- Recon
- Find vuln
- Exploit
- Document it
Unicornscans in cli, nmap in msfconsole to help store loot in database.
=======================HOST DISCOVERY=========================================== | |
Host discovery con PING: | |
$ for octect in (seq 0 254) | |
echo "Pinging [X.X.X.$octect]" | |
ping -c 2 10.150.150.$octect | grep "bytes from" | awk '{print $4}' | uniq -d | cut -d ":" -f 1 | tee -a targets.list | |
end | |
Host discovery con NMAP IMCP o ARP | |
$sudo nmap -vv -sn -PE 10.150.150.0/24 -oG HOSTDISCOVERY_ICMP.gnmap |
/******************************************************************************* | |
LIGHTSWITCH: A DARK MODE SWITCHER WITH USER OVERRIDE | |
Originally By Nick Punt 10/26/2018 | |
How to use: | |
1. Create two data theme sets with CSS Variables 'light' and 'dark' such as: | |
html[data-theme="light"] { | |
--color-text: #000; |
from django.views.generic import FormView | |
from django.utils.translation import ugettext_lazy as _ | |
from django.contrib import messages | |
from import_export.formats import base_formats | |
from import_export.forms import ImportForm, ConfirmImportForm | |
from import_export.resources import modelresource_factory | |
from django.http import HttpResponseRedirect | |
from import_export.tmp_storages import TempFolderStorage | |
try: |
#!/usr/bin/env python3 | |
import asyncio | |
import ssl | |
@asyncio.coroutine | |
async def echo_client(data, loop): | |
ssl_ctx = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT) | |
ssl_ctx.options |= ssl.OP_NO_TLSv1 |
A-1 Pictures | |
A. J. Casson | |
Aaron Douglas | |
Aaron Horkey | |
Aaron Jasinski | |
Aaron Siskind | |
Abbott Fuller Graves | |
Abbott Handerson Thayer | |
Abram Efimovich Arkhipov | |
Adam Elsheimer |
cmdkey /list | ForEach-Object{if($_ -like "*target=TERMSRV/*"){cmdkey /del:($_ -replace " ","" -replace "Target:","")}} | |
echo "Connecting to 192.168.1.100" | |
$Server="192.168.1.100" | |
$User="Administrator" | |
$Password="AdminPassword" | |
cmdkey /generic:TERMSRV/$Server /user:$User /pass:$Password | |
mstsc /v:$Server |
// 1. Open the browser developper console on the network tab | |
// 2. Start the video | |
// 3. In the dev tab, locate the load of the "master.json" file, copy its full URL | |
// 4. Run: node vimeo-downloader.js "<URL>" | |
// 5. Combine the m4v and m4a files with mkvmerge | |
const fs = require('fs'); | |
const url = require('url'); | |
const https = require('https'); |
sed -i '/<pattern>/s/^/#/g' file #comment | |
sed -i '/<pattern>/s/^#//g' file #uncomment |