user@hostname:~/exploit$ cat > test.c#include <stdio.h>
#include <stdlib.h>
#include <unistd.h>
int main() {
if (setuid(0) != 0) {| // ==UserScript== | |
| // @name Web Based Microsoft Teams Presence To NodeRed/HomeAssistant | |
| // @namespace http://tampermonkey.net/ | |
| // @version 1.0 | |
| // @description Sends HTTP request to NodeRed HTTP Listener when Web based Microsoft Teams status/presence changes to enable automated actions in NodeRed/HomeAssistant | |
| // @author instance.id | |
| // @match https://*.teams.microsoft.us/* | |
| // @grant none | |
| // ==/UserScript== |
| #!/usr/bin/env python3 | |
| ######################################################################################################## | |
| # | |
| # LTE CPE B2268S Router | |
| # version: V100R001C35SP100B529 | |
| # | |
| # Busybox Command Injection, vulnerability in the traceroute command | |
| # | |
| # Payload: |
| [CONST_PARAM] | |
| rtsp = 1 ; RTSPЭ�飬0���ر� 1������ |
| echo "" | |
| echo "************ Github Dork Links (must be logged in) *******************" | |
| echo "" | |
| echo " password" | |
| echo "https://github.com/search?q="hackertarget.site"+password&type=Code" | |
| echo "https://github.com/search?q=""hackertarget""+password&type=Code" | |
| echo "" | |
| echo " npmrc _auth" |
| import time | |
| from collections import deque | |
| import numpy as np | |
| import sounddevice as sd | |
| from beepy import beep | |
| from infi.systray import SysTrayIcon | |
| last_alert = time.time() - 10 | |
| q = deque(maxlen=200) |
| alias dtail='docker logs -tf --tail='50' ' | |
| alias dstop='docker stop `docker ps -aq`' | |
| alias drm='docker rm `docker ps -aq`' | |
| alias dcp='docker-compose -f ~/docker-compose.yml ' | |
| alias dcporph='docker-compose -f ~/docker-compose.yml up -d --remove-orphans' | |
| alias dprune='docker image prune' | |
| alias dprunesys='docker system prune --all' |
user@hostname:~/exploit$ cat > test.c#include <stdio.h>
#include <stdlib.h>
#include <unistd.h>
int main() {
if (setuid(0) != 0) {