Note: I did not author this, i found it somehwere.
- Tools
- Most common paths to AD compromise
- [GPO - Pivoting with Local Admin
#import wget | |
import textract | |
# url = 'https://www.utcourts.gov/cal/data/SLC_Calendar.pdf' | |
# pdf = wget.download(url) | |
print "Processing pdf into text..." | |
pdf_text_raw = textract.process("SLC_Calendar.pdf") # Load text into list | |
print "Formatting..." | |
pdf_text_lines=pdf_text_raw.splitlines() # Convert '\n' into new lines |
#import wget | |
import textract | |
# url = 'https://www.utcourts.gov/cal/data/SLC_Calendar.pdf' | |
# pdf = wget.download(url) | |
print "Processing pdf into text..." | |
pdf_text_raw = textract.process("SLC_Calendar.pdf") # Load text into list | |
print "Formatting..." | |
pdf_text_lines=pdf_text_raw.splitlines() # Convert '\n' into new lines |
## Based on https://download.seafile.com/d/320e8adf90fa43ad8fee/files/?p=/docker/pro-edition/docker-compose.yml | |
## See https://download.seafile.com/published/seafile-manual/docker/pro-edition/Deploy%20Seafile-pro%20with%20Docker.md | |
version: '2.0' | |
services: | |
db: | |
image: mariadb:10.5 | |
container_name: seafile-mysql | |
environment: | |
- MYSQL_ROOT_PASSWORD=db_dev # Requested, set the root's password of MySQL service. | |
- MYSQL_LOG_CONSOLE=true |
Note: I did not author this, i found it somehwere.
Lost in Translation - A repository of the leaked tools
MS17-010 - Port of some of the exploits to Windows 10