• 5ffd57393a85553ab55b
• 5cd28e2a812e5c65c9f7320e0726da18
• b6a6676a84b51c8200d0673a5b4a87c5
The quotes on this page come from this deleted question on Stackoverflow:
| FCKGW-RHQQ2-YXRKT-8TG6W-2B7Q8 | |
| Windows XP PRO Corporate serial number S/N: Key: MQPWW-PGVKX-YPMKG-8DH3G-KC8PW | |
| windows xp home edition serial number S/N: 034634-262024-171505-828316-729010-413531-800424-400442 | |
| Windows XP 64 serial number S/N: B2RBK-7KPT9-4JP6X-QQFWM-PJD6G | |
| Windows XP serial number S/N: K6C2K-KY62K-DQR84-RD4QV-QB74Q | |
| Windows XP Professional 64-bit Corporate Edition 5.2.3790.1830 serial number S/N: VCFQD-V9FX9-46WVH-K3CD4-4J3JM | |
| Microsoft Windows XP Professional SP2 serial number S/N: YY8F2-3CKVQ-RKTRG-6JMDR-9DTG6 | |
| Windows XP Professional Service Pack 1 sp1 serial number S/N: F46YY - 2R8VQ - R8GMY - 926VK - 6BQ73 | |
| Windows XP Pro serial number S/N: KBWR7-76BD8-J7MDQ-KKG&C-V9Q2J |
The quotes on this page come from this deleted question on Stackoverflow:
| #!/bin/bash | |
| mkdir -p ~/Pictures/Wallpapers/unsplash | |
| rm -f ~/Pictures/Wallpapers/unsplash/"$(date +%F)".png | |
| curl -s -L -o ~/Pictures/Wallpapers/unsplash/"$(date +%F)".png "https://unsplash.it/2560/1600/?random" > /dev/null | |
| osascript -e "tell application \"System Events\" to set picture of every desktop to \"~/Pictures/Wallpapers/unsplash/$(date +%F).png\"" | |
| killall Dock |
| #!/bin/bash | |
| ########################################## | |
| # 2015 Mike Piekarski | |
| # mike [-at-] automagine [-dot-] com | |
| # Automagine, LLC | |
| # -- | |
| # Greppable NMAP to CSV parser | |
| # -- | |
| # A simple way to convert one or more gnmap files into a csv | |
| # -- |
| #!/usr/bin/env python | |
| import os | |
| import sys | |
| import json | |
| import urllib | |
| import urllib2 | |
| import hashlib | |
| import argparse | |
| from slacker import Slacker |
| del %WINDIR%\perfc.* /f | |
| echo > %WINDIR%\perfc | |
| echo > %WINDIR%\perfc.dat | |
| echo > %WINDIR%\perfc.dll | |
| attrib +R %WINDIR%\perfc.* | |
| echo DONE |
| <!-- | |
| This is a Microsoft Sysmon configuation to be used on Windows server systems | |
| v0.2.1 December 2016 | |
| Florian Roth | |
| The focus of this configuration is | |
| - hacking activity on servers / lateral movement (bad admin, attacker) | |
| It is not focussed on | |
| - malware detection (execution) | |
| - malware detection (network connections) |
| <!-- | |
| This is a Microsoft Sysmon configuration to be used on Windows workstations | |
| v0.2.1 December 2016 | |
| Florian Roth (with the help and ideas of others) | |
| The focus of this configuration is | |
| - malware detection (execution) | |
| - malware detection (network connections) | |
| - exploit detection | |
| It is not focussed on |