Skip to content

Instantly share code, notes, and snippets.

https://falcon.crowdstrike.com/spotlight-v2/vulnerabilities/group-by/cve?filter=status%3A!%27closed%27%2Bcve.id%3A%27CVE-2021-27104%27%2Bcve.id%3A%27CVE-2021-27102%27%2Bcve.id%3A%27CVE-2021-27101%27%2Bcve.id%3A%27CVE-2021-27103%27%2Bcve.id%3A%27CVE-2021-21017%27%2Bcve.id%3A%27CVE-2021-28550%27%2Bcve.id%3A%27CVE-2018-4939%27%2Bcve.id%3A%27CVE-2018-15961%27%2Bcve.id%3A%27CVE-2018-4878%27%2Bcve.id%3A%27CVE-2020-5735%27%2Bcve.id%3A%27CVE-2019-2215%27%2Bcve.id%3A%27CVE-2020-0041%27%2Bcve.id%3A%27CVE-2020-0069%27%2Bcve.id%3A%27CVE-2017-9805%27%2Bcve.id%3A%27CVE-2021-42013%27%2Bcve.id%3A%27CVE-2021-41773%27%2Bcve.id%3A%27CVE-2019-0211%27%2Bcve.id%3A%27CVE-2016-4437%27%2Bcve.id%3A%27CVE-2019-17558%27%2Bcve.id%3A%27CVE-2020-17530%27%2Bcve.id%3A%27CVE-2017-5638%27%2Bcve.id%3A%27CVE-2018-11776%27%2Bcve.id%3A%27CVE-2021-30858%27%2Bcve.id%3A%27CVE-2019-6223%27%2Bcve.id%3A%27CVE-2021-30860%27%2Bcve.id%3A%27CVE-2020-27930%27%2Bcve.id%3A%27CVE-2021-30807%27%2Bcve.id%3A%27CVE-2020-27950%27%2Bcve.id%3A%27CVE-2020-27932%27%2Bcv
https://falcon.crowdstrike.com/spotlight-v2/vulnerabilities/group-by/cve?filter=status%3A!%27closed%27%2Bcve.id%3A%27CVE-2021-27104%27%2Bcve.id%3A%27CVE-2021-27102%27%2Bcve.id%3A%27CVE-2021-27101%27%2Bcve.id%3A%27CVE-2021-27103%27%2Bcve.id%3A%27CVE-2021-21017%27%2Bcve.id%3A%27CVE-2021-28550%27%2Bcve.id%3A%27CVE-2018-4939%27%2Bcve.id%3A%27CVE-2018-15961%27%2Bcve.id%3A%27CVE-2018-4878%27%2Bcve.id%3A%27CVE-2020-5735%27%2Bcve.id%3A%27CVE-2019-2215%27%2Bcve.id%3A%27CVE-2020-0041%27%2Bcve.id%3A%27CVE-2020-0069%27%2Bcve.id%3A%27CVE-2017-9805%27%2Bcve.id%3A%27CVE-2021-42013%27%2Bcve.id%3A%27CVE-2021-41773%27%2Bcve.id%3A%27CVE-2019-0211%27%2Bcve.id%3A%27CVE-2016-4437%27%2Bcve.id%3A%27CVE-2019-17558%27%2Bcve.id%3A%27CVE-2020-17530%27%2Bcve.id%3A%27CVE-2017-5638%27%2Bcve.id%3A%27CVE-2018-11776%27%2Bcve.id%3A%27CVE-2021-30858%27%2Bcve.id%3A%27CVE-2019-6223%27%2Bcve.id%3A%27CVE-2021-30860%27%2Bcve.id%3A%27CVE-2020-27930%27%2Bcve.id%3A%27CVE-2021-30807%27%2Bcve.id%3A%27CVE-2020-27950%27%2Bcve.id%3A%27CVE-2020-27932%27%2Bcv
#!/bin/sh
iBossVersion=`grep "plist version" /Library/LaunchDaemons/com.iboss.gen4agent.plist | cut -f 2 -d \"`
echo "<result>$iBossVersion</result>"
<?xml version="1.0" encoding="utf-8"?>
<LayoutModificationTemplate
xmlns="http://schemas.microsoft.com/Start/2014/LayoutModification"
xmlns:defaultlayout="http://schemas.microsoft.com/Start/2014/FullDefaultLayout"
xmlns:start="http://schemas.microsoft.com/Start/2014/StartLayout"
xmlns:taskbar="http://schemas.microsoft.com/Start/2014/TaskbarLayout"
Version="1">
<LayoutOptions StartTileGroupCellWidth="6" StartTileGroupsColumnCount="1" />
<DefaultLayoutOverride LayoutCustomizationRestrictionType="OnlySpecifiedGroups">
<StartLayoutCollection>
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
<plist version="1.0">
<dict>
<key>password</key>
<string>hashedvaluehere</string>
<key>workflows</key>
<array>
<dict>
<key>components</key>
@amandaw33
amandaw33 / com.adobe.Acrobat.Pro.plist
Last active February 10, 2022 17:37
Acrobat Pro DC plist to disable updating, cloud services etc - more info on keys: http://www.adobe.com/devnet-docs/acrobatetk/tools/PrefRef/Macintosh/Workflows.html
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
<plist version="1.0">
<dict>
<key>DC</key>
<dict>
<key>FeatureLockdown</key>
<dict>
<key>bUpdater</key>
<false/>