Friday, January 25, 2019

The Grimoire of Demonology

The Demon 😈

Well, WNL8 will be my final version of WeakNet LINUX- for a long time at least. This new project is built from XFCE and contains all of the same great tools (well, I am still building this out as you're reading this) as WeakNet LINUX.

You can skip the TL;DR and go right over to to grab a copy or read more about the distribution. As for the UI/Theme/Idea - I can't say that I wasn't inspired by the world's most beautiful car :)

The development process for Demon was staggering and trying. I almost about gave up on the project so many times while trying to move my arms fast enough to balance and maintain what I later learned was a house of cards. I honestly tried to attribute the plight to the name of the distribution; 😈. Choosing XFCE, Debian Stretch, the file manager, the theme, making customizations and altering items, all, was a painstaking process which required many hours of testing and development. I ditched window managers and started the project over at least 4 times before realizing that the Buster version of Debian itself was creating it's own problems.

In fact, a lot of issues even arose from the fact that we are in the middle of several releases of Python, all of which are required for the various InfoSec-related tools. Lots of popular frameworks and tools for InfoSec have a ton of dependencies and strange quirks for getting up and running. My job is to build them all out for you and have them ready so that you don't have to - you can just dive in and start hacking.

So, I have been thinking over moving away from WeakNet LINUX for a long while now and my brother gave me the inspiration when he mentioned that the UI/UX shouldn't be the learning curve for my users, no, it should be the information security and technical stuff. WeakNet LINUX was targeted at advanced Linux users. So, with that advice, I decided to offer the new UI/UX with a whole new look, feel, branding, and all for a new year, 2019. Something easy-on-the-eyes and easy to use. My favorite part of the UX is the WIN key to search :) It's so fast.

The Grimoire

I am currently studying for the world's hardest test and I have been using PWK,,, and as resources. This is very good advice for anyone interested in one day entering the field of information security/IT - as I am now constantly learning new things. I LOVE It's quite similar PWK labs from Offensive Security, but a lot less expensive, ~$100 annually, plus there are a lot of great things to do besides CTF/Boot to root/Penetration testing. On the right pane of this weblog you can see my badge and progress in the labs. It is updated in real time.

Anyways, with all of this said, I couldn't help but to take an actual tome of notes and my own scripts and code of my travels (notes go a long way) and I also couldn't help but to share them. So, I present my latest side-project, The Grimoire.

The Grimoire is a lot of things - a repository of specially crafted code for enumeration, digital forensics, and penetration testing. Oh, and did I mention a boat load of notes? Notes, notes, notes, and cheat sheets.

I truly feel that the only way I am going to beat this upcoming test is to stick to a strict methodology, a flow chart if you will, to which I can ensure that no step is missed during enumeration. This is my philosophy to the mantra, "try harder." Anyways, this repository can be used in any OS. I tried to list any dependency for any of the script that I made within the script itself as comments or notes. Just look at how committed I am to my notes,

Mentioned Resources

I am currently enveloped in the following mentioned resources,
  • Offensive Security - PWK
    • Hands-On Penetration Testing Labs 2.0 (Link)
    • Kali Linux Web App Pentesting Labs (Link)
    • Certified Wireless Security Professional (CWSP from CWNP) (Link)
  • (Link)

And I highly recommend all of them.

Thanks for stopping by,


  1. Great article and a nice way to promote online. I’m satisfied with the information that you provided
    tree stump removal west palm beach

  2. This post is good enough to make somebody understand this amazing thing, and I’m sure everyone will appreciate this interesting things.
    dumpster rental montgomery

  3. I think this is one of the most significant information for me. And i’m glad reading your article.
    septic tank pumping montgomery

  4. I think this is one of the most significant information for me. And i’m glad reading your article. dumpster rental cost jonesboro

  5. Thanks for the wonderful share. Your article has proved your hard work and experience you have got in this field. Brilliant .i love it reading. septic tank cleaning jonesboro

  6. Hello, I have browsed most of your posts. This post is probably where I got the most useful information for my research. Thanks for posting, maybe we can see more on this. Are you aware of any other websites on this subject?
    residential tree services little rock

  7. You have a good point here!I totally agree with what you have said!! Thanks for sharing your views. hope more people will read this article!!! dumpster rental companies beaumont

  8. Great article and a nice way to promote online. I’m satisfied with the information that you provided drain cleaning service beaumont

  9. I think this is one of the most significant information for me. And i’m glad reading your article. emergency tree services corpus christi

  10. A superbly written article, if only all bloggers offered the same content as you, the internet would be a far better place. junk hauling services lubbock

  11. This post is good enough to make somebody understand this amazing thing, and I’m sure everyone will appreciate this interesting things.stump grinding albuquerque

  12. Hi, This is a nice article you shared great information i have read it thanks for giving such a wonderful blog for the reader. dumpster rental services san bernardino

  13. I really appreciate this wonderful post that you have provided for us. I assure this would be beneficial for most of the people. Thanks for sharing the information keep updating, looking forward to more posts.
    High Quality Adult Images


  14. Thanks for your extraordinary blog. Your idea for this was so brilliant. This would provide people with an excellent tally resource from someone who has experienced such issues. You would be coming at the subject from a different angle and people would appreciate your honesty and frankness. Good luck for your next blog!
    Tally ERP 9 Training
    tally classes
    Tally Training institute in Chennai
    Tally course in Chennai
    seo training classes
    seo training course
    seo training institute in chennai
    seo training institutes
    seo courses in chennai
    seo institutes in chennai
    seo classes in chennai
    seo training center in chennai

  15. I think the most important thing to follow when you test is to follow your methodology.

  16. Thanks for the article! I am also researching freelance websites online. There are a lot of Websites providing freelance works like up work. But they are charging 20% which is too high for me after a lot of research now I'm working at, I'm very satisfied working here. Please list out more websites in your next article so that users like me get to know more about freelance jobs site. Thanks!

    what is a field service technician

  17. You got the idea and the you did great on creating this one. Good job for you. Maybe you could also try to download the game Subway Surfers online game on your PC. Try playing on PC.

  18. The Grand Grimoire is a black magic grimoire. Different editions date the book to 1521, 1522 or 1421, but it was probably written in the early 19th century in

  19. he idea of demonology had remained strong in the Renaissance, and several demonological grimoires were published, including The Fourth Book of Occult About us

  20. Great post! Thanks for this information you've shared.

  21. Www.Office.Com/Setup - MS Office is the complete productivity suite which helps has MS Outlook application to schedule your meeting, or conference. Office.Com/Setup

  22. Www.Webroot.Com/Safe - Webroot antivirus is the software which gives you the cloud storage facility to its customer so that you can take the backup of your valuable data. Webroot.Com/Safe

  23. Www.Avg.Com/Retail - AVG antivirus is the software which helps in scanning the internal memory of your device to protect your device from malware and viruses. Avg.Com/Retail

  24. I appreciate your hard work. Keep posting new updates with us. This is really a wonderful post. Nice Blog Very interesting and useful information on your website. Thanks for sharing the blog and this great information which is definitely going to help us.

    Microsoft has introduced the latest edition of its
    widespread application on Every three years,
    there’s a new variant with an upgraded user interface, a
    couple of new capabilities and functions, and a significant
    hassle needing to update many computers. But, Microsoft has
    made a substantial shift to their tried and true formula.
    Microsoft provides its monthly subscribers with a superb
    deal to proceed to their pricing model, correct? Well, let’s
    take a look at the pricing and see for ourselves, which is the
    best way to purchase Office. Office 365 Home is $99.99 yearly
    or $9.99 per month, Office Professional 2019 is $439.99, Office
    Home & Student 2019 is $149.99 annually or $14.99 per month and the Office 365 Personal is $69.99 annual or $6.99 per month

  26. – Everyone wants to protect their device from cyber-attacks and internet malicious sites and programs. If your device contains your private and banking information then your data should be well secured by reliable security software. When it comes to antivirus programs, then Norton comes into our mind.

  27. Product Key is required only when you have purchased Office 2019 Offline or from a local store. This is not required when you have made the purchase online. This is easy process though but can be hard to handle for some. If you want help you can contact us, though we recommend you not to share your product key with the US or anyone. Someone might be able to phish you or scam you.

  28. Download Norton and stay securedNowadays we surf internet and we stay online on daily basis, and in the process we surf many websites and come across various types of ads and links. And without any knowledge we click on such malicious links and that is the time when we need and antivirus to protect our online identity.

  29. I am really very happy to visit your blog. Very powerful and have true and fresh information. Thanks for the post and effort! Please keep sharing more such a blog. |

  30. Thanks for taking the time to share with us such a great article. I found such a significant number of fascinating stuff with regards to your blog particularly its discussion. Keep doing awesome.

  31. This comment has been removed by the author.

  32. I am really impressed with the information you provide in your post. Looking forward to visiting more.
    Bitcoin Casino

  33. Thanks for taking the time to share with us such a great article. I found such a significant number of fascinating stuff with regards to your blog particularly its discussion. Keep doing awesome. Visit:- | | | | |

  34. MS is the complete productivity suite which helps the user in scheduling their meetings and conferences and also gives you the great technical support.



  36. Step 1: Now open the IDM. On the home interface, you can see lots of options above of the tool. The last option is named Registration and you need to click on it. A form to inputting the key will appear. IDM serial key
    IDM license code
    IDM Patch
    idm crack key
    idm crack for pc
    IDM crack download
    idm latest version

  37. Excellent information you have shared, thanks for taking the time to share with us such a great article. I really appreciate your work.

  38. - In today’s world digital devices are getting hacked by hackers and we often found our computer system lagging because of viruses entering in our computer system.

  39. Request Password before removing encrypted data offers a further essential safety net for encrypted files.winzip mac crack registration code

  40. Encrypt Button to the Tools ribbon encrypts current zip data files with one mouse click.winzip crack free download full version