This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<?php | |
phpinfo(); | |
php?> |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/sh | |
# Script scans system using clamAV | |
# (c) 2023 bvi at moria.org | |
# v0.1.1 - typo cleanup | |
#check required files are present | |
if [ ! -f /usr/bin/clamscan ]; then | |
echo ERROR | |
echo clamscan binary not found: /usr/bin/clamscan |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
curl -s https://attack.mitre.org/campaigns/C0014/ | grep -oE 'T[0-9]{4}(\/[0-9]{3})?>' | sed 's/">//g' | sort | uniq |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
+----+------+----------------------------------------------------------------------------------------------+----------------+-----+----+ | |
| NO | Year | Attack Description | APT Group Name | Yes | No | | |
+----+------+----------------------------------------------------------------------------------------------+----------------+-----+----+ | |
| 1 | 2001 | Anna Kurnikova virus. Massive infections after opening the attachment | | | | | |
+----+------+----------------------------------------------------------------------------------------------+----------------+-----+----+ | |
| 2 | 2003 | SQL Slammer massive infections including DDoS attack effect against many servers | | | | | |
+----+------+----------------------------------------------------------------------------------------------+----------------+-----+----+ | |
| 3 | 2008 | Chanology Attack on Scientology website by Anonymou |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
%% These require the use of the bytefield package | |
Snippets are suitabel for inclusion in tha figure environment | |
%%IPv4 after Postel 1981 & Stevens 1993 | |
\centering | |
\begin{bytefield}{32} | |
\bitheader{0,3,4,7,8,15,16,23,24,31} \\ | |
\bitbox{4}{\tiny{Version}} & \bitbox{4}{\tiny{Header length}} & \bitbox{8}{TOS} & \bitbox{16}{Total Length} \\ | |
\bitbox{16}{Identification} &\bitbox{1}{\tiny 0} &\bitbox{1}{\tiny D\\F} | |
&\bitbox{1}{\tiny M\\F} & \bitbox{13}{Fragment Offset} \\ |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# easy case where /24 is the smallext allocation $1 is the number | |
$ echo 8192 | awk '{print 32-log($1)/log(2)}' | |
13 | |
$ echo 32 | awk '{print 32-log($1)/log(2)}' | |
5 | |
# this can be used to convert 1.2.4.0 8192 to 1.2.3.0/19 | |
$ echo 1.2.4.0 8192 | awk '{print $"/"32-log($2)/log(2)}' | |
1.2.3.0/19 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Copyright, Robert Donovan, LessonStudio, 2014 | |
# If you use this then tweet what you did with it @LessonStudio. | |
# This file takes one argument which is a file that you would like to split into two encrypted images. | |
# The original image can only be viewed by overlaying the two encrypted images. | |
# If printed on clear plastic, It can be very finicky to align the two images if the pixel count is too high. | |
# For best results keep the original image below 200x200 pixels and print as large as possible onto clear plastic to | |
# obtain the best results. | |
# You can go to higher resolutions but you then really have to be precise when aligning the two images. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
% requires fontawesome package for icon | |
%save old command | |
\let\orighref\href | |
%redefine the command without circular references | |
\renewcommand{\href}[2]{\orighref{#1}{{\small\faLink{}} #2}} | |
% generate a clickabel link with a link icon next to it. | |
\href{https://google.com}{moo} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
netsh wlan show profile name=WifiConnectionName key=clear |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
There's no \medium font size between \small and \large; you have \normalsize (which is the default font size). | |
The standard font size switches are: | |
\tiny, \scriptsize, \footnotesize, \small, \normalsize, \large, \Large, \LARGE, \huge, and \Huge. | |
You only need one font switch command inside the table and braces are not required since table forms a group, so you can simply say something like this: | |
\begin{table} | |
\small | |
\begin{tabular}{p{3.5cm}p{8cm}p{5cm}} |
NewerOlder