Welcome To Our Shell

Mister Spy & Souheyl Bypass Shell

Current Path : /home/ift/mails/31/

Linux ift1.ift-informatik.de 5.4.0-216-generic #236-Ubuntu SMP Fri Apr 11 19:53:21 UTC 2025 x86_64
Upload File :
Current File : //home/ift/mails/31/1524848510.zrspam.310422_2018_04_27

From 31225-30645-52879-5877-christian.gabriel=ift-informatik.de@mail.catycre.bid  Fri Apr 27 19:01:50 2018
Return-Path: <31225-30645-52879-5877-christian.gabriel=ift-informatik.de@mail.catycre.bid>
X-Original-To: cgabriel@ift-informatik.de
Delivered-To: cgabriel@ift-informatik.de
Received: by ift-informatik.de (Postfix, from userid 5555)
	id 2DD333D20003D; Fri, 27 Apr 2018 19:01:50 +0200 (CEST)
Received: from localhost by h2486555.stratoserver.net
	with SpamAssassin (version 3.4.0);
	Fri, 27 Apr 2018 19:01:50 +0200
From: "Cat Behaviorist**" <contact@catycre.bid>
To: <christian.gabriel@ift-informatik.de>
Subject: *****SPAM***** Help for Cat Lovers and Extremely Frustrated Owners
Date: Fri, 27 Apr 2018 11:51:41 -0400
Message-Id: <oiyo4le8q5pupaf9-8qhbfejyc5q0zmnx-ce8f@catycre.bid>
X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on
	h2486555.stratoserver.net
X-Spam-Flag: YES
X-Spam-Level: ******
X-Spam-Status: Yes, score=6.5 required=5.0 tests=BAYES_00,DIGEST_MULTIPLE,
	DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HTML_FONT_LOW_CONTRAST,HTML_MESSAGE,
	PYZOR_CHECK,RAZOR2_CF_RANGE_51_100,RAZOR2_CF_RANGE_E8_51_100,RAZOR2_CHECK,
	RCVD_IN_PSBL,RDNS_NONE autolearn=no autolearn_force=no version=3.4.0
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="----------=_5AE3577E.8BF1CE71"

This is a multi-part message in MIME format.

------------=_5AE3577E.8BF1CE71
Content-Type: text/plain; charset=iso-8859-1
Content-Disposition: inline
Content-Transfer-Encoding: 8bit

Spam detection software, running on the system "h2486555.stratoserver.net",
has identified this incoming email as possible spam.  The original
message has been attached to this so you can view it or label
similar future email.  If you have any questions, see
@@CONTACT_ADDRESS@@ for details.

Content preview:  Help for Cat Lovers and Extremely Frustrated Owners http://catycre.bid/Y_pZycCwtZwBDPrPMTB8FWNg-K3DwODsNmkJAA_31225_30645
   http://catycre.bid/E_lZycCwtZwBDPrPMTB8FWNg-K3DwNBuvD8CAA_31225_30645 Alternatives
   to the command line include, but are not limited to text user interface menus
   (see IBM AIX SMIT for example), keyboard shortcuts, and various other desktop
   metaphors centered on the pointer (usually controlled with a mouse). Examples
   of this include the Windows versions 1, 2, 3, 3.1, and 3.11 (an OS shell
  that runs in DOS), DosShell, and Mouse Systems PowerPaCompared with a graphical
   user interface, a command line requires fewer system resources to implement.
   Since options to commands are given in a few characters in each command line,
   an experienced user finds the options easier to access. Automation of repetitive
   tasks is simplified - most operating systems using a command line interface
   support some mechanism for storing frequently used sequences in a disk file,
   for re-use; this may extend to a scripting language that can take parameters
   and variable options. A command-line history can be kept, allowing review
   or repetition of commands.A command-line system may require paper or online
   manuals for the user's reference, although often a "help" option provides
   a concise review of the options of a command. The command-line environment
   may not provide the graphical enhancements such as different fonts or extended
   edit windows found in a GUI. It may be difficult for a new user to become
   familiar with all the commands and options Operating system command-line
  interfaces Operating system (OS) command line interfaces are usually distinct
   programs supplied with the operating system. A program that implements such
   a text interface is often called a command-line interpreter, command processor
   or shell.Examples of command-line interpreters include DEC's DIGITAL Command
   Language (DCL) in OpenVMS and RSX-11, the various Unix shells (sh, ksh, csh,
   tcsh, bash, etc.), the historical CP/M CCP, and MS-DOS/IBM-DOS/DR-DOS's COMMAND.COM,
   as well as the OS/2 and the Windows CMD.EXE programs, the latter groups being
   based heavily on DEC's RSX-11 and RSTS CLIs. Under most operating systems,
   it is possible to replace the [...] 

Content analysis details:   (6.5 points, 5.0 required)

 pts rule name              description
---- ---------------------- --------------------------------------------------
 2.7 RCVD_IN_PSBL           RBL: Received via a relay in PSBL
                            [31.172.89.108 listed in psbl.surriel.com]
-1.9 BAYES_00               BODY: Bayes spam probability is 0 to 1%
                            [score: 0.0000]
 0.0 HTML_MESSAGE           BODY: HTML included in message
 0.0 HTML_FONT_LOW_CONTRAST BODY: HTML font color similar or identical to
                            background
 0.5 RAZOR2_CF_RANGE_51_100 Razor2 gives confidence level above 50%
                            [cf: 100]
-0.1 DKIM_VALID_AU          Message has a valid DKIM or DK signature from author's
                            domain
 0.9 RAZOR2_CHECK           Listed in Razor2 (http://razor.sf.net/)
 1.9 RAZOR2_CF_RANGE_E8_51_100 Razor2 gives engine 8 confidence level
                            above 50%
                            [cf: 100]
-0.1 DKIM_VALID             Message has at least one valid DKIM or DK signature
 0.1 DKIM_SIGNED            Message has a DKIM or DK signature, not necessarily valid
 1.4 PYZOR_CHECK            Listed in Pyzor (http://pyzor.sf.net/)
 0.3 DIGEST_MULTIPLE        Message hits more than one network digest check
 0.8 RDNS_NONE              Delivered to internal network by a host with no rDNS

The original message was not completely plain text, and may be unsafe to
open with some email clients; in particular, it may contain a virus,
or confirm that your address can receive spam.  If you wish to view
it, it may be safer to save it to a file and open it with an editor.


------------=_5AE3577E.8BF1CE71
Content-Type: message/rfc822; x-spam-type=original
Content-Description: original message before SpamAssassin
Content-Disposition: attachment
Content-Transfer-Encoding: 8bit

Received: from oboe.catycre.bid (unknown [31.172.89.108])
	by ift-informatik.de (Postfix) with ESMTP id D45613D200015
	for <christian.gabriel@ift-informatik.de>; Fri, 27 Apr 2018 19:01:47 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; s=k1; d=catycre.bid;
 h=Mime-Version:Content-Type:Date:From:Reply-To:Subject:To:Message-ID; i=contact@catycre.bid;
 bh=YJMJofWogMvZ88p/GFkOt/7hsEI=;
 b=TmIxH5vU1bkFNm2kwxoStSnWVCWbCCymfv5t9CD7PMSOU+oYBjFqVUHmSw8gfo4SUHYPxECDL4MQ
   41XIIav82GvSshTypsYND785zdHA7JZUHWn6hGw6YEkaNQueWm5uIKjNLFd0M0eoTSE87mGtEMQT
   EqhCoNcsXS+ZKrklN/0=
DomainKey-Signature: a=rsa-sha1; c=nofws; q=dns; s=k1; d=catycre.bid;
 b=b7JUM9W05he1EmOFUqBuFhZcbdqKcnnKZQIbJxvOi0pzK0zCvHNxPh3ccZtp2c2o+nhFyXSZFbU5
   NdhFvw0bX+hmxlkoRzXZTQSSRzm2zS6cHLpp7HKRwCinlSi/QEAqOdmUdjOnJ/8Tdfyam78XgeEi
   /QtleJy+C0Q5iqjbvO8=;
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="7ab664de9265f1c81aa0513c0339bcca_77b5_ce8f"
Date: Fri, 27 Apr 2018 11:51:41 -0400
From: "Cat Behaviorist**" <contact@catycre.bid>
Reply-To: "Cat Behaviorist**" <support@catycre.bid>
Subject: Help for Cat Lovers and Extremely Frustrated Owners
To: <christian.gabriel@ift-informatik.de>
Message-ID: <oiyo4le8q5pupaf9-8qhbfejyc5q0zmnx-ce8f@catycre.bid>

--7ab664de9265f1c81aa0513c0339bcca_77b5_ce8f
Content-Type: text/plain;
Content-Transfer-Encoding: 8bit

Help for Cat Lovers and Extremely Frustrated Owners
http://catycre.bid/Y_pZycCwtZwBDPrPMTB8FWNg-K3DwODsNmkJAA_31225_30645

http://catycre.bid/E_lZycCwtZwBDPrPMTB8FWNg-K3DwNBuvD8CAA_31225_30645

Alternatives to the command line include, but are not limited to text user interface menus (see IBM AIX SMIT for example), keyboard shortcuts, and various other desktop metaphors centered on the pointer (usually controlled with a mouse). Examples of this include the Windows versions 1, 2, 3, 3.1, and 3.11 (an OS shell that runs in DOS), DosShell, and Mouse Systems PowerPaCompared with a graphical user interface, a command line requires fewer system resources to implement. Since options to commands are given in a few characters in each command line, an experienced user finds the options easier to access. Automation of repetitive tasks is simplified - most operating systems using a command line interface support some mechanism for storing frequently used sequences in a disk file, for re-use; this may extend to a scripting language that can take parameters and variable options. A command-line history can be kept, allowing review or repetition of commands.A command-line system may require paper or online manuals for the user's reference, although often a "help" option provides a concise review of the options of a command. The command-line environment may not provide the graphical enhancements such as different fonts or extended edit windows found in a GUI. It may be difficult for a new user to become familiar with all the commands and options Operating system command-line interfaces
Operating system (OS) command line interfaces are usually distinct programs supplied with the operating system. A program that implements such a text interface is often called a command-line interpreter, command processor or shell.Examples of command-line interpreters include DEC's DIGITAL Command Language (DCL) in OpenVMS and RSX-11, the various Unix shells (sh, ksh, csh, tcsh, bash, etc.), the historical CP/M CCP, and MS-DOS/IBM-DOS/DR-DOS's COMMAND.COM, as well as the OS/2 and the Windows CMD.EXE programs, the latter groups being based heavily on DEC's RSX-11 and RSTS CLIs. Under most operating systems, it is possible to replace the default shell program with alternatives; examples include 4DOS for DOS, 4OS2 for OS/2, and 4NT or Take Co

--7ab664de9265f1c81aa0513c0339bcca_77b5_ce8f
Content-Type: text/html;
Content-Transfer-Encoding: 8bit

<html>
<head>
	<title></title>
</head>
<body><a href="http://catycre.bid/Y_hZycCwtZwBDPrPMTB8FWNg-K3DwJAjZBEHAA_31225_30645"><img src="http://catycre.bid/669b3709b76f76256f.jpg" /><img height="1" src="http://www.catycre.bid/4_tZycCwtZwBDPrPMTB8FWNg-K3DwLAzjl8EAA_31225_30645" width="1" /></a>
<center>
<div>
<table style="width:550px;">
	<tbody>
		<tr>
			<td><br />
			<a href="http://catycre.bid/Y_pZycCwtZwBDPrPMTB8FWNg-K3DwODsNmkJAA_31225_30645"><img src="http://catycre.bid/0c40ba6c03f5e27816.gif" /></a><br />
			<br />
			<strong>Dear Cat Lover </strong><br />
			<br />
			My name is Susie and I&#39;m a proud cat owner just like you And just like you, I know what a relationship with a cat means<br />
			<br />
			You&#39;re unconditionally loved, never judged, constantly entertained and endlessly forgiven But when things go wrong.they turn out very, very badly<br />
			<br />
			<a href="http://catycre.bid/Y_pZycCwtZwBDPrPMTB8FWNg-K3DwODsNmkJAA_31225_30645"><strong>You see, it was all fun and games between us until the real problems began</strong></a><br />
			&nbsp;
			<center>
			<div style="background-color:black;padding:10px;border:solid 1px red;"><a href="http://catycre.bid/Y_pZycCwtZwBDPrPMTB8FWNg-K3DwODsNmkJAA_31225_30645"><img src="http://catycre.bid/e5a8937360d0288f9c.png" /></a></div>
			</center>
			&quot;Would a dog be a better choice for me&quot;? Yet even so, I loved him dearly.because he was the only one that brought me joy<br />
			<br />
			<a href="http://catycre.bid/Y_pZycCwtZwBDPrPMTB8FWNg-K3DwODsNmkJAA_31225_30645"><strong>Until I discovered the one thing that changed everything forever.</strong></a><br />
			<br />
			And it all started.right inside my kitchen<br />
			<br />
			<strong>P.S</strong>. Two weeks ago, I wanted to test out some more I mean, I was really curious if I could make my cat avoid another area of the house, not just the kitchen.say, the living room <a href="http://catycre.bid/Y_pZycCwtZwBDPrPMTB8FWNg-K3DwODsNmkJAA_31225_30645"><strong>The result was.simply unbelievable</strong></a><br />
			<br />
			<br />
			<br />
			<span style="font-size:5px;color:#ffffff">Alternatives to the command line include, but are not limited to text user interface menus (see IBM AIX SMIT for example), keyboard shortcuts, and various other desktop metaphors centered on the pointer (usually controlled with a mouse). Examples of this include the Windows versions 1, 2, 3, 3.1, and 3.11 (an OS shell that runs in DOS), DosShell, and Mouse Systems PowerPaCompared with a graphical user interface, a command line requires fewer system resources to implement. Since options to commands are given in a few characters in each command line, an experienced user finds the options easier to access. Automation of repetitive tasks is simplified - most operating systems using a command line interface support some mechanism for storing frequently used sequences in a disk file, for re-use; this may extend to a scripting language that can take parameters and variable options. A command-line history can be kept, allowing review or repetition of commands.A command-line system may require paper or online manuals for the user&#39;s reference, although often a &quot;help&quot; option provides a concise review of the options of a command. The command-line environment may not provide the graphical enhancements such as different fonts or extended edit windows found in a GUI. It may be difficult for a new user to become familiar with all the commands and options Operating system command-line interfaces Operating system (OS) command line interfaces are usually distinct programs supplied with the operating system. A program that implements such a text interface is often called a command-line interpreter, command processor or shell.Examples of command-line interpreters include DEC&#39;s DIGITAL Command Language (DCL) in OpenVMS and RSX-11, the various Unix shells (sh, ksh, csh, tcsh, bash, etc.), the historical CP/M CCP, and MS-DOS/IBM-DOS/DR-DOS&#39;s COMMAND.COM, as well as the OS/2 and the Windows CMD.EXE programs, the latter groups being based heavily on DEC&#39;s RSX-11 and RSTS CLIs. Under most operating systems, it is possible to replace the default shell program with alternatives; examples include 4DOS for DOS, 4OS2 for OS/2, and 4NT or Take Co</span><br />
			<br />
			<br />
			&nbsp;
			<center><a href="http://catycre.bid/4_lZycCwtZwBDPrPMTB8FWNg-K3DwLA4Zr4-AA_31225_30645"><img src="http://catycre.bid/a0d92ad518724ec596.jpg" style=";" /></a></center>
			</td>
		</tr>
	</tbody>
</table>
</div>
</center>
</body>
</html>

--7ab664de9265f1c81aa0513c0339bcca_77b5_ce8f--

------------=_5AE3577E.8BF1CE71--


bypass 1.0, Devloped By El Moujahidin (the source has been moved and devloped)
Email: contact@elmoujehidin.net bypass 1.0, Devloped By El Moujahidin (the source has been moved and devloped) Email: contact@elmoujehidin.net