- Change password (default password: default_admin_passwords)
- Change user (default user: esonhugh)
- Change ingress host name to your team server
- Deploy it!
kubectl apply -f deployment-service.yaml -f ingress.yaml -f configmap.yaml # -n <change namespace you deploy>
- use
pipx install git+https://github.com/exploide/bloodhound-cli.git
4U612-DN31H-MJEJ0-0V0Z4-978HD | |
5G44H-ACH50-0J4C9-1VC5P-CY0QD | |
JC000-8G047-MJDF1-0H3E6-8QR5F | |
JV2NU-0XL5N-0J4Q8-0T0E6-8GH56 | |
JZ6E0-4R1E0-HJ1Q0-1R8NH-3AK28 | |
0Z48K-4X29Q-MJE80-113GK-C7K3A | |
HF4H0-46K80-MJ8D9-1KAZP-CKK12 | |
NY69H-2N05P-HJ170-1V1ZM-CG222 | |
4C45A-D8J0H-HJ5T0-1T25H-92A76 | |
0Z4H2-0WK9K-4JE10-0T9G6-9C8M4 |
- Disable or uninstall the official
C/C++ plugin
. - Install the
clangd
plugin. - Build the kernel with
clang
:
/path/to/kernel_source$ make CC=clang defconfig
/path/to/kernel_source$ make CC=clang -j16
- Generate the
compile_commands.json
:
/path/to/kernel_source$ python ./scripts/clang-tools/gen_compile_commands.py
Install VMWare Workstation PRO 17 (Read it right. PRO!) | |
Also, these keys might also work with VMWare Fusion 13 PRO. Just tested it. | |
Sub to me on youtube pls - PurpleVibe32 | |
if you want more keys - call my bot on telegram. @purector_bot (THE BOT WONT REPLY ANYMORE) - Or: https://cdn.discordapp.com/attachments/1040615179894935645/1074016373228978277/keys.zip - the password in the zip is 102me. | |
--- | |
This gist can get off at any time. | |
PLEASE, DONT COPY THIS. IF YOU FORK IT, DONT EDIT IT. | |
*If you have a problem comment and people will try to help you! | |
*No virus |
—– BEGIN LICENSE —– | |
Mifeng User | |
Single User License | |
EA7E-1184812 | |
C0DAA9CD 6BE825B5 FF935692 1750523A | |
EDF59D3F A3BD6C96 F8D33866 3F1CCCEA | |
1C25BE4D 25B1C4CC 5110C20E 5246CC42 | |
D232C83B C99CCC42 0E32890C B6CBF018 | |
B1D4C178 2F9DDB16 ABAA74E5 95304BEF | |
9D0CCFA9 8AF8F8E2 1E0A955E 4771A576 |
I encountered a situation where the target running PAN-OS was vulnerable to CVE-2017-15944 but I was unable to exploit it using Metasploit.
One of the techniques of exploiting CVE-2017-15944 exploit, is to create a file under /opt/pancfg/mgmt/logdb/traffic/1/* which gets processed by the cron job (/etc/cron.d/indexgen -> /usr/local/bin/genindex_batch.sh). Metasploit uses this technique.
The article at https://tinyhack.com/2019/01/10/alternative-way-to-exploit-cve-2017-15944-on-pan-os-6-1-0/ mentions that it might be impossible to exploit CVE-2017-15944 as the script is already running. The article mentions that the cron job (/etc/cron.d/core_compress -> /usr/local/bin/core_compress) is also vulnerable to command injection.
sudo pacman -Syu zsh
You do not need to install manjaro-zsh-config
and all the other related packages like zsh-syntax-highlighting
, zsh-history-substring-search
, zsh-autosuggestions
, etc., as we will use Oh My Zsh.
sudo pacman -S gdb
sudo pacman -S pwndbg
echo 'source /usr/share/pwndbg/gdbinit.py' >> ~/.gdbinit
If you are getting the following error "Cannot find Pwndbg virtualenv directory: /usr/share/pwndbg/.venv: please re-run setup.sh", do the following steps, otherwise ignore:
# Android Debug Bridge (adb) interactive shell should be used to change these settings. | |
# Since the 'settings' shell command only exists on Android 4.2 or newer versions of Android, even if the SettingsProvider has the key/value pairs, there is no way for legacy OS prior to Android 4.2 to change these with the command specified in this shell snippet. | |
# See https://android.googlesource.com/platform/frameworks/base/+/master/core/java/android/provider/Settings.java for latest SettingsProvider key/value pairs. | |
# See https://android.googlesource.com/platform/frameworks/base/+/refs/tags/android-$(Android_Version_Code)_r$(Android_Version_Revision_Code)/core/java/android/provider/Settings.java for SettingsProvider key/value pairs for a specific version of Android. Android Version Code and Android Version Revision Code could be found at https://android.googlesource.com/platform/frameworks/base/+refs . | |
# Specifies the device's UTC system clock and date should be set automatically from sources like NITZ, GNSS or NTP. |