Check if your Perl stack is vulnerable to the OpenSSL « heartbleed » bug.
curl -s https://gist.githubusercontent.com/dolmen/10096474/raw/ssl-heartbleed-check.pl | perl
#!/bin/bash | |
# Commands to evaluate impact of xz installed via homebrew. | |
# Author: Olivier Mengué. | |
# Show info about xz bottle: | |
brew info xz | |
# Upgrade xz: | |
brew update |
Check if your Perl stack is vulnerable to the OpenSSL « heartbleed » bug.
curl -s https://gist.githubusercontent.com/dolmen/10096474/raw/ssl-heartbleed-check.pl | perl
<html> | |
<head> | |
<meta http-equiv="refresh" content="0; url=https://github.com/" /> | |
</head> | |
<body> | |
</body> |
:: Run with full administrator rights | |
netsh wlan export profile folder=. key=clear |
The MAC address of Raspberry Pi are in B8:27:EB:**:**:**
.
http://hwaddress.com/?q=Raspberry
# Scan the local network to put IPs in the ARP cache
nmap -sn -n $(route | sed -n '/^[1-9]/{s/ .*$//p;q}')/24 >/dev/null
# Look for Pi' MACs in the arp cache
arp -n | grep -i 'b8:27:eb:'
https://redis.com/blog/go-redis-official-redis-client/
curl https://gist.githubusercontent.com/dolmen/9f5b4b1892588a5a8948a7c8e116660b/raw/dafeeb86c5c1c1fe80499b0c652f218c3c69aebd/migrate-go-redis-v9.sh | bash
/* | |
kh-to-hashcat allows to convert an OpenSSH known_hosts hashed file to a | |
format that can be used with hashcat to recover hosts. | |
Note that as the know_hosts file usually contains multiple keys for each host | |
it is wise to filter the file to a single key type to filter redundant hashes. | |
Check this stat: | |
perl -nE '$c{$1}++ if /^\|1\|[^ ]+ ([^ ]+)/;END{say "$_: $c{$_}" for keys %c}' ~/.ssh/known_hosts |
Hacks below use goproc to experiment with Go templates from the command-line.
$ echo false | goproc -e '{{.}} => {{index "....\001\000" (len (print .))}}{{"\n"}}'
false => 0
$ echo true | goproc -e '{{.}} => {{index "....\001\000" (len (print .))}}{{"\n"}}'