# basic port scan
sudo nmap -sS <target-ip>
# script scan port 80
sudo nmap -sV -sC -p 80 <target-ip>
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
############################# | |
### settings for i3-gaps: ### | |
############################# | |
# Set inner/outer gaps | |
#for_window [class="^.*"] border pixel 0 | |
gaps inner 12 | |
gaps outer 1 | |
# Additionally, you can issue commands with the following syntax. This is useful to bind keys to changing the gap size. |
Start port scanning and enumerating services.
# check if the box is up
ping <target-ip>
# run initial nmap scan
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# decoder.py by comradecheese | |
# dirty decoder of text files encoded by base16, base32 or base64 | |
# written for the TryHackMe Intro To Python / Scripting room challenges | |
# usage: python decoder.py <file> <count> <base> | |
# example: python decoder.py encodedflag.txt 50 64 | |
from base64 import * | |
import sys | |
def decodedata(): |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
command=/usr/share/i3blocks/$BLOCK_NAME | |
separator_block_width=15 | |
markup=none | |
[volume] | |
label=VOL | |
instance=Master | |
#instance=PCM | |
interval=30 | |
signal=10 |