start new:
tmux
start new with session name:
tmux new -s myname
<VirtualHost *> | |
ServerName example.com | |
WSGIDaemonProcess www user=max group=max threads=5 | |
WSGIScriptAlias / /home/max/Projekte/flask-upload/flask-upload.wsgi | |
<Directory /home/max/Projekte/flask-upload> | |
WSGIProcessGroup www | |
WSGIApplicationGroup %{GLOBAL} | |
Order deny,allow |
// XORCipher - Super simple encryption using XOR and Base64 | |
// | |
// Depends on [Underscore](http://underscorejs.org/). | |
// | |
// As a warning, this is **not** a secure encryption algorythm. It uses a very | |
// simplistic keystore and will be easy to crack. | |
// | |
// The Base64 algorythm is a modification of the one used in phpjs.org | |
// * http://phpjs.org/functions/base64_encode/ | |
// * http://phpjs.org/functions/base64_decode/ |
Each of these commands will run an ad hoc http static server in your current (or specified) directory, available at http://localhost:8000. Use this power wisely.
$ python -m SimpleHTTPServer 8000
/* | |
* reversed SafeArrayRedim() in oldaut32.dll (Windows XP) | |
* for CVE-2014-6332 | |
*/ | |
typedef struct tagSAFEARRAY | |
{ | |
USHORT cDims; // number of dimensions | |
USHORT fFeatures; // type of elements | |
ULONG cbElements; // byte size per element |
1. install
brew install tor
brew install privoxy
2. copy and modify config file
#!/system/bin/sh | |
set -u | |
## ======================================================================================== | |
## alfred : manages an ArchLinux rootfs for enable LXC usage on Android | |
## ======================================================================================== | |
PROGNAME="alfred" | |
PROGVERS="0.0.6" | |
PROGCONF="/data/$PROGNAME" | |
PROGHELP="Usage: $PROGNAME [cmd] |
#! /usr/bin/env python | |
from configobj import ConfigObj | |
import sys | |
import StringIO | |
import re | |
from pprint import pprint | |
if len(sys.argv) < 3: | |
print 'Usage: ducky-convert.py <keyboard.properties> <layout.properties>' |
#md5 hash of most used password 123456 | |
#ref: https://twitter.com/TekDefense/status/294556153151647744 | |
https://github.com/search?q=e10adc3949ba59abbe56e057f20f883e&type=Code&ref=searchresults | |
#DB_PASSWORD | |
#ref: http://seclists.org/fulldisclosure/2014/Mar/343 | |
https://github.com/search?q=define%28%22DB_PASSWORD%22&type=Code&ref=searchresults | |
#Possible SQL injection | |
#ref: http://seclists.org/fulldisclosure/2013/Jun/15 |
import sys | |
ps_shellcode = '@(' | |
with open(sys.argv[1], 'rb') as shellcode: | |
byte = shellcode.read(1) | |
while byte != '': | |
ps_shellcode += '0x{}, '.format(byte.encode('hex')) | |
byte = shellcode.read(1) |