Skip to content

Instantly share code, notes, and snippets.

@xiaozhuai
xiaozhuai / fix_parallels_tools_install.md
Last active July 13, 2025 19:30
fix parallels tools install issue

install log

cd prl_fs/SharedFolders/Guest/Linux/prl_fs && make CC=cc
make[1]: Entering directory '/usr/lib/parallels-tools/kmods/prl_fs/SharedFolders/Guest/Linux/prl_fs'
make -C /lib/modules/5.0.0-25-generic/build M=/usr/lib/parallels-tools/kmods/prl_fs/SharedFolders/Guest/Linux/prl_fs CC=cc
make[2]: Entering directory '/usr/src/linux-headers-5.0.0-25-generic'
  CC [M]  /usr/lib/parallels-tools/kmods/prl_fs/SharedFolders/Guest/Linux/prl_fs/super.o
/usr/lib/parallels-tools/kmods/prl_fs/SharedFolders/Guest/Linux/prl_fs/super.c: In function 'prlfs_remount':
/usr/lib/parallels-tools/kmods/prl_fs/SharedFolders/Guest/Linux/prl_fs/super.c:119:21: error: 'MS_RDONLY' undeclared (first use in this function); did you mean 'IS_RDONLY'?
  if ( (!((*flags) & MS_RDONLY) && PRLFS_SB(sb)->readonly) ||
@Shamar
Shamar / bypass-firewall-and-probe-ports.html
Created September 3, 2018 14:19
PoC exploit: bypass a corporate firewall through JavaScript and a DNS
<html>
<!-- This is a very simple Proof of Concepts of just one of the possible attacks
described at https://bugzilla.mozilla.org/show_bug.cgi?id=1487081
You can give it a try by following the instruction at
https://dev.to/shamar/the-meltdown-of-the-web-4p1m
Just please, remember to restore your /etc/hosts after.
-->
<head>
<script type="text/javascript">
@seadog007
seadog007 / hitcon_zeroday_publish_channel_notification.sh
Last active July 21, 2017 06:16
HITCON ZeroDay publish notification to Telegram channel
#!/bin/bash
token='token_only'
disable_preview='True'
for i in `seq 1 10`
do
curl -s https://zeroday.hitcon.org/vulnerability/disclosed/page/$i | grep vu-l-data-titl | tr -d $'\t' | \
while read line
do
link=`echo $line | grep -oP '<a\ href="\K.*(?=")'`
title=`echo $line | grep -oP '<a.*">\K.*(?=</a)'`