asteroza + fake   60

Nope Sound - Microphone Blocker (2 PACK) – Bungajungle
Fake out your phone to assume the presence of an external mic, which auto-shuts off most onboard mics. Will do nothing for you jackless USB-C heathens though
fake  mic  microphone  smartphone  audio  privacy  hardware 
december 2018 by asteroza
Stopping Malware With a Fake Virtual Machine | McAfee Blogs
Faking out viruses by making a PC look like an analysis/debug VM, causing them to deactivate/pullout
security  deception  fake  VM  signature  Delicious 
february 2017 by asteroza
Stealth Cell Tower
Pseudo-stingray to rickroll your friends...
stingray  IMEI  IMSI  catcher  fake  printer  pentesting  security  research  Delicious 
november 2016 by asteroza
Emulating an SSD Virtual Disk in a VMware Environment | virtuallyGhetto
I wonder if this could be used to fake out windows 2012 r2 to detect a VMware SCSI disk as thin provisioned for TRIM/UNMAP use? Though it would probably still show up in the VM as SSD and not as a thin provisioned disk...
VMware  ESXi  VM  SSD  fake  sysadmin  tips  tricks  TRIM  UNMAP  Delicious 
october 2016 by asteroza
Snagging creds from locked machines · Room362
Extracts NTLM password hash because windows blindly trusts PnP fast wired connections...
USB  armory  windows  credentials  extraction  fake  ethernet  responder  DHCP  security  hacking  pentesting  WPAD  Delicious 
september 2016 by asteroza
Insurgentsia - Stickers - Sticker Mule
Does buying ISIS-chan stickers count toward counterterrorism training? Asking for a friend...
ISIS-chan  fake  anime  mascot  humor  ISIS  Delicious 
april 2016 by asteroza
Reasonable Name Generator
Based on census name data to generate fake names
fake  name  generator  service  Delicious 
april 2015 by asteroza
SHRTURL - The web editor
URL shortener that does live overlays/edits of existing websites, so you can do things like test website changes. But mostly, use it to troll people by changing news headlines.
live  overlay  edit  editing  web  service  humor  prank  trolling  tools  utilities  URL  shortener  fake  website  Delicious 
april 2015 by asteroza
[APP][FREE][3.0 ] ringtext messenger [use CLI and Missed Call to send messages]
Using a mix of missed calls and faked callerID to signal messages to people for free. Assuming your phone provider actually allows faked callerID...
free  message  android  app  software  communication  missed  call  callerID  fake  Delicious 
september 2014 by asteroza
Gofor: Drones on Demand
Fake, but will probably become real. Imagine a defense contractor providing mercenary services this way? UCAVaaS,HALEaaS,EVACaaS, yeah it can keep going. UGV as a commercial service, like an autonomous self-following cargo suitcase/segway.
fake  humor  DaaS  drone  rental  cloud  service  UAV  on-demand  innovation  Delicious 
april 2014 by asteroza
If you control somebody's DNS, you could redirect them to this to get them to download an attack binary due to weak update methodology (plaintext HTTP downloads with no public key binary signing checking). There was a nice attack article about someone who got worked over via a LinkedIn message based XSS attacking their home router DNS settings, then lying in wait until the poor guy tried to update N++.
evilgrade  ISR-evilgrade  MitM  update  fake  binary  attack  vector  framework  exploit  security  hacking  pentest  tools  utilities  software  DNS  false  Delicious 
april 2014 by asteroza
Zscaler Cloud Security : SaaS Web Security, Web Security, URL Filtering, Internet Security
Somewhat useful, but it works by baiting a naive Firesheep implementation to immediately uses a fake cookie bait, which Blacksheep itself detects the hijacked usage of. Kinda Spy-vs-Spy. Since there is the potential for limited lifetime of a cookie, you are generally pressured to use a captured cookie at the earliest opportunity.
Blacksheep  Firefox  plugin  addon  extension  network  privacy  security  detect  Firesheep  bait  fake  cookie  Delicious 
november 2010 by asteroza
Exclusive: Infinitec demonstrates IUM ad hoc streaming device, makes it ...
A USB wireless dongle that misrepresents itself as a flash drive to the host, but is really connecting to some other computer's shared storage over wifi. Basically gives NAS capabilities on an adhoc basis to devices that aren't originally network aware or had some sort of software limitations. This could be usful as a kind of emergency storage link, as you could slap this onto any PC with a USB port and start a backup...
Infinitec  IUM  infinite  USB  memory  fake  imposter  flash  storage  adhoc  wifi  network  NAS  bridge  Delicious 
january 2010 by asteroza
Authentication of forensic DNA samples
While the researchers show a potential solution to detecting faked DNA evidence (un-methylated DNA due to whole genome amplification production technique), this puts a fair bit of current DNA evidence under doubt. Lawyers will have a field day, because so much is made of DNA evidence having the image of being infallible.
police  forensic  science  DNA  evidence  fake  fabrication  research  israel  biology  test  forensics  law  enforcement  misdirection  Delicious 
august 2009 by asteroza

related tags

accessory  accuracy  active  activity  ad  adapter  addon  address  adhoc  adversarial  algorithm  analysis  android  anime  anonymity  antispam  AP  app  arm  armory  art  artificial  attack  audio  authenticity  autorun  badge  bait  bandaid  binary  biology  biometric  biometrics  Blacksheep  book  boy  bridge  broken  brush  buddha  buddhism  bypass  cable  call  callerID  camera  canary  captive  card  catcher  CD-ROM  certificate  check  chinese  cinematography  CLI  clone  cloud  coffee  collectible  command  communication  computer  cookie  cover  creativity  credentials  crowd  culture  DaaS  deception  decryption  deep  deepfakes  Delicious  Dell  detect  detection  devices  DHCP  directory  distraction  DIY  DNA  DNS  drawing  drone  dummies  e-David  edit  editing  effect  electronics  email  enclave  enforcement  english  entrance  error  ESXi  ethernet  EU  europe  evidence  evilgrade  exploit  extension  extraction  extras  fabrication  factory  fake  false  film  finger  fingerprint  Firefox  Firesheep  flash  follower  foreigner  forensic  forensics  forgery  framework  fraud  free  gadget  gadgets  gaijin  game  GAN  generator  germany  gift  grammar  guide  H.263  hacker  hacking  hardware  hex  hexadecimal  hidden  honeypot  honeytoken  howto  humor  ID  identification  identity  image  IMEI  imposter  IMSI  infinite  Infinitec  inflatable  information  innovation  innovator  intel  intrusion  inventor  IP  ISIS  ISIS-chan  ISR-evilgrade  israel  IUM  japan  java  jiggler  joke  jounal  journalism  jpeg  kali  kerberos  key  keyboard  keystroker  kit  language  LaTeX  law  learning  level  line  list  listing  live  MAC  machine  malware  management  manipulation  mascot  media  memory  merit  message  mic  microphone  misattribution  misdirection  missed  MitM  mount  mouse  movement  MX  name  NAS  ncurses  network  networking  neural  news  NSA  on-demand  openaccess  opensource  OUI  overlay  painter  painting  password  PC  pentest  pentesting  people  personalized  phantom  phone  photo  photography  photoshop  picture  Pip-boy  plugin  police  portal  portrait  practice  prank  predatory  printer  privacy  private  product  profile  proof-of-concept  PSHITT  publishing  quote  quotes  ransomeware  ransomware  recognition  reference  rental  replica  reporting  research  responder  retrieval  ring  robot  robotics  scam  scarecrow  science  scout  screen  SD  secure  security  seeder  server  service  SGX  shanzhai  shanzhaiji  shell  shortener  signature  simulator  SIP  slip  smartphone  SMTP  snakeoil  social  society  softphone  software  spam  spambot  speech  spoof  spy  SSD  SSH  stain  staring  stereotype  stingray  storage  stroke  stroxel  stunt  style  subversive  subway  surveillance  sysadmin  template  test  text  tips  token  tools  tricks  TRIM  tripwire  trolling  tumblr  tutorial  tweet  TweetForger  twitter  typing  UAV  UNMAP  update  URL  USB  user  utilities  vector  video  virtual  VM  VMware  voice  VoIP  want  web  website  wiebetech  wifi  wildlife  windows  wireless  wolf  WPA  WPA2  WPAD  wrist  write  writing  山菜 

Copy this bookmark: