经过实践,发现需要使用旧的genymotion 版本,如2.12.2, 应该 3.3.0 版本以下的都可以。
本地的adb 版本可能与 genymotion 自带的adb 版本不兼容,可以将本地的adb拷贝到genymotion tools 目录下
#!/bin/bash | |
################################################################################ | |
# | |
# UNIX域Socket抓包 | |
# | |
# 作者:RToax | |
# 时间:2020年11月9日 | |
# tips:多次测试时,会出现“Address already in use”问题,使用-p参数修改端口即可 | |
# 测试时先启动server,接着undump.sh,接着客户端连接通话 |
#Program Name :- Windows Auditor Based on CIS Benchmark | |
#Program Name :- Windows Auditor Based on CIS Benchmark | |
#Benchmark File used :- CIS_Microsoft_Windows_Server_2012_Benchmark_v1.0.0 | |
#Author : Kaustubh Padwad | |
#copyright : copyright (c) 2015 Kaustubh Padwad | |
#Licnse :- Gnu-GPL-3 | |
Set-ExecutionPolicy -ExecutionPolicy restricted -force | |
echo "1 Checks for Computer Configuration" | |
echo "1.1 Security Settings" | |
echo "1.1.1 Account Policies" > audit.txt |
<# | |
Spect | |
# # # # # # # # # | |
# # # # # # | |
# # # # # # # | |
# # # # # # # # | |
# # # # # # # | |
beta version | |
Author : A-mIn3 |
# -*- coding: utf-8 -*- | |
from termcolor import colored | |
import time | |
import MySQLdb | |
import pymongo | |
import socket | |
import ftplib | |
import optparse | |
from termcolor import colored |
#Author:D4Vinci | |
def ip2long(ip): | |
ip = ip.split("/")[0].split(":")[0] | |
p = ip.split(".") | |
return str( ( ( ( ( int(p[0]) * 256 + int(p[1]) ) * 256 ) + int(p[2]) ) * 256 ) + int(p[3])) | |
#p[0] + "." + str( ( ( ( int( p[1] ) * 256 + int( p[2] ) ) * 256 ) + int( p[3] ) ) * 256 ), | |
#p[0] + "." + p[1] + str( ( int( p[2] ) *256 ) + int( p[3] ) ) | |
def ip2hex(ip): |
#!/usr/bin/perl -w | |
use Getopt::Long; | |
use Tie::File; | |
my $version=2014102301; | |
print "\t\t\tWeb log forensics\n"; | |
print "\t\t\tby Xti9er\n"; | |
$|=1; |
/* | |
[] Shellcode Generator null byte free. [] | |
[] Author: certaindeath [] | |
[] Site: certaindeath.netii.net (at the moment under construction) [] | |
[] This program generates a shellcode which uses the stack to store the command (and its arguments). [] | |
[] Afterwords it executes the command with the system call "execve". [] | |
[] The code is a bit knotty, so if you want to understand how it works, I've added an example of assembly at the end. [] | |
*/ | |
#include <stdio.h> | |
#include <stdlib.h> |
<?php | |
/** | |
* PHP 富文本XSS过滤类 | |
* | |
* @package XssHtml | |
* @version 1.0.0 | |
* @link http://phith0n.github.io/XssHtml | |
* @since 20140621 | |
* @copyright (c) Phithon All Rights Reserved | |
* |
#/usr/bin/env python3.4 | |
#Analyse the /etc/auth.log files to get | |
# 1) how many failed login trials | |
# 2) how many succeeded login trials | |
# 3) how many IP's where the login trials comes from and what they are | |
# 4) how many invalid usernames are tested and what they are | |
# | |
# usage: | |
# analyse <filename> | |
# note: - for standard input stream |