As configured in my dotfiles.
start new:
tmux
start new with session name:
| #!/usr/bin/env python | |
| # Reflects the requests from HTTP methods GET, POST, PUT, and DELETE | |
| # Written by Nathan Hamiel (2010) | |
| from BaseHTTPServer import HTTPServer, BaseHTTPRequestHandler | |
| from optparse import OptionParser | |
| class RequestHandler(BaseHTTPRequestHandler): | |
| def do_GET(self): |
As configured in my dotfiles.
start new:
tmux
start new with session name:
| # taken from http://www.piware.de/2011/01/creating-an-https-server-in-python/ | |
| # generate server.xml with the following command: | |
| # openssl req -new -x509 -keyout server.pem -out server.pem -days 365 -nodes | |
| # run as follows: | |
| # python simple-https-server.py | |
| # then in your browser, visit: | |
| # https://localhost:4443 | |
| import BaseHTTPServer, SimpleHTTPServer | |
| import ssl |
| FROM centos | |
| MAINTAINER Ninetails - Carlos Kazuo | |
| RUN rpm -Uvh http://mirror.webtatic.com/yum/el6/latest.rpm | |
| RUN curl -s http://repos.fedorapeople.org/repos/jkaluza/httpd24/epel-httpd24.repo > /etc/yum.repos.d/epel-httpd24.repo | |
| RUN yum install -y xterm git mysql mysql-server httpd24-httpd php55w php55w-common php55w-cli mysql mysql-server php55w-devel php55w-mcrypt php55w-mbstring php55w-mysqlnd php55w-pdo php55w-pecl-xdebug php55w-xml php55w-xmlrpc php55w-opcache | |
| RUN /sbin/chkconfig --add httpd | |
| RUN /sbin/chkconfig httpd on --level 235 |
| echo strUrl = WScript.Arguments.Item(0) > wget.vbs | |
| echo StrFile = WScript.Arguments.Item(1) >> wget.vbs | |
| echo Const HTTPREQUEST_PROXYSETTING_DEFAULT = 0 >> wget.vbs | |
| echo Const HTTPREQUEST_PROXYSETTING_PRECONFIG = 0 >> wget.vbs | |
| echo Const HTTPREQUEST_PROXYSETTING_DIRECT = 1 >> wget.vbs | |
| echo Const HTTPREQUEST_PROXYSETTING_PROXY = 2 >> wget.vbs | |
| echo Dim http,varByteArray,strData,strBuffer,lngCounter,fs,ts >> wget.vbs | |
| echo Err.Clear >> wget.vbs | |
| echo Set http = Nothing >> wget.vbs | |
| echo Set http = CreateObject("WinHttp.WinHttpRequest.5.1") >> wget.vbs |
| #!/usr/bin/env python2 | |
| # Author: @ropnop (Ronnie Flathers) | |
| # Simple script to ingest a Python file (e.g. a shell) and return a oneliner command | |
| # Useful with command injection vulns | |
| # Based entirely off of Metasploit's "reverse_python.rb" payload | |
| # Credit to Brendan Coles <bcoles[at]gmail.com> | |
| # | |
| # Example: | |
| # $ python make_oneliner.py pty_shell.py |
| #!/usr/bin/env python | |
| """ | |
| animatronic_mouth.py | |
| This script animates a motorized mouth on a Raspberry Pi GPIO pin so that it | |
| appears to be speaking alongside the audio on the specified PulseAudio source | |
| (which usually should be a sink's monitor). | |
| Find PA_SOURCE with `pactl list` and look for a monitor device that corresponds |
| #!/bin/bash | |
| unifi_username=USERNAME | |
| unifi_password='PASSWORD' | |
| unifi_controller=https://EXAMPLE.COM:8443 | |
| wifi_id=YOUR_WIFI_ID | |
| cookie=/tmp/cookie | |
| curl_cmd="curl -s -S --cookie ${cookie} --cookie-jar ${cookie} --insecure " |
| Retrieves all of the trust relationships for this domain - Does not Grab Forest Trusts | |
| ([System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain()).GetAllTrustRelationships() | |
| Grab Forest Trusts. | |
| ([System.DirectoryServices.ActiveDirectory.Forest]::GetCurrentForest()).GetAllTrustRelationships() | |