- Allow
colima start
to run without password:
cat <<-EOF | sudo tee /private/etc/sudoers.d/colima
%admin ALL=NOPASSWD: /bin/rm -rf /var/run/docker.sock
%admin ALL=NOPASSWD: /bin/ln -s $HOME/.colima/docker.sock /var/run/docker.sock
EOF
#!/usr/bin/env python3 | |
"""Shell Detector v1.2 | |
A tool for detecting malicious PHP/ASP shells and suspicious code patterns. | |
Released under the MIT License <http://www.opensource.org/licenses/mit-license.php> | |
This tool scans directories for potential web shells and malicious code by: | |
1. Pattern matching against known suspicious functions | |
2. Comparing files against a database of known shell signatures | |
3. Analyzing file permissions and metadata |
{ | |
"Use Non-ASCII Font" : false, | |
"Tags" : [ | |
], | |
"Ansi 12 Color" : { | |
"Green Component" : 0.64410710334777832, | |
"Blue Component" : 0.95445334911346436, | |
"Red Component" : 0.32856267690658569 | |
}, |
ts-message:hover:not(.standalone):not(.multi_delete_mode):not(.highlight) { | |
background: #353535; | |
} | |
ts-message { | |
font-size: .8375rem !important; | |
} | |
#col_channels, | |
#team_menu, |
sudo chown -R $(whoami) $(brew --prefix)/* |
sudo chown -R $(whoami) $(brew --prefix)/* |
sudo chown -R "$USER" "$(brew --prefix)/Cellar" |
class C | |
def initialize | |
@store = {} | |
yield self | |
end | |
def set key, value | |
value = value.call if value.is_a? Proc | |
@store[key] = value |
defmodule Encryptor do | |
def rot13(string) do | |
string | |
|> String.to_char_list | |
|> Enum.map(fn ch -> case ch do | |
ch when (ch >= ?a) and (ch <= ?z) -> ?a + rem(ch - ?a + 13, 26) | |
ch when (ch >= ?A) and (ch <= ?Z) -> ?A + rem(ch - ?A + 13, 26) | |
_ -> ch | |
end | |
end) |