## Solve Every Sudoku Puzzle | |
## See http://norvig.com/sudoku.html | |
## Throughout this program we have: | |
## r is a row, e.g. 'A' | |
## c is a column, e.g. '3' | |
## s is a square, e.g. 'A3' | |
## d is a digit, e.g. '9' | |
## u is a unit, e.g. ['A1','B1','C1','D1','E1','F1','G1','H1','I1'] |
#ifndef DELEGATE_HPP_INCLUDED | |
#define DELEGATE_HPP_INCLUDED | |
#include <functional> | |
#include <vector> | |
// general case | |
template<typename R, typename... Args> | |
class delegate | |
{ |
# to generate your dhparam.pem file, run in the terminal | |
openssl dhparam -out /etc/nginx/ssl/dhparam.pem 2048 |
http://victim/pictures/search.php?query=%22%3E%3Cscript%3Ealert%281%29%3B%3C%2Fscript%3E | |
+------+----------------------------------+ | |
| Risk | Description | | |
+------+----------------------------------+ | |
| High | Cross Site Scripting (Reflected) | | |
+------+----------------------------------+ | |
http://victim/css/ | |
+--------+--------------------+ | |
| Risk | Description | |
#!/usr/bin/env python | |
# | |
# Simple utility to disassemble a raw bytecode file using Capstone. | |
# | |
# -jduck | |
# | |
import argparse | |
import capstone | |
import struct |
#!/usr/bin/python | |
# Connects to servers vulnerable to CVE-2014-0160 and looks for cookies, specifically user sessions. | |
# Michael Davis (mike.philip.davis@gmail.com) | |
# Based almost entirely on the quick and dirty demonstration of CVE-2014-0160 by Jared Stafford (jspenguin@jspenguin.org) | |
# The author disclaims copyright to this source code. | |
import select |
This is a guide on how to email securely.
There are many guides on how to install and use PGP to encrypt email. This is not one of them. This is a guide on secure communication using email with PGP encryption. If you are not familiar with PGP, please read another guide first. If you are comfortable using PGP to encrypt and decrypt emails, this guide will raise your security to the next level.
First off: this is the first time I "seriously" reversed a kernel-mode NT driver, so keep that in mind when you read this..
The Komodia rootkit config is located in a certain registry entry that's hardcoded in the driver. For Qustodio, it's HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\qwd\Data.
The config structure is simple enough. An array of the following structure:
DWORD type;
BYTE unknown[32]; // I don't see anywhere that the driver actually *reads* any of this part,
// at least, not after writing to it first.