Run :
adb shell getevent -pl
Search for : "ABS_MT_TRACKING_ID" - example :
### | |
# Nginx vhost file to hide Proxmox pveproxy | |
# For 3.4+, 5.x version. | |
# | |
# Do not forget to create file | |
# /etc/default/pveproxy: | |
# ALLOW_FROM="127.0.0.1" | |
# DENY_FROM="all" | |
# POLICY="allow" | |
# |
<div style="font-family: sans-serif;"> | |
<? var data = valid(); ?> | |
<form id="form" name="form"> | |
<? if(Object.prototype.toString.call(data) === '[object Array]') { ?> | |
<? for (var i = 0; i < data.length; i++) { ?> | |
<? for (var j = 0; j < data[i].length; j++) { ?> | |
<input type="checkbox" id="ch<?= '' + i + j ?>" name="ch<?= '' + i + j ?>" value="<?= data[i][j] ?>"><?= data[i][j] ?><br> | |
<? } ?> | |
<? } ?> | |
<? } else { ?> |
function combineData(){ | |
var doc = SpreadsheetApp.getActiveSpreadsheet(); | |
var sheets = doc.getSheets(); // get all the sheets | |
var outSheet = doc.getSheetByName("combined"); // set where we want to write the results | |
for (i in sheets){ // loop across all the sheets | |
if (sheets[i].getSheetName().substring(0,9) == "followers"){ // if sheetname starts with 'follower' then | |
var target = sheets[i].getSheetName().substring(12); // extract users name for target column | |
var data = getRowsData(sheets[i]); // get extisting data from current sheet | |
for (j in data){ | |
data[j]["target"] = target; // create a target column with the users name |
#!/bin/bash | |
# | |
#DNS adblock/malware block for USG | |
# | |
#Orginal script: https://community.ubnt.com/t5/UniFi-Routing-Switching/Use-USG-to-block-sites-apps-like-ER/td-p/1497045 | |
# | |
#Howto: SSH into your USG: | |
#sudo su - | |
#vi /config/user-data/update-adblock-dnsmasq.sh (add file content) | |
#ESC :wq |
# Taken from https://medium.com/@nurblieh/ipv6-on-the-edgerouter-lite-c95e3cc8d49d | |
# just a copy in case that goes away someday | |
# eth1 is my WAN | |
# switch0 is my LAN | |
configure | |
# Firewall Rule 1/2 | |
edit firewall ipv6-name WAN6_IN |
#! /usr/bin/env bash | |
#-- Dave Wallraff | |
# First things first, I'm the realest... | |
### bootstrap crostini container | |
# curl -sL dwallraff.com/bootstrap | bash | |
# wrap in a function for curl|bash | |
do_stuff() { |
Download the latest ugw3
package from https://github.com/Lochnair/vyatta-wireguard/releases and install it on your USG using dpkg -i wireguard-ugw3-<version>.deb
.
cd /config/auth
umask 077
mkdir wireguard
cd wireguard
wg genkey > wg_private.key
wg pubkey < wg_private.key > wg_public.key
Setting up xrdp on Kali Linux 2016.2 on AWS | |
AWS has an AMI for Kali 2016.2, but being remote, you need VNC or RDP to access the graphical tools. | |
VNC is easy to set up but very restrictive. RDP is harder to set up, but easier to use. These are the instructions I use to set up xrdp. | |
I use this config so that I connect to the Kali VM through an Apache Guacamole RDP proxy. This keeps Kali behind the firewall and in my pentesting lab. Guacamole also allows me to access the Kali box on SSH or RDP via a web interface from anywhere and any device. | |
OS: Kali Linux 2016.2 | |
AMI: Updated 19 Oct 2016 |