I hereby claim:
- I am hreese on github.
- I am heikoreese (https://keybase.io/heikoreese) on keybase.
- I have a public key whose fingerprint is 2129 1E79 5592 B87A 479D D30B 1FDD 301F B636 D58B
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
wusa /kb:3021917 /uninstall /norestart /quiet | |
wusa /kb:3035583 /uninstall /norestart /quiet | |
wusa /kb:2952664 /uninstall /norestart /quiet | |
wusa /kb:3022345 /uninstall /norestart /quiet | |
wusa /kb:3068708 /uninstall /norestart /quiet | |
wusa /kb:2990214 /uninstall /norestart /quiet | |
wusa /kb:2505438 /uninstall /norestart /quiet | |
wusa /kb:2670838 /uninstall /norestart /quiet | |
wusa /kb:2952664 /uninstall /norestart /quiet | |
wusa /kb:3021917 /uninstall /norestart /quiet |
% FontAwesome (http://fortawesome.github.com/Font-Awesome/) bindings for (Xe)LaTeX | |
% Author: Honza Ustohal <honza@egoistic.biz> | |
% | |
% Translation of FontAwesome's private range characters into XeTeX symbols. All icons are camel-cased and prefixed with 'fa', i.e. what was .icon-align-center the CSS version of FontAwesome becomes \faAlignCenter | |
% This might be reworked into a full blown package in the near future | |
% | |
% Prerequisite: | |
% XeLaTeX, FontAwesome installed as a system font accessible by XeLaTeX | |
% | |
% Usage: |
#Read multiple keys from an authorized_keys file and print the finger print | |
[root@server01 .ssh]# while read line; do ssh-keygen -l -f /dev/stdin <<< $line; done < authorized_keys | |
2048 87:7a:4d:70:d2:10:a4:4b:b7:e1:2b:7c:77:92:25:04 /dev/stdin (RSA) | |
2048 7d:f0:89:94:00:09:bc:70:46:59:8d:9a:70:3b:ac:70 /dev/stdin (RSA) | |
2048 61:63:ee:0d:f6:d2:d8:d6:ae:37:0c:35:ae:da:51:6a /dev/stdin (RSA) | |
#read a key from authorized key file | |
[root@server01 .ssh]# ssh-keygen -l -f authorized_keys | |
2048 87:7a:4d:70:d2:10:a4:4b:b7:e1:2b:7c:77:92:25:04 authorized_keys (RSA) |
sudo ln -s /etc/ssl/certs/ca-bundle.crt /etc/ssl/certs/ca-certificates.crt |
#include <unistd.h> | |
#include <stdio.h> | |
#define ANSI_COLOR_RED "\x1b[31m" | |
#define ANSI_COLOR_GREEN "\x1b[32m" | |
#define ANSI_COLOR_YELLOW "\x1b[33m" | |
#define ANSI_COLOR_BLUE "\x1b[34m" | |
#define ANSI_COLOR_MAGENTA "\x1b[35m" | |
#define ANSI_COLOR_CYAN "\x1b[36m" | |
#define ANSI_COLOR_RESET "\x1b[0m" |
#include <math.h> | |
#include <stdio.h> | |
struct transform { | |
double x1; | |
double y1; | |
double x2; | |
double y2; | |
}; |
This is a note for myself describing various Visual Basic macros construction strategies that could be used for remote code execution via malicious Document vector. Nothing new or fancy here, just a list of techniques, tools and scripts collected in one place for a quick glimpse of an eye before setting a payload.
All of the below examples had been generated for using as a remote address: 192.168.56.101.
List: