vim ~/.zshrc
export GOPATH="/Users/xxxx/code/golang"
export GOBIN="$GOPATH/bin"
export PATH="$PATH:$GOBIN"
from colorama import init | |
from colorama import Fore, Back, Style | |
init() | |
def sprint(msg): | |
print(Fore.GREEN + msg + Style.RESET_ALL) | |
Style.RESET_ALL | |
def fprint(msg): | |
print(Fore.RED + msg + Style.RESET_ALL) |
package main | |
import ( | |
"flag" | |
"fmt" | |
"log" | |
"os" | |
"strings" | |
) |
package main | |
import ( | |
"fmt" | |
"os" | |
) | |
func main(){ | |
args := os.Args | |
fmt.Printf("args:%s\n",args) |
package main | |
import ( | |
"fmt" | |
"log" | |
"runtime" | |
) | |
const info = ` | |
Application %s starting. |
export ALL_PROXY=socks5://127.0.0.1:1080 | |
unset ALL_PROXY | |
curl -i https://ip.cn |
Today I will exploit the vulnerable image which called "FourAndSix2". Here is the url to download this image: https://www.vulnhub.com/entry/fourandsix-201,266/. we need to import the image to vmware once we downloaded it. now here we go.
>> msfconsole
msf>> db_nmap 192.168.30.1/24
# app 的使用 | |
from utils.customlog import CustomLog | |
logger = CustomLog(__name__).getLogger() |