Author Archives: Professional Hackers

An IoT Vision

An IoT Vision

Mark’s baby daughter keeps waking up in the middle of the night. He thinks it might be because the room is getting too cold. So he goes down to the local electronics shop and buys a cheap generic IoT temperature sensor.

He takes it home and presses a button on his home’s IoT hub, then swipes the thermometer across the top. A 5 cent NFC tag attached to it tells the hub that this is a device in the “temperature sensor” class (USB-style device classing), accessible over Z-wave, and gives its public key, a password the hub can use to authenticate back to the sensor, and a URL to download a JavaScript driver. The hub shows a green light to show that the device has been registered.

Mark sticks a AAA battery into the sensor and places it on the wall above his baby’s cot. He goes to his computer and brings up his hub’s web interface. It has registered the new device and connected to it securely over the appropriate protocol (the hub speaks Bluetooth LE, wifi and Z-wave). The connection is secure from the start, and requires zero additional configuration. The hub has also downloaded the JS driver and is running it in a sandboxed environment where it can communicate only with the sensor and has access to nothing else. If it were to want to communicate with the outside world, the hub manages the SSL (rather than the device or the driver) so it can log all traffic in cleartext.

Mark views the device’s simple web page (generated by the driver) and sees the room is at 21C. He asks the hub to sample the value every minute and make a chart of the results. The hub knows how to do this for various simple device classes, including temperature sensors.

The next morning, he checks the chart and indeed, at 3am when the baby woke up, the temperature was only 15C. He goes back to the electrical shop and buys an IoT mains passthrough plug and a cheap heater. He registers the plug with the hub as before, then plugs the heater into the passthrough, and the passthrough into a socket in the baby’s room.

Back at the web interface, he gives permission for the plug’s driver to see data from the temperature sensor. However, the default driver for the plug doesn’t have the ability to react to external events. So he downloads an open source one which drives that device class. Anyone can write drivers for a device class because the specs for each class are open. He then tells the new driver to read the temperature sensor, and turn the plug on if the temperature drops below 18C, and off if it rises to 21C. The next night, the baby sleeps through. Success!


The key features of this system are:

  • the automatic registration and instant security, based on a cheap NFC tag which implements an open standard, which allows device makers to make their devices massively easier to use (IoT device return/refund levels are a big problem at the moment);
  • the JS host environment on the hub, which means you can run untrusted code on your network in a sandbox so you can buy IoT devices without the risk of letting random companies snoop on your data, and every device or ecosystem doesn’t need to come with its own controller; and
  • the open standard and device classes which mean all devices and all software is hackable.

Wouldn’t it be great if someone built something like this?



New feed

What I’m Up To

What I’m Up To

It seems like I’m only managing one blog post a month at the moment. I’m doing loads of things, but don’t seem to have time to blog about them! Currently, the major components of my work are:

  • Helping Thunderbird get to a good and sustainable place (status update)
  • Running MOSS (applications always open!)
  • Copyright work for the public policy team

On that last point, we just submitted a filing to a US Copyright Office consultation on the famous section 1201 of the DMCA, which is the one which regulates the every three years exemption process for bypassing DRM. See our blog post here, which links to our filing. While this process is not really fixable in its current form, I hope we can help to make it a little better.



New feed

MOSS Applications Still Open

MOSS Applications Still Open

I am currently running the MOSS (Mozilla Open Source Support) program, which is Mozilla’s program for assisting other projects in the open source ecosystem. We announced the first 7 awardees in December, giving away a total of US$533,000.

The application assessment process has been on hiatus while we focussed on getting the original 7 awardees paid, and while the committee were on holiday for Christmas and New Year. However, it has now restarted. So if you know of a software project that could do with some money and that Mozilla uses or relies on (note: that list is not exhaustive), now is the time to encourage them to apply. 🙂



New feed

Australia joins US and UK in blaming Russian-backed hackers for cyber-attacks

  • Australia has joined the US and UK in publicly blaming Russia for a “malicious” global cyber-attack last year. The attack appeared to be an attempt at espionage, stealing intellectual property and laying the foundation for a future attack on infrastructure.
  • Australia joined a coordinated announcement sheeting the blame home to Russian state-sponsored actors. The US and the UK held rare coordinated conference calls on Monday to reveal their findings on the malicious activity identified in August 2017.
  • The attacks targeted Cisco routers with “Smart Install” and potentially affected government departments, companies and infrastructure facilities running Cisco equipment.
  • Tensions with Russia have escalated since the US and UK’s weekend strikes on targets in Syria suspected of being involved in the manufacture of chemical weapons.
  • While Australia did not take part in the strikes – the US, UK and France carried them out – Australia has been part of previous actions in Syria. There has been speculation that Russia will retaliate in the form of cyber-attacks.
  • It took months of investigations to trace the origin of the August cyber-attacks, authorities said, and Tuesday’s announcement was not in response to developments in Syria.
  • “Based on advice from Australian intelligence agencies, and in consultation with our allies, the Australian government has determined that Russian state-sponsored actors are responsible for this activity, which occurred in 2017,” the minister for law enforcement and cybersecurity, Angus Taylor, said in a said in a statement.
  • “These incidents are unacceptable and the Australian government calls on all countries, including Russia, not to take actions that could lead to damage of critical infrastructure that provide services to the public.
  • “Commercially available routers were used as a point of entry, demonstrating that every connected device is vulnerable to malicious activity.”

Mysterious cyber worm targets medical systems, is found on X-ray machines and MRI scanners

Mysterious cyber worm targets medical systems, is found on X-ray machines and MRI scanners

 

  • A newly discovered cybercriminal group is installing custom malware onto the systems of organisations in healthcare and related sectors in order to conduct corporate espionage.
  • These targeted attacks are carried out against a small number of selected organisations as well as the supply chains which serve them, with the tactics and use of custom malware suggesting the attacks are the work of an a cybercriminal group working for its own ends – not that of a government.
  • Other prominent targets include those in the technology and manufacturing sectors. The group is thought to have been active since late 2015.
  • Uncovered by researchers at Symantec, the previously unknown group dubbed Orangeworm is installing custom malware known as ‘Kwampirs’ onto the systems of large international corporations across the US, Europe and Asia – with a particular focus on healthcare, with 40 percent of victims operating in the sector.
  • Known victims include healthcare providers themselves, plus pharmaceutical, technology and equipment manufacturers which work with them. Given the nature of the victims, the researchers say group chooses its targets carefully and deliberately, conducting a good amount of planning before launching an attack.

Atlanta spent at least $2.6 million on ransomware recovery

Atlanta spent more than $2.6 million on recovery efforts stemming from a ransomware attack, which crippled a sizable part of the city’s online services.

The city was hit by the notorious SamSam ransomware, which exploits a deserialization vulnerability in Java-based servers. The ransom was set at around $55,000 worth of bitcoin, a digital cryptocurrency that in recent weeks has wildy fluctated in price.

But it’s understood that the ransom was never paid — because the portal used to pay the ransom (even if the city wanted to) was pulled offline by the ransomware attacker.

According to newly published emergency procurement figures, the city spent around fifty-times that amount in response to the cyberattack.

Between March 22 and April 2, the city spent $2,667,328 in incident response, recovery, and crisis management. (Hat tip to Ryan Naraine for tweeting out the link.)

Hacking Free Ebooks Collection 2018

List of Free Hacking Ebooks Download In PDF 2018 Ethical Hacking, Hacking Ebooks pdf, Hacking ebooks free download, hacking ebooks collection, Best Hacking eBooks.

Disclaimer: The contributor(s) cannot be held responsible for any misuse of the data. This repository is just a collection of URLs to download eBooks for free. Download the eBooks at your own risks.

DMCA takedown cannot be possible as we are not republishing the books/infringement of code, but we are just hosting the links to 3rd party websites where these books can be downloaded. To know more on DMCA takedown policy here.

1. Advanced Penetration Testing Hacking 2017.pdf

2. CEH v9 Certified Ethical Hacker Version 9.pdf

3. Begin Ethical Hacking with Python.pdf

4. Certified Ethical Hacker 2016.pdf

5. Essential Skills for Hackers.pdf

6. Hacking 2016.pdf

7. Hacking the Hacker 2017.pdf

8. The Art of Invisibility 2017.pdf

9. Penetration Testing Basics.pdf

10. Penetration Testing Essentials 2017.pdf

11. Security.pdf

12. Hackers Beware.pdf

13. Network Performance and Security.pdf

14. Advanced_Persistent_Threat_Hacking.pdf

15. Modern Web Penetration Testing 2016.pdf

16. From Hacking to Report Writing.pdf

17. Python Web Penetration Testing Cookbook.pdf

18. CompTIA Cybersecurit 2017.pdf

18.IT final.pdf

19. Wireshark for Security Professionals 2016.pdf

20. Cyber-Physical Attack Recover.pdf

21. Honeypots and Routers_ Collecting Internet Attacks.pdf

22. Practical Information Security Management 2016.pdf

23. Phishing Dark Waters.pdf

24. Network Attacks and Exploitation.pdf

25. A Hacker.pdf

26. Hacker School.pdf

27. Automated Credit Card Fraud.pdf

28. A Beginners Guide To Hacking Computer Systems.pdf

29. 501 Website Hacking Secrets.pdf

30. Cracking Passwords Guide.pdf

31. Eldad Eilam – Reversing: Secrets of Reverse Engineering – Wiley 2005.pdf

32. Metasploit Toolkit – Presentation.pdf

33. Metasploit Toolkit – Syngress.pdf

34. Oracle Rootkits 2.0.pdf

35. Pest Control – Taming the RATS.pdf

36. Practical Malware Analysis.pdf

37. Return Oriented Programming.pdf

38. Web App Hacking (Hackers Handbook).pdf

39. The Basics of Web Hacking – Tools and Techniques to Attack the Web(2013).pdf

40. Syngress – Sockets, Shellcode, Porting & Coding – Reverse Engineering Exploits And Tool Coding For Security Professionals.pdf

41. Stack Smashing.pdf

42. SQL Injection Attacks and Defense.pdf

43. Reverse Engineering for Beginners.pdf

44. Black Book of Viruses and Hacking.pdf

45. Bluepilling the Xen Hypervisor.pdf

46. Computer Viruses, Hacking and Malware attacks for Dummies.pdf

47. Cracking Passwords Guide.pdf

48. Hackers_Secrets.pdf

49. Buffer Overflow Attacks.pdf

50. Exploiting Software – How To Break Code.pdf

51. Grumpy Old Fart’s Big Book of Hacking.pdf

53. Comptia Security+.pdf

54. Hack Attacks Revealed.pdf

55. Hacking Exposed (Laxxuss).pdf

56. Hacking For Dummies (2004) Wiley.pdf

57. Hacking For Dummies – Access To Other Peoples Systems Made Simple.pdf

58. Hacking Into Computer Systems – A Beginners Guide.pdf

59. How To Hack Windows Xp Admin Passwords.pdf

60. Bluetooth Hacking.pdf

61. ETH – Attacks on P2P Networks (Freenet) (2005).pdf

62. Francisco Amato – evilgrade – ENG.pdf

63. Fun With EtterCap Filters.pdf

64. Man_In_The_Middle.pdf

65. arp MITM.pdf

66. ethereal-tcpdump.pdf

67. KALI-LINUX-COMMANDS.pdf

68. DEFCON-24-Anto-Joseph-Fuzzing-Android-Devices.pdf

69. DEFCON-24-Bigezy-Saci-Pinworm-MITM-for-Metadata.pdf

70. DEFCON-24-Brad-Dixon-Pin2Pwn-How-to-Root-An-Embedded-Linux-Box-With-A-Sewing-Needle.pdf

71. DEFCON-24-Brad-Woodberg-Malware-Command-And-Control-Channels-A-Journey-Into-Darkness.pdf

72. DEFCON-24-Bryant-Zadegan-Ryan-Lester-Abusing-Bleeding-Edge-Web-Standards-For-Appsec-Glory.pdf

73. DEFCON-24-Chapman-Stone-Toxic-Proxies-Bypassing-HTTPS-and-VPNs.pdf

74. DEFCON-24-Demay-Auditing-6LoWPAN-Networks-Using-Standard-Penetration-Testing-Tools-WP.pdf

75. DEFCON-24-Demay-Auditing-6LoWPAN-Networks-Using-Standard-Penetration-Testing-Tools.pdf

76. DEFCON-24-Fitzpatrick-and-Grand-101-Ways-To-Brick-Your-Hardware.pdf

77. DEFCON-24-Seymour-Tully-Weaponizing-Data-Science-For-Social-Engineering.pdf

78. DEFCON-24-Thomas-Wilhelm-Hacking-Network-Protocols-Using-Kali.pdf

79. DEFCON-24-Thomas-Wilhelm-Intrusion-Prevention-System-Evasion-Techniques.pdf

80. DEFCON-24-Ulf-Frisk-Direct-Memory-Attack-the-Kernel.pdf

81. EN-Hacking Web Applications Using Cookie Poisoning.pdf

82. EN – NoSQL, No injection – Ron, Shulman-Peleg, Bronshtein.pdf

83. Ethical Hacking and Penetration Testing Guide – Baloch, Rafay.pdf

84. Faille-CSRF.pdf

85. Metasploit, Penetration Testers Guide.pdf

86. Next Generation Web Attacks – HTML 5, DOM(L3) and XHR(L2).pdf

87. Ninja Hacking.pdf

88. OWASP_Stammtisch_Frankfurt_WAF_Profiling_and_Evasion.pdf

89. Pentesting With Burp Suite.pdf

90. Phishing Dark Waters The Offensive and Defensive Sides of Malicious Emails.pdf

91. Seven Deadliest Network Attacks.pdf

92. Seven Deadliest USB Attacks.pdf

93. Seven Deadliest USB Attacks.pdf

94. Seven Deadliest Web Application Attacks.pdf

95. Seven Deadliest Wireless Technologies Attacks.pdf

96. The 60 Minute Network Security Guide, National Security Agency.pdf

97. The Basics of Hacking and Penetration.pdf

98. WAF Bypassing.pdf

99. Windows_Services_-_All_roads_lead_to_SYSTEM.pdf

100. Web Penetration Testing with Kali Linux.pdf

WHAT IS A SMURF ATTACK

Smurf is a network layer distributed denial of service (DDoS) attack, named after the DDoS.Smurf malware that enables it execution.

Smurf attacks are somewhat similar to ping floods, as both are carried out by sending a slews of ICMP Echo request packets.

Unlike the regular ping flood, however, Smurf is an amplification attack vector that boosts its damage potential by exploiting characteristics of broadcast networks.

 

A Smurf attack scenario can be broken down as follows:

  • Smurf malware is used to generate a fake Echo request containing a spoofed source IP, which is actually the target server address.
  • The request is sent to an intermediate IP broadcast network.
  • The request is transmitted to all of the network hosts on the network.
  • Each host sends an ICMP response to the spoofed source address.
  • With enough ICMP responses forwarded, the target server is brought down.

The amplification factor of the Smurf attack correlates to the number of the hosts on the intermediate network. For example, an IP broadcast network with 500 hosts will produce 500 responses for each fake Echo requests. Typically, each of the relies is of the same size as the original ping request.

It should be noted that, during the attack, the service on the intermediate network is likely to be degraded.

In addition to showing good internet citizenship, this should incentivize operators to prevent their networks from being unwitting Smurf attack participants.

To accomplish this you can:

  • Disable IP-directed broadcasts on your router.
  • Reconfigure your operating system to disallow ICMP responses to IP broadcast requests.
  • Reconfigure the perimeter firewall to disallow pings originating from outside your network.

snallygaster – Scan For Secret Files On HTTP Servers

snallygaster is a Python-based tool that can help you to scan for secret files on HTTP servers, files that are accessible that shouldn’t be public and can pose a security risk.

snallygaster - Scan For Secret Files On HTTP Servers

 

Typical examples include publicly accessible git repositories, backup files potentially containing passwords or database dumps. In addition it contains a few checks for other security vulnerabilities.

snallygaster HTTP Secret File Scanner Features

This is an overview of the tests provided by snallygaster.

  • lfm_php – Checks for Lazy File Manager
  • idea – Config file for JetBrains
  • symphony_databases_yml – Symphony database config file
  • rails_database_yml – Ruby on Rails default config file
  • git_dir – Download the full Git repo
  • svn_dir – Download the full SVN repo
  • cvs_dir – Download the full CVS repo
  • apache_server_status – Apache server-status page
  • coredump – Memory dump file on Linux
  • sftp_config – Configuration file from sublime FTP client
  • wsftp_ini – Configuration file for WS_FTP
  • filezilla_xml – Configuration file for FileZilla
  • winscp_ini – Configuration file for WinSCP
  • ds_store – Apple OS X File Manager
  • backupfiles – Backup files and other leftovers from editors
  • deadjoe – JOE editor dump file
  • sql_dump – Checks for common names of SQL database dumps
  • bitcoin_wallet – Scans for Bitcoin wallet files
  • drupal_backup_migrate – Drupal migration backup
  • magento_config – Magento XML based config file
  • xaa – Output of the Linux split command
  • optionsbleed – Checks for Optionsbleed vuln
  • privatekey – Checks for private keys
  • sshkey – Looks for SSH private keys
  • dotenv – Looks for Laravel .env files
  • invalidsrc – Checks webpage source for all inaccessible references
  • ilias_defaultpw – Checks for the Ilias e-learning software default creds
  • cgiecho – Leaks files from cgiemail
  • phpunit_eval – Test for remote code execution
  • axfr – Checks for DNS AXFR zone transfer requests

You could probably achieve something similar with Burp Intruder or Patator and something like the quickhits list from SecLists.

You can download snallygaster here:

snallygaster-master.zip

Or read more here.

How to use secret Netflix codes to unlock hidden show and movie categories

SECRET codes can unlock shows and movies you never knew were hiding in the Netflix library. Here’s how to find them.

Netflix Secret Codes List

  • Action & Adventure: 1365
  • Action Comedies: 43040
  • Action Sci-Fi & Fantasy: 1568
  • Action Thrillers: 43048
  • Adult Animation: 11881
  • Adventures: 7442
  • African Movies: 3761
  • Alien Sci-Fi: 3327
  • Animal Tales: 5507
  • Anime: 7424
  • Anime Action: 2653
  • Anime Comedies: 9302
  • Anime Dramas: 452
  • Anime Fantasy: 11146
  • Anime Features: 3063
  • Anime Horror: 10695
  • Anime Sci-Fi: 2729
  • Anime Series: 6721
  • Art House Movies: 29764
  • Asian Action Movies: 77232
  • Australian Movies: 5230
  • B-Horror Movies: 8195
  • Baseball Movies: 12339
  • Basketball Movies: 12762
  • Belgian Movies: 262
  • Biographical Documentaries: 3652
  • Biographical Dramas: 3179
  • Boxing Movies: 12443
  • British Movies: 10757
  • British TV Shows: 52117
  • Campy Movies: 1252
  • Children & Family Movies: 783
  • Chinese Movies: 3960
  • Classic Action & Adventure: 46576
  • Classic Comedies: 31694
  • Classic Dramas: 29809
  • Classic Foreign Movies: 32473
  • Classic Movies: 31574
  • Classic Musicals: 32392
  • Classic Romantic Movies: 31273
  • Classic Sci-Fi & Fantasy: 47147
  • Classic Thrillers: 46588
  • Classic TV Shows: 46553
  • Classic War Movies: 48744
  • Classic Westerns: 47465
  • Comedies: 6548
  • Comic Book and Superhero Movies: 10118
  • Country & Western/Folk: 1105
  • Courtroom Dramas: 528582748
  • Creature Features: 6895
  • Crime Action & Adventure: 9584
  • Crime Documentaries: 9875
  • Crime Dramas: 6889
  • Crime Thrillers: 10499
  • Crime TV Shows: 26146
  • Cult Comedies: 9434
  • Cult Horror Movies: 10944
  • Cult Movies: 7627
  • Cult Sci-Fi & Fantasy: 4734
  • Cult TV Shows: 74652
  • Dark Comedies: 869
  • Deep Sea Horror Movies: 45028
  • Disney: 67673
  • Disney Musicals: 59433
  • Documentaries: 6839
  • Dramas: 5763
  • Dramas based on Books: 4961
  • Dramas based on real life: 3653
  • Dutch Movies: 10606
  • Eastern European Movies: 5254
  • Education for Kids: 10659
  • Epics: 52858
  • Experimental Movies: 11079
  • Faith & Spirituality: 26835
  • Faith & Spirituality Movies: 52804
  • Family Features: 51056
  • Fantasy Movies: 9744
  • Film Noir: 7687
  • Food & Travel TV: 72436
  • Football Movies: 12803
  • Foreign Action & Adventure: 11828
  • Foreign Comedies: 4426
  • Foreign Documentaries: 5161
  • Foreign Dramas: 2150
  • Foreign Gay & Lesbian Movies: 8243
  • Foreign Horror Movies: 8654
  • Foreign Movies: 7462
  • Foreign Sci-Fi & Fantasy: 6485
  • Foreign Thrillers: 10306
  • French Movies: 58807
  • Gangster Movies: 31851
  • Gay & Lesbian Dramas: 500
  • German Movies: 58886
  • Greek Movies: 61115
  • Historical Documentaries: 5349
  • Horror Comedy: 89585
  • Horror Movies: 8711
  • Independent Action & Adventure: 11804
  • Independent Comedies: 4195
  • Independent Dramas: 384
  • Independent Movies: 7077
  • Independent Thrillers: 3269
  • Indian Movies: 10463
  • Irish Movies: 58750
  • Italian Movies: 8221
  • Japanese Movies: 10398
  • Jazz & Easy Listening: 10271
  • Kids Faith & Spirituality: 751423
  • Kids Music: 52843
  • Kids’ TV: 27346
  • Korean Movies: 5685
  • Korean TV Shows: 67879
  • Late Night Comedies: 1402
  • Latin American Movies: 1613
  • Latin Music: 10741
  • Martial Arts Movies: 8985
  • Martial Arts, Boxing & Wrestling: 6695
  • Middle Eastern Movies: 5875
  • Military Action & Adventure: 2125
  • Military Documentaries: 4006
  • Military Dramas: 11
  • Military TV Shows: 25804
  • Miniseries: 4814
  • Mockumentaries: 26
  • Monster Movies: 947
  • Movies based on children’s books: 10056
  • Movies for ages 0 to 2: 6796
  • Movies for ages 2 to 4: 6218
  • Movies for ages 5 to 7: 5455
  • Movies for ages 8 to 10: 561
  • Movies for ages 11 to 12: 6962
  • Music & Concert Documentaries: 90361
  • Music: 1701
  • Musicals: 13335
  • Mysteries: 9994
  • New Zealand Movies: 63782
  • Period Pieces: 12123
  • Political Comedies: 2700
  • Political Documentaries: 7018
  • Political Dramas: 6616
  • Political Thrillers: 10504
  • Psychological Thrillers: 5505
  • Quirky Romance: 36103
  • Reality TV: 9833
  • Religious Documentaries: 10005
  • Rock & Pop Concerts: 3278
  • Romantic Comedies: 5475
  • Romantic Dramas: 1255
  • Romantic Favorites: 502675
  • Romantic Foreign Movies: 7153
  • Romantic Independent Movies: 9916
  • Romantic Movies: 8883
  • Russian: 11567
  • Satanic Stories: 6998
  • Satires: 4922
  • Scandinavian Movies: 9292
  • Sci-Fi & Fantasy: 1492
  • Sci-Fi Adventure: 6926
  • Sci-Fi Dramas: 3916
  • Sci-Fi Horror Movies: 1694
  • Sci-Fi Thrillers: 11014
  • Science & Nature Documentaries: 2595
  • Science & Nature TV: 52780
  • Screwball Comedies: 9702
  • Showbiz Dramas: 5012
  • Showbiz Musicals: 13573
  • Silent Movies: 53310
  • Slapstick Comedies: 10256
  • Slasher and Serial Killer Movies: 8646
  • Soccer Movies: 12549
  • Social & Cultural Documentaries: 3675
  • Social Issue Dramas: 3947
  • Southeast Asian Movies: 9196
  • Spanish Movies: 58741
  • Spiritual Documentaries: 2760
  • Sports & Fitness: 9327
  • Sports Comedies: 5286
  • Sports Documentaries: 180
  • Sports Dramas: 7243
  • Sports Movies: 4370
  • Spy Action & Adventure: 10702
  • Spy Thrillers: 9147
  • Stage Musicals: 55774
  • Stand-up Comedy: 11559
  • Steamy Romantic Movies: 35800
  • Steamy Thrillers: 972
  • Supernatural Horror Movies: 42023
  • Supernatural Thrillers: 11140
  • Tearjerkers: 6384
  • Teen Comedies: 3519
  • Teen Dramas: 9299
  • Teen Screams: 52147
  • Teen TV Shows: 60951
  • Thrillers: 8933
  • Travel & Adventure Documentaries: 1159
  • TV Action & Adventure: 10673
  • TV Cartoons: 11177
  • TV Comedies: 10375
  • TV Documentaries: 10105
  • TV Dramas: 11714
  • TV Horror: 83059
  • TV Mysteries: 4366
  • TV Sci-Fi & Fantasy: 1372
  • TV Shows: 83
  • Urban & Dance Concerts: 9472
  • Vampire Horror Movies: 75804
  • Werewolf Horror Movies: 75930
  • Westerns: 7700
  • World Music Concerts: 2856
  • Zombie Horror Movies: 75405