x0rz / EQGRP

Decrypted content of eqgrp-auction-file.tar.xz
4.09k stars 2.07k forks source link

Use tiple quoted multiline strings in Linux/bin/alarm.py, please #6

Open cirosantilli opened 7 years ago

cirosantilli commented 7 years ago

https://github.com/x0rz/EQGRP/blob/master/Linux/bin/alarm.py#L164

My eyes hurt.

Ekultek commented 7 years ago

No you don't want to use triple quotes here, they did that correctly. Triple quotes will fuck up he format

Tbone-grady commented 7 years ago

I'd suggest executing it using this procedure worked best for me use a terminal and run python alarm.py -h (use -h or --help to get usage information) select your desired options and run.

Most of the tools I've rewritten with my own functions; the earlier leak indicated you may have to design custom plugins in order to run certain tools and I'd suggest that you invest in the entire danderspritz binary. I got it a few days ago and it made using the tools a lot easier and safer in my opinion.

Ekultek commented 7 years ago

These tools are not written by the NSA, if you look around and read the code, there's comments that point to it being written by someone else.

Tbone-grady commented 7 years ago

examine each python file Snowden confirmed the initial leak last year as valid and who else would monitor a system of an upwards of 642 hours. Oh also read this https://www.nytimes.com/2016/10/06/us/nsa-leak-booz-allen-hamilton.html?_r=0

may shine a bit of light on your 'know it all IT ego' jam that up you know where and read up Mr. Martin had roughly 75% of their toolchain in his possession. He was an

another few articles for you.

https://www.washingtonpost.com/world/national-security/government-contractor-arrested-for-stealing-top-secret-data/2016/10/05/99eeb62a-8b19-11e6-875e-2c1bfe943b66_story.html?utm_term=.103a358b9a2a

https://www.theguardian.com/technology/2016/sep/22/nsa-hacking-tools-examines-operatives-mistake