start new:
tmux
start new with session name:
tmux new -s myname
<?php session_start(); ?> | |
<?php | |
if (empty($_SESSION['path'])) { | |
$_SESSION['user'] = shell_exec('whoami'); | |
$_SESSION['host'] = shell_exec('hostname'); | |
$_SESSION['path'] = dirname(__FILE__); | |
} | |
function showInfo($cmd) { | |
$user = $_SESSION['user']; |
" _ _ " | |
" _ /|| . . ||\ _ " | |
" ( } \||D ' ' ' C||/ { % " | |
" | /\__,=_[_] ' . . ' [_]_=,__/\ |" | |
" |_\_ |----| |----| _/_|" | |
" | |/ | | | | \| |" | |
" | /_ | | | | _\ |" | |
It is all fun and games until someone gets hacked! |
AdobeTracking.pageName = 'Mr. Robot : S2 Easter Egg Sites : Ransomware : Home';
On load, this page displays a countdown timer starting at 24:00:00. When time is over, the following "hidden" message is revealed:
sudo apt-get update | |
sudo apt-get install lua5.1 alsa-utils triggerhappy curl libcurl3 | |
wget http://archive.raspberrypi.org/debian/pool/main/r/raspi-config/raspi-config_20160322_all.deb | |
wget http://archive.raspberrypi.org/debian/pool/main/r/rpi-update/rpi-update_20140705_all.deb | |
dpkg -i raspi-config_20160322_all.deb | |
dpkg -i rpi-update_20140705_all.deb |
OPENSSH=/opt/openssh2 | |
mkdir -p /opt/openssh2/dist/ | |
cd ${OPENSSH} | |
wget http://zlib.net/zlib-1.2.11.tar.gz | |
tar xvfz zlib-1.2.11.tar.gz | |
cd zlib-1.2.11 | |
./configure --prefix=${OPENSSH}/dist/ && make && make install | |
cd ${OPENSSH} | |
wget http://www.openssl.org/source/openssl-1.0.1e.tar.gz | |
tar xvfz openssl-1.0.1e.tar.gz |
#!/bin/sh | |
# | |
# Run this script on relay_server to connect shared session | |
# | |
read -p "Port number: " relay_port | |
socat file:`tty`,raw,echo=0 tcp-connect:localhost:${relay_port} |
#To create a classic TCP listening daemon, similar to netcat -l, use a variation of the following command. | |
socat TCP-LISTEN:8080 stdout | |
#use remotly a command shell | |
socat TCP4-LISTEN:1234,reuseaddr,fork 'SYSTEM:/bin/cat /home/infos.txt' | |
#sslify a server | |
socat OPENSSL-LISTEN:443,reuse‐addr,pf=ip4,fork,cert=server.pem,cafile=client.crt TCP4-CONNECT:localhost:80 | |
# Version : 1.0 | |
# Author : Nitish Bhardwaj | |
# Description : This Script file contains some shell script quick hacks. | |
#Check below links to get basics | |
#http://linuxconfig.org/linux-commands | |
#http://www.thegeekstuff.com/2010/11/50-linux-commands/ | |
#http://www.makeuseof.com/tag/an-a-z-of-linux-40-essential-commands-you-should-know/ | |
deb http://kali.cs.nctu.edu.tw/ /kali main contrib non-free | |
deb http://kali.cs.nctu.edu.tw/ /wheezy main contrib non-free | |
deb http://kali.cs.nctu.edu.tw/kali kali-dev main contrib non-free | |
deb http://kali.cs.nctu.edu.tw/kali kali-dev main/debian-installer | |
deb-src http://kali.cs.nctu.edu.tw/kali kali-dev main contrib non-free | |
deb http://kali.cs.nctu.edu.tw/kali kali main contrib non-free | |
deb http://kali.cs.nctu.edu.tw/kali kali main/debian-installer | |
deb-src http://kali.cs.nctu.edu.tw/kali kali main contrib non-free | |
deb http://kali.cs.nctu.edu.tw/kali-security kali/updates main contrib non-free | |
deb-src http://kali.cs.nctu.edu.tw/kali-security kali/updates main contrib non-free |