Each of these commands will run an ad hoc http static server in your current (or specified) directory, available at http://localhost:8000. Use this power wisely.
$ python -m SimpleHTTPServer 8000| # Testing for a UEFI Boot | |
| ls /sys/firmware/efi/efivars | |
| # Connecting to the Internet | |
| ping -c 3 www.google.co.uk | |
| systemctl start dhcpcd.service | |
| # identify the drive | |
| lsblk |
| #!/usr/bin/python3 | |
| # Version: 2.0 | |
| # Author: Kev | |
| import os | |
| import sys | |
| import threading | |
| import datetime | |
| from requests.packages.urllib3.exceptions import InsecureRequestWarning | |
| import requests |
| from flask import Flask, render_template, request, url_for, redirect, make_response, flash | |
| import json | |
| from hashlib import md5 | |
| from base64 import b64decode | |
| from base64 import b64encode | |
| from Crypto import Random | |
| from Crypto.Cipher import AES | |
| app = Flask(__name__) | |
| app.secret_key = 'seed removed' |
| """ Flask Session Cookie Decoder/Encoder """ | |
| __author__ = 'Wilson Sumanang, Alexandre ZANNI' | |
| # standard imports | |
| import sys | |
| import zlib | |
| from itsdangerous import base64_decode | |
| import ast | |
| # Lib for argument parsing |
| import base64 | |
| import hashlib | |
| from Crypto import Random | |
| from Crypto.Cipher import AES | |
| from binascii import unhexlify | |
| class AESCipher(object): | |
| def __init__(self, key): | |
| self.bs = 64 |
| var request = require('request'); | |
| var unzip = require('unzip'); | |
| var csv2 = require('csv2'); | |
| request.get('http://s3.amazonaws.com/alexa-static/top-1m.csv.zip') | |
| .pipe(unzip.Parse()) | |
| .on('entry', function (entry) { | |
| entry.pipe(csv2()).on('data', console.log); | |
| }) | |
| ; |
Each of these commands will run an ad hoc http static server in your current (or specified) directory, available at http://localhost:8000. Use this power wisely.
$ python -m SimpleHTTPServer 8000| " _ _ " | |
| " _ /|| . . ||\ _ " | |
| " ( } \||D ' ' ' C||/ { % " | |
| " | /\__,=_[_] ' . . ' [_]_=,__/\ |" | |
| " |_\_ |----| |----| _/_|" | |
| " | |/ | | | | \| |" | |
| " | /_ | | | | _\ |" | |
| It is all fun and games until someone gets hacked! |
| # | |
| # https://www.owasp.org/index.php/XSS_Filter_Evasion_Cheat_Sheet | |
| # based on the RSnake original http://ha.ckers.org/xss.html | |
| # Retrieved on 2013-11-20 | |
| # Much of this wildly obsolete | |
| # | |
| # XSS Locator 2 | |
| '';!--"<XSS>=&{()} |