emory at kvet.ch, hellyeah.com incumbent.org duevigilance.com axiopisty.com
#! /usr/bin/env python3.2 | |
import xml.etree.ElementTree as etree | |
import shutil | |
import os | |
first = 1 | |
for fileName in os.listdir("."): | |
if ".nessus" in fileName: | |
print(":: Parsing", fileName) |
# cached packages | |
homebrew for macOS caches in `~/Library/Caches/Homeberw` and i figure the pkcs11 tooling i use being compromised would be a huge problem for me and everyone else using it? | |
``` | |
~/Library/Caches/Homebrew | |
% ls -la p11-kit* | |
lrwxr-xr-x 1 rlundb811 staff 118 Nov 20 11:23 p11-kit--0.25.3 -> downloads/1f29fbea9391e33f2bcc01c320d960dc11721363dd6fe42aafcef6dd194f2e05--p11-kit--0.25.3.arm64_sonoma.bottle.tar.gz | |
lrwxr-xr-x 1 rlundb811 staff 111 Oct 30 13:22 p11-kit_bottle_manifest--0.25.1 -> downloads/ad55f3d64397404e6a67b1f9518d6863ab14da4b812a227ba3cce37449c7c90c--p11-kit-0.25.1.bottle_manifest.json | |
lrwxr-xr-x 1 rlundb811 staff 111 Nov 20 11:23 p11-kit_bottle_manifest--0.25.3 -> downloads/cc547bf2f72da03680090015f5b720aff280ce33de9c33783a69c24fe97a4246--p11-kit-0.25.3.bottle_manifest.json |
tap "archivebox/archivebox" | |
tap "homebrew/bundle" | |
tap "homebrew/cask" | |
tap "homebrew/cask-drivers" | |
tap "homebrew/cask-versions" | |
tap "homebrew/core" | |
tap "homebrew/services" | |
tap "mysticlgbt/made" | |
tap "xwmx/taps" | |
brew "ack" |
Windows Registry Editor Version 5.00 | |
[-HKEY_CLASSES_ROOT\.iso] | |
[-HKEY_CLASSES_ROOT\Windows.IsoFile\shell\mount\command] | |
[-HKEY_CLASSES_ROOT\.img] | |
[-HKEY_CLASSES_ROOT\.vhdx] |
emory@debut:/volume1/docker$ sudo nvme smart-log /dev/nvme0 | |
Smart Log for NVME device:nvme0 namespace-id:ffffffff | |
critical_warning : 0x4 | |
temperature : 18 C | |
available_spare : 100% | |
available_spare_threshold : 10% | |
percentage_used : 104% | |
data_units_read : 1,097,736,246 | |
data_units_written : 526,487,556 | |
host_read_commands : 32,712,112,528 |
This GitHub Gist details the manual configuration needed on a UniFi controller to enable IPv6 tunneling with Hurricane Electric's Tunnelbroker service.
This is what works for me personally. Stuff you'll need to do to adapt this to your ends:
so I passed it along to virusTotal and this is the current analysis of my DirectHW binary,
MD5 (./DirectHW) = 66b3fd953675de8906dff4f69a89fb4c
emory@ICON ~ % vt analysis NjZiM2ZkOTUzNjc1ZGU4OTA2ZGZmNGY2OWE4OWZiNGM6MTY3MzQ0NTg5Nw== | grep malicious -B1 -A5
ALYac:
category: "malicious"
<?xml version="1.0" encoding="UTF-8"?> | |
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> | |
<plist version="1.0"> | |
<dict> | |
<key>EnvironmentVariables</key> | |
<dict> | |
<key>PATH</key> | |
<string>/usr/local/bin:/System/Cryptexes/App/usr/bin:/usr/bin:/bin:/usr/sbin:/sbin:/usr/local/share/dotnet:/opt/X11/bin:/Applications/Wireshark.app/Contents/MacOS:/usr/local/sbin:/opt/local/bin</string> | |
</dict> | |
<key>KeepAlive</key> |
/* Page */ | |
@import url(https://fonts.googleapis.com/css?family=Fira+Sans:300,400,700,300italic,400italic,700italic|Fira+Mono:400,700|Over+the+Rainbow|Merriweather:400,300italic,300,400italic,700,700italic); | |
/* Fonts | |
font-family: 'Fira Sans', sans-serif; | |
font-family: 'Merriweather', serif; | |
font-family: 'Fira Mono', monospace; | |
font-family: 'Over the Rainbow', cursive, fancy; |