mitmproxy is an excellent console app written in Python.
It is easy to use on Linux and OS X.
Use brew install mitmproxy
to install it on OS X.
mitmproxy is an excellent console app written in Python.
It is easy to use on Linux and OS X.
Use brew install mitmproxy
to install it on OS X.
##Pasang ruTorrent ubuntu 14.04
rTorrent merupakan aplikasi yang dikode dengan C++ yang didistribusikan untuk keseluruhan distro linux, jadi untuk pengguna selain Centos atau Ubuntu bisa mengambil referensi dari tutorial ini karena pada dasarnya sama saja. Situs github rTorrent adalah di rutorrent .
Langsung masuk ke tutorial, untuk tutorial kali ini gw memakai webserver apache dengan user punto
,
###Install ruTorrent di Ubuntu 14.04
pertama kita perlu install rtorrent dan package yang diperlukan terlebih dahulu dengan apt-get
//brutecelen3.c | |
//edit je ikut suka | |
//by naja & acap | |
#include <stdio.h> | |
#include <string.h> | |
#include <stdlib.h> | |
static const char alphabet[] = | |
"abcdefghijklmnopqrstuvwxyz"; |
All of this information was collected by doing google searches or from the URLs mentioned in the References section. I collected them here because I wanted a single list that I could update, refer to, and share with others. Simply having a link listed here is not necessarily an endorsement. I only have personal experience with a small number of the resources listed here. I did however, make an initial attempt to remove dead links from the reference links. Some good starting points are Lenny Zelster's Reverse-Engineering Malware Cheat Sheet and Analyzing Malicious Documents Cheat Sheet. In fact, as you'll notice in the reference section, Lenny's site is included multiple times. He has some really awesome information.
http://www.securityfocus.com/archive/138/description http://reddit.c
[Settings] | |
Check DLL versions=0 | |
Topmost window=0 | |
Show main menu items that don't apply=0 | |
Show popup items that don't apply=0 | |
Show toolbar=1 | |
Use system colours in toolbar=0 | |
Status in toolbar=0 | |
Flash duration=1 | |
Autoupdate interval=4 |
https://www.andrew.cmu.edu/user/mteh/docs/C_Pointers.txt | |
Pointers | |
===================================================================== | |
--------------------------------------------------------------------- | |
Reading C type declarations | |
--------------------------------------------------------------------- | |
void * foo; (foo is a pointer to void; generic pointer) |
//re400.c by najashark | |
//ihack2016 | |
#include "stdafx.h" | |
#include "stdint.h" | |
int main(void) | |
{ | |
char arr[23] = { 0xFA,0x5A,0x32,0x8A,0x32,0xE3,0x52,0x82,0x40,0xBA,0x5A,0x32,0x48,0x52,0x5A,0x12,0x02,0x42,0x70,0x42,0x32,0xD2,0xFA }; | |
char c; | |
for (int i = 0; i < 23; i++) |
<!--poc only | |
for challenge 1 backhand coding | |
by nj_--> | |
<html> | |
<title>wargames.my 2016 QuickWin store - Payment Gateway Receiver</title> | |
<script src="https://raw.githubusercontent.com/geraintluff/sha256/gh-pages/sha256.min.js"></script> | |
<script> | |
var txn_status = "1"; | |
var txn_ref = "flag|1463913417"; //change when refresh | |
var amount = "8.52"; |
#!/bin/sh | |
#If you would like to mine directly to an exchange, then use EXCHANGE_ADDRESS.your_payment_id as your address in your mining software, | |
#and also when looking at your stats in the home page. | |
#Please, do not mine to an exchange without your payment ID. | |
echo -n "Enter your WALLET_ADDRESS [ENTER]: " | |
read YOUR_WALLET_ADDRESS | |
echo -n "Enter your POOL_ADDRESS:PORT [ENTER]: " | |
read YOUR_POOL_ADDRESS |