1. install
brew install tor
brew install privoxy
2. copy and modify config file
| whoami & hostname & ipconfig /all & net user /domain 2>&1 & net group /domain 2>&1 & net group "domain admins" /domain 2>&1 & net group "Exchange Trusted Subsystem" /domain 2>&1 & net accounts /domain 2>&1 & net user 2>&1 & net localgroup administrators 2>&1 & netstat -an 2>&1 & tasklist 2>&1 & sc query 2>&1 & systeminfo 2>&1 & reg query "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Default" 2>&1 |
| #!/bin/bash | |
| #$1 numparts, #$2 url | |
| #Get length | |
| TL=$(curl -sI $2 | grep Content-Length | awk '{printf "%d", $2}') | |
| echo "$s is $TL Bytes Long” | |
| #GetChunks | |
| for i in `seq 0 $(( $1 - 1 ))`; | |
| do |
| #!/usr/bin/env bash | |
| # | |
| # For latest Android Nexus devices (N5x, N6p, N9, etc.), Google is no longer | |
| # providing vendor tar archives to included into AOSP build trees. Oficially | |
| # it is claimed that all vendor proprietary blobs have been moved to /vendor | |
| # partition. Unfortunately that is not true since a few vendor executables, DSOs | |
| # and APKs/JARs are present under /system although missing from AOSP public tree. | |
| # | |
| # As such custom AOSP builds require to first extract such blobs from /system of | |
| # factory images and manually include them in vendor directory of AOSP tree. |
| import sys | |
| ps_shellcode = '@(' | |
| with open(sys.argv[1], 'rb') as shellcode: | |
| byte = shellcode.read(1) | |
| while byte != '': | |
| ps_shellcode += '0x{}, '.format(byte.encode('hex')) | |
| byte = shellcode.read(1) |
| #md5 hash of most used password 123456 | |
| #ref: https://twitter.com/TekDefense/status/294556153151647744 | |
| https://github.com/search?q=e10adc3949ba59abbe56e057f20f883e&type=Code&ref=searchresults | |
| #DB_PASSWORD | |
| #ref: http://seclists.org/fulldisclosure/2014/Mar/343 | |
| https://github.com/search?q=define%28%22DB_PASSWORD%22&type=Code&ref=searchresults | |
| #Possible SQL injection | |
| #ref: http://seclists.org/fulldisclosure/2013/Jun/15 |
| #! /usr/bin/env python | |
| from configobj import ConfigObj | |
| import sys | |
| import StringIO | |
| import re | |
| from pprint import pprint | |
| if len(sys.argv) < 3: | |
| print 'Usage: ducky-convert.py <keyboard.properties> <layout.properties>' |
| #!/system/bin/sh | |
| set -u | |
| ## ======================================================================================== | |
| ## alfred : manages an ArchLinux rootfs for enable LXC usage on Android | |
| ## ======================================================================================== | |
| PROGNAME="alfred" | |
| PROGVERS="0.0.6" | |
| PROGCONF="/data/$PROGNAME" | |
| PROGHELP="Usage: $PROGNAME [cmd] |
1. install
brew install tor
brew install privoxy
2. copy and modify config file
| /* | |
| * reversed SafeArrayRedim() in oldaut32.dll (Windows XP) | |
| * for CVE-2014-6332 | |
| */ | |
| typedef struct tagSAFEARRAY | |
| { | |
| USHORT cDims; // number of dimensions | |
| USHORT fFeatures; // type of elements | |
| ULONG cbElements; // byte size per element |
Each of these commands will run an ad hoc http static server in your current (or specified) directory, available at http://localhost:8000. Use this power wisely.
$ python -m SimpleHTTPServer 8000