User Controls

  1. 1
  2. 2
  3. 3
  4. ...
  5. 114
  6. 115
  7. 116
  8. 117
  9. 118
  10. 119
  11. ...
  12. 1426
  13. 1427
  14. 1428
  15. 1429

Posts by Sophie

  1. Sophie Pedophile Tech Support
    I'm with Solstice on this one. I can teach you how to make a timed incendiary device if you don't know how. It's pretty straightforward.
  2. Sophie Pedophile Tech Support
    Interface is dope. I kinda missed the last couple of episodes, but UMAMI is a dope content creator in general.
  3. Sophie Pedophile Tech Support
    Will there be a memorial service?
  4. Sophie Pedophile Tech Support
    Originally posted by lockedin most optimistic 20th century predictions about humanity's course in the 21st were based on dubious and now seemingly definitively incorrect assumptions about human nature and behaviour

    we were never going to be able to create star trek world

    Star Trek World is communist anyway.
  5. Sophie Pedophile Tech Support
    Originally posted by the man who put it in my hood I raped OPs little sister and by little she was 18 and she was fat as fuck I ate here asshole and got a throat infection

    You sure showed him.


    Continue your story Brad. So far there has only been one molestation ITT.
  6. Sophie Pedophile Tech Support
    Not sure if the one with Hitler is an original. But that's pretty cool regardless, i'd like a bit more context for every pic.
  7. Sophie Pedophile Tech Support
    Is it finally out? Feels like forever since season 5.
  8. Sophie Pedophile Tech Support
    Also did i read that wrong? People who actually got ransomwared can go to the 'shadow court'? Wot.
  9. Sophie Pedophile Tech Support
    If you actually burned a cat i hope you actually die in a fucking fire yourself. that said, why would you want to date a black girl? They're literally the least attractive.
  10. Sophie Pedophile Tech Support
    Yes.
  11. Sophie Pedophile Tech Support
    How avant garde of you.
  12. Sophie Pedophile Tech Support
    Seems silly. Doubly so if people are getting personally offended. Don't buy malware, write your own. If you gotta have people with specialized skills in something or the other, enter into an agreement with them on some basis, make team, or a crew, have some unifying goal, and operate under the rules of Game Theory.

    That said, teams are a double edged sword, unfortunately people are social creatures and opsec protocols are often not followed to the letter.
  13. Sophie Pedophile Tech Support
    Who?
  14. Sophie Pedophile Tech Support
    Subtlety is key. And i don't mind saying that, you're too deep by now anyway. Repent, nigger.
  15. Sophie Pedophile Tech Support
    Kind of like any paste site, but just for users. That way we can save space in any thread where code features heavily. To start of with only T&T people should have access to this functionality. Hosting text doesn't impact server resources, especially if users have to earn the right to make use of the feature in question.
  16. Sophie Pedophile Tech Support
    Originally posted by Jiggaboo_Johnson "MAC addresses are primarily assigned by device manufacturers, and are therefore often referred to as the burned-in address, or as an Ethernet hardware address, hardware address, or physical address. Each address can be stored in hardware, such as the card's read-only memory, or by a firmware mechanism".

    If you know, you know…clearly you "hackers" don't.

    Spectral isn't a hacker.

    Some peripherals only allow you to do it at the firmware level, think USB WiFi. Some might be confused due to the fact you need a 'real' device MAC if you're going to be spoofing at the hardware level, for instance:


    0024 - 00:00:18 - WEBSTER COMPUTER CORPORATION
    0025 - 00:00:19 - APPLIED DYNAMICS INTERNATIONAL
    0026 - 00:00:1a - ADVANCED MICRO DEVICES
    0027 - 00:00:1b - NOVELL INC.
    0028 - 00:00:1c - BELL TECHNOLOGIES
    0029 - 00:00:1d - CABLETRON SYSTEMS, INC.


    You can make up a MAC out of thin air but applying such a MAC may give away the fact you're spoofing. Linux tooling that works with MAc spoofing allows you to set random MACs but also provides an option that sets a valid MAC as a burned in address.


    #!/bin/bash

    # List of interfaces
    IFACES=$(ip link | awk -F: '$0 !~ "lo|vir|wl|^[^0-9]"{print $2;getline}')

    read -p "Change MAC?[Y/n]: " choice
    if [[ $choice == 'Y' || $choice == 'y' ]]; then

    read -p "New MAC?: " value
    if [[ $value != '' ]]; then
    for x in $IFACES; do sudo macchanger --mac=$value --bia $x; done
    else
    echo -e "\nInvalid Input\n" && exit 1
    fi

    fi

    echo -e "\nDone\n" && exit 0


    The --bia arg tells it to spoof hardware MAC or make it a 'burned in address'.
  17. Sophie Pedophile Tech Support
    Originally posted by maddie CVE-2021-44228 its the log4shell vuln thats been going around. there is already a patch for minecraft, and most other applications running log4j

    Thanks, although i've written tooling that can find all servers on the internet that run Apache or anything else for that matter, and i have a working PoC. Expect Ransomware actors to try and make use of this vuln ASAP. Not me personally but it wouldn't surprise me, given it literally took me less than an hour to read up on all the pertinent facts get a hold of some 'scanners' that were floating about and through that knowledge develop a specific payload to get RCE.
  18. Sophie Pedophile Tech Support
    What's the CVE number Scron?
  19. Sophie Pedophile Tech Support
    So he successfully solicited 9yo's?
  20. Sophie Pedophile Tech Support
    Originally posted by Incessant Allo

    Allo, allo, je suis Sophie.
  1. 1
  2. 2
  3. 3
  4. ...
  5. 114
  6. 115
  7. 116
  8. 117
  9. 118
  10. 119
  11. ...
  12. 1426
  13. 1427
  14. 1428
  15. 1429
Jump to Top