. Treadstone 71 demonstrates the alignment of Mr.Tekide to the Iranian government through years of support using crypters such as the iloveyoucrypter, qazacrypter, and njRAT.
Statement of Cyber Counterintelligence The 10 Commandments for Cyber CounterIntel
Thou shall and thou shalt not. Own the cyber street while building creds. Follow these rules and maybe you will survive the onslaught.
A Russian publication reported this week that the Russian Armed Forces have deployed their Resonance radar system in an area near the Israeli border.According to the NZIV publication, the Russian Resonance radar was identified in two locations in the eastern Mediterranean region, including an area along the Israeli-Egyptian border.The technical capabilities of the Resonance-N radarContinue reading "Russian radar system discovered near Israeli border:"
The post Russian radar system discovered near Israeli border: appeared first on The Cyber Shafarat - Treadstone 71.
Treadstone 71 Link Analysis of Various Iranian Cyber Operators, Academics, and Cyber Security Professionals. From indictments and commercial organizations to academics. This report demonstrates the depth of Iranian penetration into US academic institutions, information security conferences, and certification bodies.
Actions by current Iranian academics working at US universities likely threaten sensitive information in science, technology, engineering and math (STEM) fields of study. The sharing of advancements in STEM such as artificial intelligence, unmanned aerial vehicles, unmanned aircraft systems, and offensive and defensive cybersecurity likely occur.
Fallacies in Threat Intelligence Lead to Fault Lines in Organizational Security Postures
This brief covers some general taxonomy along with a review of common mistakes concerning cyber and threat intelligence and how possible to not fall into these traps while knowing how to dig out if you do.
The official catalog of the Ministry of Defense of the Islamic Republic of Iran about the migrant drone 6 and some of its features In our region, Iran and Turkey offer very diverse UAV products. According to the request of the members of the channel to compare Turkish UAVs with Iran, we will summarize oneContinue reading "مهاجر ۶ Read the Ministry of Defense Feature Sheet Mohajer 6"
The post مهاجر ۶ Read the Ministry of Defense Feature Sheet Mohajer 6 appeared first on The Cyber Shafarat - Treadstone 71.
The RFI process includes any specific time-sensitive ad hoc requirement for intelligence information or products to support an ongoing event or incident not necessarily related to standing requirements or scheduled intelligence production. When the Cyber Threat Intelligence Center (CTIC) submits an RFI to internal groups, there is a series of standard requirements for the context and quality of the data requested.