Component | Link | Est. Price |
---|---|---|
Case | GrayMatter 6-GPU Server Case V2.1 | $500 |
Motherboard | ASRock H97 Anniversary | $85 |
Risers | --- | Included w/case |
GPUs | GeForce GTX 980 Ti | 4x $470 |
PSU | Corsair AXi Series, AX1200i, 1200 Watt | 2x $310 |
Power-Splitter | Phobya 24 Pin 2-Way PSU Starting Cable | $15 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python | |
# Thu 24 Jun 2010 04:20:52 AM EDT | |
import httplib | |
import mimetools | |
import StringIO | |
_boundary = mimetools.choose_boundary() | |
_host_uid = 'C087EFAE-05A2-4A0B-9512-E05E5ED84AEB' | |
_csamc = "192.168.0.108" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
## | |
# This file is part of the Metasploit Framework and may be subject to | |
# redistribution and commercial restrictions. Please see the Metasploit | |
# web site for more information on licensing and terms of use. | |
# http://metasploit.com/ | |
## | |
require 'msf/core' | |
class Metasploit3 < Msf::Exploit::Remote |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
hashcat (v3.10-3-g13cbe42) starting in benchmark-mode... | |
OpenCL Platform #1: NVIDIA Corporation | |
====================================== | |
- Device #1: GeForce GTX 980 Ti, 1519/6077 MB allocatable, 22MCU | |
- Device #2: GeForce GTX 980 Ti, 1519/6077 MB allocatable, 22MCU | |
- Device #3: GeForce GTX 980 Ti, 1519/6077 MB allocatable, 22MCU | |
- Device #4: GeForce GTX 980 Ti, 1519/6077 MB allocatable, 22MCU | |
Hashtype: MD4 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python | |
"""htl_extract.py, Extracts the embedded source code from Cisco Security Agent Management Console. | |
Gerry <gerry@hiredhacker.com> | |
""" | |
import os | |
import sys | |
import struct | |
import pefile | |
from itertools import takewhile |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python | |
# decrypt_dbvis.py ~ gerry@twitter.com | |
# DbVisualizer uses PBEWithMD5AndDES with a static key to store passwords. | |
# This is a quick hack to extract and decrypt credentials from DbVisualizer config files. | |
# Tested against DbVisualizer Free 9.0.9 and 9.1.6 | |
""" | |
[2014-03-25 02:05:30][not-the-sea workspace]$ security/p/gerry/misc/decrypt_dbvis.py | |
[+] DbVisualizer Password Extractor and Decryptor (@gerryeisenhaur) | |
[+] Additional Usage Options: | |
[+] security/p/gerry/misc/decrypt_dbvis.py <config filename> |
OlderNewer