This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/bin/sh | |
| # | |
| # === EXCEPTION === | |
| # Setting up initramfs-tools (0.130) ... | |
| # update-initramfs: deferring update (trigger activated) | |
| # cp: cannot create regular file '/lib/live/mount/medium/live/vmlinuz.new': No such file or directory | |
| # dpkg: error processing package initramfs-tools (--configure): | |
| # installed initramfs-tools package post-installation script subprocess returned error exit status 1 | |
| # |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/bin/sh | |
| VER=4.0.5 | |
| # Download archive | |
| wget "https://www.openinfosecfoundation.org/download/suricata-$VER.tar.gz" | |
| tar -xvzf "suricata-$VER.tar.gz" | |
| cd "suricata-$VER" | |
| # Dependencies | |
| sudo apt-get -y install libpcre3 libpcre3-dbg libpcre3-dev build-essential autoconf automake libtool libpcap-dev libnet1-dev libyaml-0-2 libyaml-dev zlib1g zlib1g-dev libcap-ng-dev libcap-ng0 make libmagic-dev libjansson-dev libjansson4 pkg-config |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/python3 | |
| from optparse import OptionParser | |
| import requests | |
| import re | |
| def striptags(html: str): | |
| p = re.compile(r'<.*?>') | |
| return p.sub('', html) | |
| def cfsearch(url: str): |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| /* | |
| * E-DB Note: Updating OpenFuck Exploit ~ http://paulsec.github.io/blog/2014/04/14/updating-openfuck-exploit/ | |
| * | |
| * OF version r00t VERY PRIV8 spabam | |
| * Compile with: gcc -o OpenFuck OpenFuck.c -lcrypto | |
| * objdump -R /usr/sbin/httpd|grep free to get more targets | |
| * #hackarena irc.brasnet.org | |
| */ | |
| #include <arpa/inet.h> |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| # Kill OneDrive completely | |
| # https://github.com/johnmatczak | |
| # Self-elevate the script if not already elevated | |
| if (-Not ([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] 'Administrator')) { | |
| echo "For better results, this script should be run as administator." | |
| $elevate = Read-Host "Would you like to elevate this script to administator? [y\N] " | |
| if ($elevate -like 'y') { | |
| if ([int](Get-CimInstance -Class Win32_OperatingSystem | Select-Object -ExpandProperty BuildNumber) -ge 6000) { | |
| $CommandLine = "-File `"" + $MyInvocation.MyCommand.Path + "`" " + $MyInvocation.UnboundArguments |