# Process packets despite bad checksums.
redef ignore_checksums = T;
This will change significantly with Bro 2.2 when we have the file analysis
# file: merger.py | |
# based off: http://cmikavac.net/2011/07/09/merging-multiple-nessus-scans-python-script/ | |
# by: mastahyeti | |
import xml.etree.ElementTree as etree | |
import shutil | |
import os | |
first = 1 | |
for fileName in os.listdir("."): |
# Sexy Solarized Bash Prompt, inspired by "Extravagant Zsh Prompt" | |
# Customized for the Solarized color scheme by Sean O'Neil | |
if [[ $COLORTERM = gnome-* && $TERM = xterm ]] && infocmp gnome-256color >/dev/null 2>&1; then TERM=gnome-256color; fi | |
if tput setaf 1 &> /dev/null; then | |
tput sgr0 | |
if [[ $(tput colors) -ge 256 ]] 2>/dev/null; then | |
BASE03=$(tput setaf 234) | |
BASE02=$(tput setaf 235) | |
BASE01=$(tput setaf 240) |
{% macro form_field(field) -%} | |
{% set with_label = kwargs.pop('with_label', False) %} | |
{% set placeholder = '' %} | |
{% if not with_label %} | |
{% set placeholder = field.label.text %} | |
{% endif %} | |
<div class="control-group {% if field.errors %}error{% endif %}"> | |
{% if with_label %} | |
<label for="{{ field.id }}" class="control-label"> | |
{{ field.label.text }}{% if field.flags.required %} *{% endif %}: |
var serialport = require('node-serialport') | |
var sp = new serialport.SerialPort("/dev/ttyO3", { | |
parser: serialport.parsers.raw, | |
baud: 9600 | |
}) | |
sp.on('data', function(chunk) { | |
console.log(chunk.toString('hex'), chunk.toString(), chunk) | |
}) |
# Reset our signal handler | |
signal.signal(signal.SIGINT, signal.SIG_DFL) | |
target_bssid = raw_input('Enter a BSSID to perform an deauth attack (q to quit): ') | |
while target_bssid not in networks: | |
if target_bssid == 'q' : sys.exit(0) | |
raw_input('BSSID not detected... Please enter another (q to quit): ') | |
# Get our interface to the correct channel | |
print 'Changing ' + args.interface + ' to channel ' + str(networks[target_bssid][1]) | |
os.system("iwconfig %s channel %d" % (args.interface, networks[target_bssid][1])) | |
# Now we have a bssid that we have detected, let's get the client MAC |
use strict; | |
use LWP::UserAgent; | |
my $url = 'https://webauthentication.hogent.be/login.html'; | |
my @passwords = qw( insert passwords here o_O ); | |
my $ua = LWP::UserAgent->new(); | |
for( my $i = 0; $i < @passwords; $i++) { | |
my $user = sprintf("hgguest%02d", $i+1); |
#!/usr/bin/env python | |
#-*- coding:utf8 -*- | |
# paramiko の ProxyCommandの Sample | |
# ------------------------------------------------- | |
# | |
# ~/.ssh/config | |
# | |
# Host proxy-server | |
# User hoge |
#!/usr/bin/env python2 | |
# -*- coding: utf8; -*- | |
import json | |
import glob | |
import multiprocessing | |
import os | |
import sys | |
import time |
I get asked by people wanting to visit Iceland what they should do while they're there. Rather than re-type (and mostly forget) the whole thing I just give them a link to this.
...as if you didn't know how to use Google.