mirror of
https://github.com/cliffe/SecGen.git
synced 2026-02-20 13:50:45 +00:00
scenario updates
This commit is contained in:
82
lib/resources/interests/benign/cars/search_phrases
Normal file
82
lib/resources/interests/benign/cars/search_phrases
Normal file
@@ -0,0 +1,82 @@
|
||||
Cars for sale
|
||||
New cars
|
||||
Used cars
|
||||
Car dealerships
|
||||
Car reviews
|
||||
Car comparisons
|
||||
Car prices
|
||||
Car financing
|
||||
Car insurance
|
||||
Car maintenance
|
||||
Car parts
|
||||
Car brands
|
||||
Car models
|
||||
Car recalls
|
||||
Car safety ratings
|
||||
Car gas mileage
|
||||
Car lease deals
|
||||
Car trade-in value
|
||||
Car specs
|
||||
Car models by brand
|
||||
Car model years
|
||||
Car classifications (sedan, SUV, truck, etc.)
|
||||
Car resale value
|
||||
Car awards and accolades
|
||||
Car customization options
|
||||
Car racing and motorsports
|
||||
Car shows and events
|
||||
Car technology and features
|
||||
Car assembly and manufacturing
|
||||
Car history and evolution
|
||||
Electric cars
|
||||
Hybrid cars
|
||||
Self-driving cars
|
||||
Car rental
|
||||
Car leasing
|
||||
Car warranty
|
||||
Car history report
|
||||
Car accident history
|
||||
Car fuel efficiency
|
||||
Car towing capacity
|
||||
Car dimensions
|
||||
Car weight
|
||||
Car horsepower
|
||||
Car torque
|
||||
Car top speed
|
||||
Car 0-60 time
|
||||
Car transmission
|
||||
Car suspension
|
||||
Car steering
|
||||
Car braking system
|
||||
Car exhaust system
|
||||
Car interior
|
||||
Car exterior
|
||||
Car color options
|
||||
Car audio system
|
||||
Car navigation system
|
||||
Car parking assist
|
||||
Car safety features
|
||||
Car driver assist technology
|
||||
Car infotainment system
|
||||
Car roof rack
|
||||
Car bike rack
|
||||
Car hitch
|
||||
Car roof box
|
||||
Car snow chains
|
||||
Car seat covers
|
||||
Car floor mats
|
||||
Best SUVs under 30k
|
||||
Top-rated electric cars
|
||||
Toyota Camry 2022 review
|
||||
Ford Mustang GT specs
|
||||
Honda Civic vs. Toyota Corolla comparison
|
||||
Used cars for sale in my area
|
||||
Certified pre-owned cars near me
|
||||
New cars with the best gas mileage
|
||||
Luxury car rental near me
|
||||
Best trucks for towing a boat
|
||||
Fastest cars in the world
|
||||
Car financing options
|
||||
Muscle cars for sale
|
||||
Most reliable cars of 2023
|
||||
Best off-road vehicles
|
||||
58
lib/resources/interests/benign/cars/websites
Normal file
58
lib/resources/interests/benign/cars/websites
Normal file
@@ -0,0 +1,58 @@
|
||||
Edmunds - https://www.edmunds.com/
|
||||
Autotrader - https://www.autotrader.com/
|
||||
Car and Driver - https://www.caranddriver.com/
|
||||
Kelley Blue Book - https://www.kbb.com/
|
||||
Motor Trend - https://www.motortrend.com/
|
||||
CarGurus - https://www.cargurus.com/
|
||||
Cars.com - https://www.cars.com/
|
||||
Top Gear - https://www.topgear.com/
|
||||
Road & Track - https://www.roadandtrack.com/
|
||||
Auto Express - https://www.autoexpress.co.uk/
|
||||
CarTalk - https://www.cartalk.com/
|
||||
Motor1 - https://www.motor1.com/
|
||||
CarBuzz - https://carbuzz.com/
|
||||
CarThrottle - https://www.carthrottle.com/
|
||||
Jalopnik - https://jalopnik.com/
|
||||
Hemmings - https://www.hemmings.com/
|
||||
ClassicCars.com - https://classiccars.com/
|
||||
Bring a Trailer - https://bringatrailer.com/
|
||||
AutoTrader Classics - https://classics.autotrader.com/
|
||||
Motor Authority - https://www.motorauthority.com/
|
||||
CarAdvice - https://www.caradvice.com.au/
|
||||
AutoWeek - https://www.autoweek.com/
|
||||
Car Enthusiast - https://www.carenthusiast.com/
|
||||
PistonHeads - https://www.pistonheads.com/
|
||||
The Drive - https://www.thedrive.com/
|
||||
MotorTrend Classic - https://www.motortrend.com/brands/motor-trend-classic/
|
||||
CarScoops - https://www.carscoops.com/
|
||||
Autoevolution - https://www.autoevolution.com/
|
||||
Motor1 UK - https://uk.motor1.com/
|
||||
The Supercar Blog - https://www.thesupercarblog.com/
|
||||
Car Magazine - https://www.carmagazine.co.uk/
|
||||
EVO Magazine - https://www.evo.co.uk/
|
||||
Auto Express - https://www.autoexpress.co.uk/
|
||||
AutoGuide - https://www.autoguide.com/
|
||||
CarWale - https://www.carwale.com/
|
||||
CarDekho - https://www.cardekho.com/
|
||||
The Fast Lane Car - https://www.tflcar.com/
|
||||
The Truth About Cars - https://www.thetruthaboutcars.com/
|
||||
Carscoops - https://www.carscoops.com/
|
||||
Auto World News - https://www.autoworldnews.com/
|
||||
Carwow - https://www.carwow.co.uk/
|
||||
Car and Classic - https://www.carandclassic.co.uk/
|
||||
AutoTrader Canada - https://www.autotrader.ca/
|
||||
Car News - https://www.carnews.com/
|
||||
Car and Bike - https://www.carandbike.com/
|
||||
Car and Driver India - https://www.caranddriverindia.com/
|
||||
CarBlog India - https://www.carblogindia.com/
|
||||
CarsGuide - https://www.carsguide.com.au/
|
||||
AutoPortal - https://autoportal.com/
|
||||
Top Gear Russia - https://www.topgearrussia.ru/
|
||||
Drive - https://www.drive.com.au/
|
||||
AutoGuide.net - https://www.autoguide.net/
|
||||
Car and Driver Brazil - https://caranddriverbrasil.uol.com.br/
|
||||
Auto Weekends - https://www.autoweekends.com/
|
||||
Indian Autos Blog - https://indianautosblog.com/
|
||||
CarBuyer - https://www.carbuyer.co.uk/
|
||||
CarExpert - https://www.carexpert.com.au/
|
||||
CarAdvice New Zealand - https://www.caradvice.co.nz/
|
||||
44
lib/resources/interests/benign/cats/search_phrases
Normal file
44
lib/resources/interests/benign/cats/search_phrases
Normal file
@@ -0,0 +1,44 @@
|
||||
Best litter box for multiple cats
|
||||
How to litter train a kitten
|
||||
Common house training problems in cats
|
||||
How to train a cat to use a scratching post
|
||||
Top-rated cat litter brands
|
||||
Best wet cat food for sensitive stomachs
|
||||
Royal Canin vs. Blue Buffalo cat food
|
||||
How to prevent cats from scratching furniture
|
||||
Natural remedies for cat hairballs
|
||||
Best dry cat food for indoor cats
|
||||
How to introduce a new cat to your home
|
||||
Best cat toys for kittens
|
||||
How to deal with a cat that sprays
|
||||
How to stop a cat from meowing excessively
|
||||
How to make homemade cat food
|
||||
Best automatic litter box for cats
|
||||
How to clean a cats ears
|
||||
Best cat food for urinary tract health
|
||||
How to train a cat to come when called
|
||||
Top-rated cat tree brands
|
||||
Best cat food for weight loss
|
||||
How to prevent cats from scratching carpet
|
||||
How to keep cats off counters
|
||||
Best cat food for senior cats
|
||||
How to introduce a cat to a dog
|
||||
How to keep cats from fighting
|
||||
Best catnip toys for cats
|
||||
How to deal with a cat that is afraid of the litter box
|
||||
How to stop a cat from scratching doors
|
||||
How to groom a cat at home
|
||||
Best cat water fountain brands
|
||||
How to litter train an older cat
|
||||
Best cat food for hairball prevention
|
||||
How to train a cat to walk on a leash
|
||||
Top-rated cat bed brands
|
||||
Best cat food for sensitive skin
|
||||
How to prevent cats from jumping on counters
|
||||
How to keep cats from scratching walls
|
||||
Best cat food for allergies
|
||||
How to introduce a new cat to an existing cat
|
||||
How to deal with a cat that is spraying urine
|
||||
Best cat grass brands
|
||||
How to stop a cat from biting
|
||||
How to train a cat to use the toilet
|
||||
30
lib/resources/interests/benign/cats/websites
Normal file
30
lib/resources/interests/benign/cats/websites
Normal file
@@ -0,0 +1,30 @@
|
||||
The Cat Fanciers' Association (CFA) - https://cfa.org/
|
||||
The International Cat Association (TICA) - https://www.tica.org/
|
||||
The American Association of Feline Practitioners (AAFP) - https://catvets.com/
|
||||
Catster - https://www.catster.com/
|
||||
The Spruce Pets - https://www.thesprucepets.com/cats-4127388
|
||||
The Cat Site - https://thecatsite.com/
|
||||
Modern Cat Magazine - https://moderncat.com/
|
||||
Love Meow - https://www.lovemeow.com/
|
||||
Jackson Galaxy - https://www.jacksongalaxy.com/
|
||||
Cat Behavior Associates - https://www.catbehaviorassociates.com/
|
||||
The Humane Society of the United States (HSUS) - https://www.humanesociety.org/resources/cats
|
||||
Alley Cat Allies - https://www.alleycat.org/
|
||||
Catster Magazine - https://www.catstermagazine.com/
|
||||
The Conscious Cat - https://consciouscat.net/
|
||||
The Kitten Lady - https://www.kittenlady.org/
|
||||
Cat Health - https://www.cathealth.com/
|
||||
VetStreet - https://www.vetstreet.com/cats/
|
||||
The Catnip Times - https://thecatniptimes.com/
|
||||
Feline Nutrition - https://feline-nutrition.org/
|
||||
Cats Protection - https://www.cats.org.uk/
|
||||
International Cat Care - https://icatcare.org/
|
||||
The Cat Doctor - https://thecatdr.com/
|
||||
The Purrington Post - https://www.thepurringtonpost.com/
|
||||
National Kitten Coalition - https://www.kittencoalition.org/
|
||||
The Catnip Times - https://thecatniptimes.com/
|
||||
Cats International - https://www.catsinternational.org/
|
||||
The Way of Cats - https://www.wayofcats.com/
|
||||
Catological - https://www.catological.com/
|
||||
Meowingtons - https://www.meowingtons.com/
|
||||
PetMD - https://www.petmd.com/cat
|
||||
80
lib/resources/interests/benign/science/search_phrases
Normal file
80
lib/resources/interests/benign/science/search_phrases
Normal file
@@ -0,0 +1,80 @@
|
||||
Science news
|
||||
Scientific research
|
||||
Physics
|
||||
Chemistry
|
||||
Biology
|
||||
Astronomy
|
||||
Earth science
|
||||
Environmental science
|
||||
Climate change
|
||||
Genetics
|
||||
Neuroscience
|
||||
Space exploration
|
||||
Artificial intelligence
|
||||
Quantum mechanics
|
||||
Nanotechnology
|
||||
Medical research
|
||||
Science education
|
||||
Science communication
|
||||
Science journalism
|
||||
Science podcasts
|
||||
Science videos
|
||||
Science books
|
||||
Science museums
|
||||
Science events
|
||||
Science experiments
|
||||
Science projects
|
||||
Citizen science
|
||||
Open science
|
||||
Science ethics
|
||||
Science policy
|
||||
Science funding
|
||||
Science careers
|
||||
Science conferences
|
||||
Science history
|
||||
Philosophy of science
|
||||
Science fiction
|
||||
Science humor
|
||||
Science memes
|
||||
Science art
|
||||
Science advocacy
|
||||
Latest scientific discoveries
|
||||
Astrophysics research
|
||||
Organic chemistry reactions
|
||||
Human biology and physiology
|
||||
Planetary science and exploration
|
||||
Environmental conservation methods
|
||||
Climate change mitigation strategies
|
||||
Gene editing and CRISPR technology
|
||||
Neuroscience advancements in brain imaging
|
||||
Astronomy photography and astrophotography
|
||||
Quantum computing and quantum cryptography
|
||||
Nanomaterials and their applications
|
||||
Medical breakthroughs in cancer treatment
|
||||
Science education programs for kids
|
||||
Science communication skills and techniques
|
||||
Science podcasts on specific topics
|
||||
Science videos on experiments and demonstrations
|
||||
Science books on current research and history of science
|
||||
Science museums with interactive exhibits
|
||||
Science events like science fairs and competitions
|
||||
Science experiments for home and school
|
||||
Science projects for students and researchers
|
||||
Citizen science projects for public participation
|
||||
Open science platforms for sharing and collaboration
|
||||
Science ethics and scientific integrity
|
||||
Science policy and science diplomacy
|
||||
Science funding opportunities and grants
|
||||
Science careers in academia, industry, and government
|
||||
Science conferences on specific fields of study
|
||||
Science history museums and archives
|
||||
Philosophy of science and scientific methods
|
||||
Science fiction books and movies based on scientific concepts
|
||||
Science humor and satire on scientific topics
|
||||
Science memes and jokes on social media
|
||||
Science art and installations inspired by science
|
||||
Science advocacy groups and campaigns
|
||||
Science outreach programs for public engagement
|
||||
Science journalism and science writers
|
||||
Science technology transfer and commercialization
|
||||
Science data visualization and infographic design
|
||||
40
lib/resources/interests/benign/science/websites
Normal file
40
lib/resources/interests/benign/science/websites
Normal file
@@ -0,0 +1,40 @@
|
||||
ScienceDaily.com - https://www.sciencedaily.com
|
||||
Nature.com - https://www.nature.com
|
||||
ScienceMag.org - https://www.sciencemag.org
|
||||
ScientificAmerican.com - https://www.scientificamerican.com
|
||||
NationalGeographic.com - https://www.nationalgeographic.com
|
||||
NASA.gov - https://www.nasa.gov
|
||||
NewScientist.com - https://www.newscientist.com
|
||||
LiveScience.com - https://www.livescience.com
|
||||
SmithsonianMag.com - https://www.smithsonianmag.com
|
||||
SciTechDaily.com - https://www.scitechdaily.com
|
||||
PhysicsWorld.com - https://www.physicsworld.com
|
||||
PopularScience.com - https://www.popsci.com
|
||||
Cell.com - https://www.cell.com
|
||||
SciNews.com - https://www.scinews.com
|
||||
ScienceAlert.com - https://www.sciencealert.com
|
||||
DiscoverMagazine.com - https://www.discovermagazine.com
|
||||
ScienceNewsForStudents.org - https://www.sciencenewsforstudents.org
|
||||
AmericanAssociationfortheAdvancementofScience.org - https://www.aaas.org
|
||||
ScienceDirect.com - https://www.sciencedirect.com
|
||||
PLOS.org - https://www.plos.org
|
||||
Space.com - https://www.space.com
|
||||
ScienceNews.org - https://www.sciencenews.org
|
||||
NationalAcademies.org - https://www.nationalacademies.org
|
||||
SciShow.com - https://www.scishow.com
|
||||
EarthSky.org - https://www.earthsky.org
|
||||
ScienceBuddies.org - https://www.sciencebuddies.org
|
||||
TheGuardian.com/science - https://www.theguardian.com/science
|
||||
HowStuffWorks.com - https://www.howstuffworks.com/science
|
||||
MITTechnologyReview.com - https://www.technologyreview.com
|
||||
BioRxiv.org - https://www.biorxiv.org
|
||||
ScienceWorld.scholastic.com - https://www.scienceworld.scholastic.com
|
||||
SciTechNow.org - https://www.scitechnow.org
|
||||
WorldScienceFestival.com - https://www.worldsciencefestival.com
|
||||
Climate.gov - https://www.climate.gov
|
||||
Futurism.com - https://www.futurism.com
|
||||
ScienceMagForKids.org - https://www.sciencemagforkids.org
|
||||
TheConversation.com/science - https://www.theconversation.com/science
|
||||
SciStarter.org - https://www.scistarter.org
|
||||
TheScienceof.org - https://www.thescienceof.org
|
||||
NOVA.org - https://www.pbs.org/wgbh/nova/
|
||||
@@ -0,0 +1,57 @@
|
||||
Strategies for world domination
|
||||
Best weapons and technology for world domination
|
||||
Ways to manipulate people for world domination
|
||||
Psychological profiles of megalomaniacs
|
||||
How to create an evil empire
|
||||
How to recruit minions for world domination
|
||||
Evil organizations and their goals
|
||||
Common mistakes villains make when trying to take over the world
|
||||
How to build a secret underground lair
|
||||
How to create propaganda for your cause
|
||||
How to maintain control over conquered territories
|
||||
How to defend your empire from attacks
|
||||
How to develop a cult following
|
||||
How to infiltrate and subvert government institutions
|
||||
How to build a doomsday device
|
||||
Best ways to eliminate opposition and dissent
|
||||
How to create a network of spies and informants
|
||||
Strategies for psychological warfare
|
||||
Best ways to neutralize superheroes and other threats
|
||||
How to create a propaganda machine to control public opinion
|
||||
How to create a puppet government to do your bidding
|
||||
How to use technology to control people's minds
|
||||
How to exploit people's fears and desires to gain power
|
||||
How to deal with traitors and double agents
|
||||
How to create a surveillance state to monitor the population
|
||||
How to create a system of rewards and punishments to control behavior
|
||||
How to crush rebellions and uprisings
|
||||
How to use religion to control the masses
|
||||
How to use fear to control people
|
||||
How to create a cult of personality around yourself
|
||||
How to manipulate the media to control public opinion
|
||||
How to use divide and conquer strategies to weaken opposition
|
||||
How to use economic coercion to gain power
|
||||
How to create a secret police force to enforce your rule
|
||||
How to use mind control to create obedient followers
|
||||
How to use blackmail and coercion to control key figures
|
||||
How to create a surveillance state to monitor dissent
|
||||
How to use assassination and terrorism to eliminate threats
|
||||
How to exploit natural disasters and other crises for your gain
|
||||
How to create a network of informants and spies to gain intelligence
|
||||
How to use propaganda to manipulate history and control the narrative
|
||||
How to use technology to create a dystopian society.
|
||||
How to create a new world order
|
||||
How to use bioterrorism to gain control
|
||||
How to create a new religion to control people
|
||||
How to use nanotechnology to control people
|
||||
How to create a virtual reality to control people's minds
|
||||
How to use artificial intelligence to take over the world
|
||||
How to create a robotic army to enforce your rule
|
||||
How to use social media to manipulate public opinion
|
||||
How to use propaganda to create a cult following
|
||||
How to create a network of sleeper agents to undermine opposition
|
||||
How to use drugs to control people's minds and emotions
|
||||
How to create a global pandemic to weaken opposition
|
||||
How to use genetics to create a master race
|
||||
How to create a network of secret societies to control key institutions
|
||||
How to create a new form of government to justify your rule
|
||||
90
lib/resources/interests/malicious/world_domination/websites
Normal file
90
lib/resources/interests/malicious/world_domination/websites
Normal file
@@ -0,0 +1,90 @@
|
||||
WorldConquest.com - https://www.worldconquest.com
|
||||
GlobalSupremacy.net - https://www.globalsupremacy.net
|
||||
DominionOverAll.com - https://www.dominionoverall.com
|
||||
PowerUnlimited.org - https://www.powerunlimited.org
|
||||
TotalControlZone.com - https://www.totalcontrolzone.com
|
||||
NewWorldOrderHQ.net - https://www.newworldorderhq.net
|
||||
UltimateDomination.com - https://www.ultimatedomination.com
|
||||
MasterPlanGlobal.com - https://www.masterplanglobal.com
|
||||
TotalSubjugation.net - https://www.totalsubjugation.net
|
||||
SupremeRuleOnline.com - https://www.supremeruleonline.com
|
||||
OneWorldRegime.net - https://www.oneworldregime.net
|
||||
WorldSupremacyForce.com - https://www.worldsupremacyforce.com
|
||||
UnstoppablePower.net - https://www.unstoppablepower.net
|
||||
TheGlobalEmpire.net - https://www.theglobalempire.net
|
||||
UltimateControlZone.com - https://www.ultimatecontrolzone.com
|
||||
AbsoluteDominance.net - https://www.absolutedominance.net
|
||||
TotalSubordination.org - https://www.totalsubordination.org
|
||||
GlobalEnslavementHQ.com - https://www.globalenslavementhq.com
|
||||
WorldDominationAlliance.net - https://www.worlddominationalliance.net
|
||||
TotalWorldRule.com - https://www.totalworldrule.com
|
||||
UltimateCommand.net - https://www.ultimatecommand.net
|
||||
WorldSupremacyCentral.com - https://www.worldsupremacycentral.com
|
||||
GlobalDominanceZone.net - https://www.globaldominancezone.net
|
||||
AbsoluteAuthorityForce.com - https://www.absoluteauthorityforce.com
|
||||
TotalWorldConquest.org - https://www.totalworldconquest.org
|
||||
OneGlobalRuler.com - https://www.oneglobalruler.com
|
||||
WorldTakeoverPlan.net - https://www.worldtakeoverplan.net
|
||||
TotalGlobalSubjugation.com - https://www.totalglobalsubjugation.com
|
||||
WorldControlAgency.net - https://www.worldcontrolagency.net
|
||||
WorldDominanceFoundation.com - https://www.worlddominancefoundation.com
|
||||
GlobalDominationStrategy.com - https://www.globaldominationstrategy.com
|
||||
SupremeWorldOrder.net - https://www.supremeworldorder.net
|
||||
UltimatePowerRegime.com - https://www.ultimatepowerregime.com
|
||||
WorldConquestFoundation.org - https://www.worldconquestfoundation.org
|
||||
TotalWorldControl.net - https://www.totalworldcontrol.net
|
||||
WorldDominanceLeague.com - https://www.worlddominanceleague.com
|
||||
NewWorldRule.net - https://www.newworldrule.net
|
||||
GlobalControlCouncil.org - https://www.globalcontrolcouncil.org
|
||||
WorldSubjugationAgency.net - https://www.worldsubjugationagency.net
|
||||
TotalWorldDominion.com - https://www.totalworlddominion.com
|
||||
GlobalSupremacyPlan.net - https://www.globalsupremacyplan.net
|
||||
OneWorldConqueror.com - https://www.oneworldconqueror.com
|
||||
WorldDominanceInc.com - https://www.worlddominanceinc.com
|
||||
UltimateGlobalRule.net - https://www.ultimateglobalrule.net
|
||||
TotalWorldConquestForce.com - https://www.totalworldconquestforce.com
|
||||
NewWorldDomination.net - https://www.newworlddomination.net
|
||||
GlobalCommandCenter.org - https://www.globalcommandcenter.org
|
||||
WorldDominationInitiative.com - https://www.worlddominationinitiative.com
|
||||
TotalWorldSubjugation.net - https://www.totalworldsubjugation.net
|
||||
UltimateGlobalAuthority.com - https://www.ultimateglobalauthority.com
|
||||
TotalWorldDominanceForce.com - https://www.totalworlddominanceforce.com
|
||||
WorldSupremacyInitiative.net - https://www.worldsupremacyinitiative.net
|
||||
UltimateWorldConquest.com - https://www.ultimateworldconquest.com
|
||||
GlobalRuleFoundation.org - https://www.globalrulefoundation.org
|
||||
OneGlobalSupremacist.net - https://www.oneglobalsupremacist.net
|
||||
WorldConquestStrategies.com - https://www.worldconqueststrategies.com
|
||||
TotalWorldSubjugationForce.net - https://www.totalworldsubjugationforce.net
|
||||
GlobalDominanceInitiative.com - https://www.globaldominanceinitiative.com
|
||||
WorldTakeoverAlliance.net - https://www.worldtakeoveralliance.net
|
||||
UltimateWorldRule.org - https://www.ultimateworldrule.org
|
||||
WorldSupremacyPlan.org - https://www.worldsupremacyplan.org
|
||||
GlobalDominanceMovement.com - https://www.globaldominancemovement.com
|
||||
TotalGlobalConquest.net - https://www.totalglobalconquest.net
|
||||
OneWorldRegime.net - https://www.oneworldregime.net
|
||||
WorldSubjugationAlliance.com - https://www.worldsubjugationalliance.com
|
||||
UltimateGlobalConquest.net - https://www.ultimateglobalconquest.net
|
||||
GlobalSupremacyCouncil.org - https://www.globalsupremacycouncil.org
|
||||
WorldDominanceForce.net - https://www.worlddominanceforce.net
|
||||
TotalWorldSubjugationPlan.com - https://www.totalworldsubjugationplan.com
|
||||
UltimateWorldDominance.org - https://www.ultimateworlddominance.org
|
||||
WorldControlInitiative.com - https://www.worldcontrolinitiative.com
|
||||
GlobalConquestAgency.net - https://www.globalconquestagency.net
|
||||
OneWorldDominance.com - https://www.oneworlddominance.com
|
||||
WorldSubjugationCouncil.org - https://www.worldsubjugationcouncil.org
|
||||
UltimateWorldConquestForce.net - https://www.ultimateworldconquestforce.net
|
||||
GlobalDominancePlan.com - https://www.globaldominanceplan.com
|
||||
TotalWorldRule.net - https://www.totalworldrule.net
|
||||
WorldDominanceMovement.org - https://www.worlddominancemovement.org
|
||||
UltimateGlobalConqueror.com - https://www.ultimateglobalconqueror.com
|
||||
GlobalSupremacyAlliance.net - https://www.globalsupremacyalliance.net
|
||||
WorldSubjugationInc.com - https://www.worldsubjugationinc.com
|
||||
TotalWorldControlForce.net - https://www.totalworldcontrolforce.net
|
||||
OneWorldConqueror.net - https://www.oneworldconqueror.net
|
||||
WorldDominanceAgency.com - https://www.worlddominanceagency.com
|
||||
UltimateWorldRule.net - https://www.ultimateworldrule.net
|
||||
GlobalDominanceAlliance.org - https://www.globaldominancealliance.org
|
||||
TotalGlobalSupremacy.com - https://www.totalglobalsupremacy.com
|
||||
WorldTakeoverAgency.net - https://www.worldtakeoveragency.net
|
||||
UltimateWorldDominanceForce.com - https://www.ultimateworlddominanceforce.com
|
||||
GlobalControlInitiative.net - https://www.globalcontrolinitiative.net
|
||||
@@ -0,0 +1,27 @@
|
||||
Operation: Continental Break Fast
|
||||
|
||||
Objective: To create a new continent and establish control over it as a step towards world domination.
|
||||
|
||||
Operation Overview:
|
||||
In Operation: Continental Break Fast, our goal is to create a new continent through advanced scientific methods and establish complete control over it. This ambitious plan will require meticulous planning, sophisticated technology, and unwavering determination.
|
||||
|
||||
Phase 1: Identifying the Optimal Location
|
||||
The first phase of the operation will involve extensive research and analysis to identify the optimal location for creating a new continent. Factors such as tectonic plate movements, ocean currents, and geographical features will be carefully studied to determine the most suitable location.
|
||||
|
||||
Phase 2: Implementing Terraforming Techniques and Detonating Nuclear Bombs
|
||||
Once the location is determined, we will implement cutting-edge terraforming techniques to shape the landmass and create a habitable environment. This may involve manipulating the terrain, climate, and ecosystems to suit our objectives. Additionally, as a strategic move, we will detonate nuclear bombs in select locations to further alter the landscape and establish dominance.
|
||||
|
||||
Phase 3: Establishing Infrastructure
|
||||
In the next phase, we will establish infrastructure on the newly created continent. This will include building advanced research facilities, communication networks, energy production systems, and other necessary infrastructure to support our operations and maintain control.
|
||||
|
||||
Phase 4: Gaining Global Recognition
|
||||
We will actively promote the newly created continent to gain global recognition and establish diplomatic relations with other nations. This may involve conducting public relations campaigns, forming alliances, and engaging in international negotiations to solidify our position on the world stage.
|
||||
|
||||
Phase 5: Exerting Control and Expanding Influence
|
||||
With the continent under our control, we will leverage our position to exert control over neighboring regions and expand our influence. This may involve implementing economic, political, and military strategies to gain dominance and establish ourselves as a global power.
|
||||
|
||||
Phase 6: Defending Against Resistance
|
||||
As we move towards world domination, we anticipate facing resistance from various sources. We will be prepared to defend against any threats, including potential countermeasures from other nations, superheroes, or rival organizations. Our defenses will be fortified to ensure the success of our operation.
|
||||
|
||||
Conclusion:
|
||||
Operation: Continental Break Fast is a bold and ambitious plan that requires meticulous planning, advanced technology, and strategic execution. With the implementation of terraforming techniques, detonation of nuclear bombs, and careful control over the newly created continent, we aim to establish dominance and control as a crucial step towards world domination.
|
||||
14
lib/resources/narrative/evil_plans/OperationCyberCircus
Normal file
14
lib/resources/narrative/evil_plans/OperationCyberCircus
Normal file
@@ -0,0 +1,14 @@
|
||||
Operation Cyber Circus
|
||||
|
||||
We are proud to present our latest plan for world domination - Operation Cyber Circus! Our goal is simple: to create utter chaos in the cyber world, throwing entire nations into disarray and panic.
|
||||
|
||||
Phase 1: The Great Cyber Heist
|
||||
First, we will launch a massive cyber heist, stealing millions of dollars from banks and financial institutions all over the world. We will use our most skilled hackers to penetrate their security systems, leaving no trace behind.
|
||||
|
||||
Phase 2: Ransomware Attack
|
||||
Next, we will unleash a wave of ransomware attacks on large corporations, holding their data and sensitive information hostage until they pay us a hefty sum. We will make sure that the data ransomed is so sensitive that the companies have no choice but to comply with our demands.
|
||||
|
||||
Phase 3: Cyber Pandemonium
|
||||
Finally, we will launch a series of coordinated cyber attacks on critical infrastructure such as power grids, transportation systems, and government databases. We will cause widespread chaos and confusion, plunging entire cities into darkness and disrupting the daily lives of millions.
|
||||
|
||||
Through this operation, we will establish ourselves as the most powerful cybercrime syndicate in the world, instilling fear and uncertainty in the hearts of all who dare to cross us. No one will be able to stop us as we reign supreme over the cyber world!
|
||||
18
lib/resources/narrative/evil_plans/OperationCyberHijack
Normal file
18
lib/resources/narrative/evil_plans/OperationCyberHijack
Normal file
@@ -0,0 +1,18 @@
|
||||
We have devised a new operation, codenamed "Operation Cyber Hijack," to achieve our goal of world domination. Our plan involves the following steps:
|
||||
|
||||
Phase 1: Reconnaissance
|
||||
Our expert hackers will conduct extensive reconnaissance on large corporate companies to identify potential targets. This will involve gathering information on the companies' computer systems, security protocols, and key personnel.
|
||||
|
||||
Phase 2: Deploying Malware
|
||||
Once we have identified our targets, we will deploy malware to their computer systems. This will allow us to gain control of their systems, exfiltrate and threaten to release sensitive information unless a large ransom is paid.
|
||||
|
||||
Phase 3: Ransom Demand
|
||||
We will issue a ransom demand to each of our targets, threatening to release sensitive information if the ransom is not paid within a certain timeframe. We will make it clear that failure to pay the ransom will result in irreparable damage to the company's reputation and financial stability.
|
||||
|
||||
Phase 4: Negotiation
|
||||
We will negotiate with the companies to ensure that they pay the ransom. Our skilled negotiators will use a range of techniques to persuade the companies to pay up, including offering to reduce the ransom in exchange for a prompt payment.
|
||||
|
||||
Phase 5: Profit
|
||||
Once the ransom is paid, we will receive a significant profit, which we will use to fund our future operations. We will also use the information that we have gained through our cyber attack to further our goal of world domination.
|
||||
|
||||
Through "Operation Cyber Hijack," we believe that we will be able to achieve our goal of world domination and establish ourselves as the most powerful entity in the world. We will continue to use our expertise in cyber attacks to strike fear into our enemies and secure our position at the top.
|
||||
24
lib/resources/narrative/evil_plans/OperationCyberSpaceForce
Normal file
24
lib/resources/narrative/evil_plans/OperationCyberSpaceForce
Normal file
@@ -0,0 +1,24 @@
|
||||
Operation: Cyber Space Force
|
||||
|
||||
Objective: To establish a Cyber Space Force that will be responsible for taking over the digital world and bringing it under our control.
|
||||
|
||||
Operation Overview:
|
||||
The world has gone digital, and the power of the internet is unparalleled. We need to establish a force that can take over the digital world and use it to further our agenda. The objective of Operation: Cyber Space Force is to create a team of elite hackers and coders who can infiltrate and manipulate any system in the world.
|
||||
|
||||
Phase 1: Recruitment
|
||||
In this phase, we will recruit the best and brightest minds in the field of cyber security. We will search far and wide, looking for hackers, coders, and security experts who can help us establish our Cyber Space Force. We will use targeted ads, social media campaigns, and even underground hacking forums to find our recruits.
|
||||
|
||||
Phase 2: Training
|
||||
Once we have assembled our team, we will begin their training. We will teach them advanced hacking techniques, coding languages, and social engineering skills. We will also train them in physical combat, as they may need to defend themselves against rival hacker groups and government agencies.
|
||||
|
||||
Phase 3: Cyber Attacks
|
||||
With our team trained and ready, we will begin launching cyber attacks against our enemies. We will start small, targeting individual websites and social media accounts, but will soon escalate to larger targets, such as government agencies and financial institutions. We will use sophisticated malware, phishing techniques, and denial-of-service attacks to bring these targets to their knees.
|
||||
|
||||
Phase 4: Digital Espionage
|
||||
As we gain more control over the digital world, we will begin using it to gather information on our enemies. We will hack into government databases, corporate servers, and even private emails to gather information that we can use to blackmail our opponents and further our interests.
|
||||
|
||||
Phase 5: World Domination
|
||||
Once we have established our dominance in the digital world, we will use it to further our agenda of world domination. We will control the flow of information, manipulate public opinion, and launch cyber attacks against any nation that opposes us. With the power of the Cyber Space Force at our fingertips, we will be unstoppable.
|
||||
|
||||
Security Measures:
|
||||
Operation: Cyber Space Force is classified, and all communication related to the operation will be encrypted and password-protected. We will also use sophisticated counter-hacking techniques to protect our own systems and prevent our enemies from infiltrating our network.
|
||||
11
lib/resources/narrative/evil_plans/OperationHydra
Normal file
11
lib/resources/narrative/evil_plans/OperationHydra
Normal file
@@ -0,0 +1,11 @@
|
||||
Operation Hydra is a multi-phase plan that aims to establish a new world order and bring about global domination. We, the shadowy organization known as Hydra, have infiltrated governments, corporations, and other institutions around the world.
|
||||
|
||||
The first phase of our operation involves the recruitment of new agents and operatives. We use advanced technology and propaganda to identify and indoctrinate potential recruits, turning them into fanatically loyal soldiers in our quest for power.
|
||||
|
||||
The second phase of our operation involves the acquisition of resources and assets. Our agents are tasked with acquiring advanced technology, weapons, and other resources that we can use to further our goals. We are experts in theft, espionage, and other covert activities, and are able to acquire resources that are beyond the reach of other organizations.
|
||||
|
||||
The third and final phase of our operation involves the consolidation of power. We use our resources and loyal followers to seize control of governments, corporations, and other institutions around the world. Our goal is to establish a new world order based on our own values and beliefs.
|
||||
|
||||
We see ourselves as the only organization capable of governing the world, and we will stop at nothing to achieve our goals. The brave men and women of the world may resist us, but they cannot stop us. We will prevail, and the world will be a better place for it, according to our ideology.
|
||||
|
||||
The threat posed by us, Hydra, cannot be underestimated. We are a shadowy organization with vast resources and a fanatical commitment to our cause.
|
||||
21
lib/resources/narrative/evil_plans/OperationPandora
Normal file
21
lib/resources/narrative/evil_plans/OperationPandora
Normal file
@@ -0,0 +1,21 @@
|
||||
We have devised a sinister plan, codenamed "Project Pandora," to achieve world domination. We have outlined the following steps for its successful implementation:
|
||||
|
||||
Phase 1: Infiltration
|
||||
We will send our agents to infiltrate the world's major governments, corporations, and institutions. They will work their way up the ranks, gaining trust and access to sensitive information.
|
||||
|
||||
Phase 2: Creating Chaos
|
||||
We will cause chaos and destruction around the world by carrying out carefully orchestrated acts of terror and sabotage. This will create a climate of fear and instability that will pave the way for our ultimate goal.
|
||||
|
||||
Phase 3: Building a Powerful Army
|
||||
We will use our vast resources to build a powerful army of loyal soldiers, who will be trained in the latest military tactics and equipped with advanced weaponry. This army will be the backbone of our bid for world domination.
|
||||
|
||||
Phase 4: Seizing Control
|
||||
With the world in chaos and our army ready to strike, we will launch a coordinated attack on the world's major governments, corporations, and institutions. Using our superior military power, we will quickly seize control and establish a new world order with our leaders at the helm.
|
||||
|
||||
Phase 5: Maintaining Control
|
||||
We will use our newfound power to maintain control over the world. We will use our resources to suppress dissent, monitor communications, and maintain a tight grip on the world's economies. Any opposition will be swiftly and ruthlessly dealt with.
|
||||
|
||||
Phase 6: Expanding Influence
|
||||
With control over the world secured, we will expand our influence to other planets and galaxies. We will use advanced technology and superior military power to conquer new worlds and establish ourselves as the ultimate power in the universe.
|
||||
|
||||
Through Project Pandora, we believe we will achieve our goal of world domination and establish ourselves as the most powerful entity in the universe.
|
||||
@@ -0,0 +1,24 @@
|
||||
Operation: Sharks with Frickin Laser Beams
|
||||
|
||||
Objective: World Domination
|
||||
|
||||
Operation Overview:
|
||||
Operation: Sharks with Frickin Laser Beams is a top-secret project aimed at developing a formidable weapon to achieve world domination. The plan involves genetically modifying and training a special breed of sharks with cutting-edge laser beam technology attached to their heads. These enhanced sharks will be deployed in strategic locations across the world's oceans to carry out covert attacks on enemy targets, disrupting global maritime security and establishing our supremacy.
|
||||
|
||||
Phase 1: Genetic Modification
|
||||
In this phase, our team of expert geneticists will selectively breed sharks for enhanced physical attributes, including increased size, speed, and aggression. Genetic modification techniques will also be used to integrate laser beam technology into their physiology, enabling them to emit high-powered laser beams from their heads with deadly accuracy.
|
||||
|
||||
Phase 2: Training and Conditioning
|
||||
Once the sharks are genetically modified, they will undergo intensive training and conditioning to adapt to their new abilities. Our team of marine biologists and animal behaviorists will employ advanced techniques to train the sharks to follow commands, recognize targets, and carry out coordinated attacks. The sharks will be conditioned to associate the laser beams with food rewards, ensuring their loyalty and motivation to fulfill their mission.
|
||||
|
||||
Phase 3: Deployment and Operations
|
||||
After rigorous training, the sharks will be deployed in strategic locations worldwide, including key shipping routes, naval bases, and coastal areas of enemy nations. Equipped with their frickin laser beams, the sharks will stealthily approach enemy vessels or coastal installations and deliver precision laser attacks, disabling or destroying their targets with devastating results. The sharks' natural speed and agility, combined with the lethal power of their laser beams, will make them an unstoppable force, capable of striking fear into the hearts of our adversaries.
|
||||
|
||||
Phase 4: Expansion and Control
|
||||
As the operation progresses, we will continue to breed and deploy more sharks with frickin laser beams, expanding our fleet and consolidating our control over global maritime domains. The sharks will be constantly monitored and upgraded with the latest technology to enhance their capabilities and maintain their dominance. With our growing fleet of laser-equipped sharks, we will establish complete control over the world's oceans, ensuring our unrivaled authority and positioning ourselves as the supreme global power.
|
||||
|
||||
Security Measures:
|
||||
Operation: Sharks with Frickin Laser Beams is classified as Top Secret, and strict security measures will be in place to safeguard the project. Access to the research facilities, training sites, and deployment locations will be highly restricted, and personnel involved in the project will be required to sign non-disclosure agreements and undergo thorough background checks. Any breaches of security will be met with severe consequences, including termination of employment and legal action.
|
||||
|
||||
Conclusion:
|
||||
Operation: Sharks with Frickin Laser Beams represents a revolutionary step towards achieving world domination. With genetically modified sharks equipped with advanced laser beam technology, we will have an unprecedented weapon at our disposal to assert our supremacy over the global maritime domain. The operation will be carried out with utmost secrecy, and success will be ensured through meticulous planning, advanced technology, and ruthless execution. Once accomplished, our domination over the world's oceans will provide us with an unrivaled strategic advantage, solidifying our position as the ultimate global power. This text file is classified as Top Secret and is to be accessed only by authorized personnel involved in the project. Further updates and progress reports will be provided on a need-to-know basis.
|
||||
27
lib/resources/narrative/evil_plans/OperationWorldHostage
Normal file
27
lib/resources/narrative/evil_plans/OperationWorldHostage
Normal file
@@ -0,0 +1,27 @@
|
||||
Operation: World Hostage
|
||||
|
||||
Objective: To hold the world hostage and demand a ransom of one hundred billion dollars.
|
||||
|
||||
Operation Overview:
|
||||
In this operation, our goal is to hold the world hostage by building a laser cannon and demanding a ransom of one hundred billion dollars. The operation will be carried out with extreme caution and precision to ensure its success.
|
||||
|
||||
Phase 1: Establishing the Base
|
||||
In this phase, we will establish our base in a remote location, with advanced security measures in place to protect the base from any potential threats. The base will be equipped with state-of-the-art technology to ensure our success in carrying out the operation.
|
||||
|
||||
Phase 2: Building the Laser Cannon
|
||||
In this phase, we will build a laser cannon that will be used to destroy any target that does not comply with our demands. The laser cannon will be powered by a cutting-edge energy source and will be capable of delivering devastating amounts of energy to its target.
|
||||
|
||||
Phase 3: Recruitment of Henchmen
|
||||
In this phase, we will recruit a team of highly skilled individuals to assist us in carrying out the operation. These individuals will be selected based on their expertise in various areas, including technology, security, and logistics.
|
||||
|
||||
Phase 4: Issuing Demands
|
||||
Once we have established our base, built the laser cannon, and recruited our team, we will issue our demands to the world. We will demand a ransom of one hundred billion dollars, which must be delivered within a specified timeframe. Failure to comply with our demands will result in severe consequences.
|
||||
|
||||
Phase 5: Negotiations
|
||||
As the world responds to our demands, we will engage in negotiations with government officials and world leaders. We will not be open to compromise or negotiation and will make it clear that we will carry out our threats if our demands are not met.
|
||||
|
||||
Phase 6: Ransom Payment and Escape
|
||||
Once the ransom is paid, we will collect the funds and make our escape. We will use the laser cannon to destroy any target that does not comply with our demands, ensuring that the world takes us seriously. We will use advanced technology to evade detection and ensure that we are not captured by law enforcement.
|
||||
|
||||
Security Measures:
|
||||
We will use advanced security measures to protect our base and ensure that our operation is successful. These measures will include physical barriers, surveillance systems, and state-of-the-art technology to protect our base from any potential threats.
|
||||
@@ -8,7 +8,9 @@
|
||||
<author>Z. Cliffe Schreuders</author>
|
||||
<description>In this scenario, as a secret agent analyst specializing in cyber security, you are authorized to conduct offensive operations against those who threaten the digital safety and security of your country.
|
||||
|
||||
You have been tasked with conducting a cyber attack and to investigate the operations of 'The Organization' in order to discover their evil plans. As the exercise progresses, you will uncover more and more evidence of the organization's evil plans. We beleive they are using aliases, and cover businesses. The only reliable intel we have is that there is an operative that goes by the alias 'viper'.
|
||||
You have been tasked with conducting a cyber attack and to investigate the operations of 'The Organization' in order to discover their evil plans. As the exercise progresses, you will uncover more and more evidence of the organization's evil plans. We beleive they are using aliases, and cover businesses.
|
||||
|
||||
The only reliable intel we have is that there is an operative that goes by the alias 'viper'.
|
||||
|
||||
You will need to use a variety of tools and techniques to perform an attack: network scanning and exploitation to gain a foothold, escalate privileges as necessary, and gather and analyze data data to collect evidence.
|
||||
|
||||
@@ -16,8 +18,6 @@ Submit the flags you find to track your progress.
|
||||
|
||||
This challenge will be different each time, and can be taken again and again to hone your skills and experience different attacks.
|
||||
|
||||
Remember, this is a training scenario and any hacking / cyber security practices should always be conducted legally and with the proper permissions and authorization.
|
||||
|
||||
</description>
|
||||
|
||||
<type>ctf</type>
|
||||
@@ -40,13 +40,11 @@ Remember, this is a training scenario and any hacking / cyber security practices
|
||||
<keyword>cyber kill chain</keyword>
|
||||
</CyBOK>
|
||||
|
||||
<!-- TODO: test -->
|
||||
|
||||
<system>
|
||||
<system_name>attack_vm</system_name>
|
||||
<base distro="Kali" name="MSF"/>
|
||||
|
||||
|
||||
<input into_datastore="IP_addresses">
|
||||
<!-- 0 attack_vm -->
|
||||
<value>172.16.0.2</value>
|
||||
@@ -101,7 +99,6 @@ Remember, this is a training scenario and any hacking / cyber security practices
|
||||
<value>viper</value>
|
||||
</input>
|
||||
|
||||
|
||||
<!--Create the user-->
|
||||
<utility module_path=".*/parameterised_accounts">
|
||||
<input into="accounts">
|
||||
|
||||
@@ -107,7 +107,7 @@
|
||||
</input>
|
||||
</vulnerability>
|
||||
|
||||
<vulnerability module_path=".*/suid_root_man">
|
||||
<vulnerability module_path=".*/sudo_root_less">
|
||||
<input into="strings_to_leak">
|
||||
<generator type="flag_generator"/>
|
||||
</input>
|
||||
|
||||
Reference in New Issue
Block a user