NOTE: Merged with openTAKpickList.
This is a list of web resources, hardware and software that can be used in conjunction with the Team Awareness Kit (TAK) platform.
NOTE: Merged with openTAKpickList.
This is a list of web resources, hardware and software that can be used in conjunction with the Team Awareness Kit (TAK) platform.
Aaltopituus | |
Aamu | |
Aamurusko | |
Aapa | |
Aapinen | |
Aaria | |
Aarni | |
Aatto | |
Aava | |
Aavistus |
Param( | |
[Parameter(Mandatory, Position = 0)] | |
[string]$HostDrive, | |
[Parameter(Mandatory, Position = 1)] | |
[string]$LocalDrive | |
) | |
# Script to map a host drive inside a Windows Docker Server Container | |
# You need to be an admin in the container for this to work. | |
# Use as .\map_host_drive C: X: |
//////// | |
// The vm module lets you run a string containing javascript code 'in | |
// a sandbox', where you specify a context of global variables that | |
// exist for the duration of its execution. This works more or less | |
// well, and if you're in control of the code that's running, and you | |
// have a reasonable protocol in mind// for how it expects a certain | |
// context to exist and interacts with it --- like, maybe a plug-in | |
// API for a program, with some endpoints defined for it that do | |
// useful domain-specific things --- your life can go smoothly. |
This brief tutorial will show you how to go about analyzing a raw binary firmware image in Ghidra.
I was recently interested in reversing some older Cisco IOS images. Those images come in the form of a single binary blob, without any sort of ELF, Mach-o, or PE header to describe the binary.
While I am using Cisco IOS Images in this example, the same process should apply to other Raw Binary Firmware Images.
This brief tutorial will show you how to go about analyzing a raw binary firmware image in Ghidra.
I was recently interested in reversing some older Cisco IOS images. Those images come in the form of a single binary blob, without any sort of ELF, Mach-o, or PE header to describe the binary.
While I am using Cisco IOS Images in this example, the same process should apply to other Raw Binary Firmware Images.
# Example configuration file for AIDE. | |
@@define DBDIR /home/lars/lib/aide | |
@@define LOGDIR /home/lars/lib/aide/logs | |
# The location of the database to be read. | |
database=file:@@{DBDIR}/aide.db.gz | |
# The location of the database to be written. | |
#database_out=sql:host:port:database:login_name:passwd:table |
#deb cdrom:[Ubuntu 16.04.2 LTS _Xenial Xerus_ - Release amd64 (20170215.2)]/ xenial main restricted | |
# See http://help.ubuntu.com/community/UpgradeNotes for how to upgrade to | |
# newer versions of the distribution. | |
deb http://us.archive.ubuntu.com/ubuntu/ xenial main restricted | |
# deb-src http://us.archive.ubuntu.com/ubuntu/ xenial main restricted | |
## Major bug fix updates produced after the final release of the | |
## distribution. | |
deb http://us.archive.ubuntu.com/ubuntu/ xenial-updates main restricted |
# ___ ___ __ __ | |
# / | __ ______/ (_) /_____/ / | |
# / /| |/ / / / __ / / __/ __ / | |
# / ___ / /_/ / /_/ / / /_/ /_/ / | |
# /_/ |_\__,_/\__,_/_/\__/\__,_/ | |
# | |
# Linux Audit Daemon - Best Practice Configuration | |
# /etc/audit/audit.rules | |
# | |
# Compiled by Florian Roth |
rule vba_hidden_from_editor { | |
strings: | |
$header_office = { D0 CF 11 E0 } | |
$has_macros = "\x0aDocument=" | |
$s1 = /\x0aDocument=.{3,1000}\x0d?\x0a\w{4,30}=(\{|"|[a-zA-Z])/ | |
$s2 = /\x0aDocument=This(Docume|Displa)[a-zA-Z](\x00.){10,}/ | |
condition: |