Keybase proof
I hereby claim:
- I am 7h3rAm on github.
- I am 7h3ram (https://keybase.io/7h3ram) on keybase.
- I have a public key whose fingerprint is A3EA 7604 D7B5 F3E7 2E3D 62DB C33E 669B 327D 884A
To claim this, I am signing this object:
TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA | |
AAAAEAEAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4gaW4gRE9TIG1v | |
ZGUuDQ0KJAAAAAAAAABD0tByB7O+IQezviEHs74hE9i6IBKzviET2L0gCbO+IRPYuyC8s74hE9i/ | |
IASzviEHs78hYbO+IWXLQyEPs74hZcu7IC6zviFly7ogFbO+IWXLvSANs74hhsq7IAizviGGyrog | |
N7O+IYbKvSAAs74hhsq+IAazviGGyrwgBrO+IVJpY2gHs74hAAAAAAAAAABQRQAAZIYGADmYTmIA | |
AAAAAAAAAPAAIgALAg4fAEYaAABaCAAAAAAASLcXAAAQAAAAAABAAQAAAAAQAAAAAgAABgAAAAAA | |
AAAGAAAAAAAAAADwIgAABAAAHXAhAAIAYIEAABAAAAAAAAAQAAAAAAAAAAAQAAAAAAAAEAAAAAAA | |
AAAAAAAQAAAAQHUcAIDCAADANx0AKAAAAAAAAAAAAAAAAPAhAGC3AABg+yAAmBUAAADAIgDUIAAA | |
cOIbABwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAw4RsAQAEAAAAAAAAAAAAAAGAaAPACAAAA | |
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAudGV4dAAAAIVFGgAAEAAAAEYaAAAEAAAAAAAAAAAAAAAA |
{ | |
"name": "CIS MITRE ATT&CK Controls v1", | |
"version": "2.1", | |
"domain": "mitre-enterprise", | |
"description": "", | |
"filters": { | |
"stages": [ | |
"act" | |
], | |
"platforms": [ |
#!/usr/bin/env python3 | |
import requests | |
proxies = { | |
"http": "socks5h://localhost:9050", | |
"https":"socks5h://localhost:9050" | |
} | |
def get_public_ip(usetor=False): |
#!/usr/bin/env python | |
# Dependencies: | |
# - arrow | |
# - shodan | |
# - ImageMagick | |
# | |
# Installation: | |
# sudo easy_install arrow shodan | |
# sudo apt-get install imagemagick | |
# |
I hereby claim:
To claim this, I am signing this object:
#!/usr/bin/env bash | |
SAMPLESDIR="$1" | |
TMPFILE="/tmp/sha256sum" | |
EXT="sample" | |
MOVE=false | |
sha256sum "$SAMPLESDIR"/* >"$TMPFILE" | |
while read line; do | |
SHA256=$(echo $line | tr -s " " | cut -d" " -f1) |
alias radio_news="mplayer -playlist http://minnesota.publicradio.org/tools/play/streams/news.pls" # MPR News | |
alias radio_current="mplayer -playlist http://minnesota.publicradio.org/tools/play/streams/the_current.pls" # The Current | |
alias radio_classical="mplayer -playlist http://minnesota.publicradio.org/tools/play/streams/classical.pls" # Classical MPR | |
alias radio_localcurrent="mplayer -playlist http://minnesota.publicradio.org/tools/play/streams/local.pls" # Local Current | |
alias radio_heartland="mplayer -playlist http://minnesota.publicradio.org/tools/play/streams/radio_heartland.pls" # MPR Radio Heartland | |
alias radio_defcon="mplayer http://sfstream1.somafm.com:6200/" | |
alias radio_radiopecs="mplayer http://80.237.154.83:8120" | |
alias radio_wonderground="mplayer http://wondergroundstream2.publicradio.org/wonderground" # MPR Wonderground Windows Media | |
alias radio_choral="mplayer -playlist http://choralstream1.publicradio.org/choral.m3u" # Clasical MPR Choral | |
alias radio_wefunk="mplayer -playlist http://www.wefunkr |
# remove password from a pdf file (if password is already known): | |
qpdf --decrypt --password=<password> infile outfile.pdf | |
# extract pages from a pdf file: | |
pdftk infile cat 3-6 output outfile.pdf | |
# merge pdfs: | |
pdftk *.pdf cat output outfile.pdf | |
# convert jpg to pdf: |
I hereby claim:
To claim this, I am signing this object:
var out = []; | |
var pm = PasswordManager.getInstance(); | |
var model = pm.savedPasswordsList_.dataModel; | |
console.log(model); | |
var pl = pm.savedPasswordsList_; | |
for (var i = 0; i < model.length; i++) { | |
PasswordManager.requestShowPassword(i); | |
} | |
alert('After you press Ok results should appear in ~5 seconds.\n' + | |
"If password fields are empty, try increasing the timeout in the last line," + |