open wsl command line
type -
sh -c "$(curl -fsSL https://raw.githubusercontent.com/Linuxbrew/install/master/install.sh)"
#@author matterpreter | |
#@category | |
#@keybinding | |
#@menupath | |
#@toolbar | |
### | |
# To import to Neo4j: | |
# CREATE CONSTRAINT function_name ON (n:Function) ASSERT n.name IS UNIQUE | |
# |
using System; | |
using System.Net.Http; | |
using System.Security.Cryptography; | |
using System.Text; | |
/* | |
* This gist shows a sample of signing a GET request for shrimpy.io | |
* based on Pyton sample on https://developers.shrimpy.io/docs/?python#creating-a-request | |
*/ |
With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>
With Rubeus version with brute module:
using System.Collections; | |
using System.Collections.Generic; | |
using UnityEngine; | |
namespace UnityEditor.VFX.Block | |
{ | |
[VFXInfo(category = "Color")] | |
class ColorBlend : VFXBlock | |
{ |
#!/bin/bash | |
dir=$( cd "$( dirname "${BASH_SOURCE[0]}" )" && pwd ) | |
# magnet:?xt=urn:btih:7ffbcd8cee06aba2ce6561688cf68ce2addca0a3 | |
# 1. Fixed letter1, letter2, letter3 assignments for macOS compatibility | |
# 2. Changed grep to sgrep (sorted grep), need to preinstall: npm i -g sgrep | |
if [ "$1" != "" ]; then | |
letter1=$(echo ${1:0:1}) | |
if [[ $letter1 == [a-zA-Z0-9] ]]; then |
:: Windows 10 Hardening Script | |
:: This is based mostly on my own personal research and testing. My objective is to secure/harden Windows 10 as much as possible while not impacting usability at all. (Think being able to run on this computer's of family members so secure them but not increase the chances of them having to call you to troubleshoot something related to it later on). References for virtually all settings can be found at the bottom. Just before the references section, you will always find several security settings commented out as they could lead to compatibility issues in common consumer setups but they're worth considering. | |
:: Obligatory 'views are my own'. :) | |
:: Thank you @jaredhaight for the Win Firewall config recommendations! | |
:: Thank you @ricardojba for the DLL Safe Order Search reg key! | |
:: Thank you @jessicaknotts for the help on testing Exploit Guard configs and checking privacy settings! | |
:: Best script I've found for Debloating Windows 10: https://github.com/Sycnex/Windows10Debloater | |
: |
// just an example. A cleaner way is to wrap the showLine-stuff in a dedicated component | |
<template> | |
<div> | |
<my-line v-if="showLine" :data="lineData" :options="options"> | |
</div> | |
</template> | |
<script> | |
export default { | |
data () { |
#!/usr/bin/python | |
import sys | |
from keystone import * | |
from unicorn import * | |
from unicorn.arm_const import * | |
from capstone import * | |
from capstone.arm import * | |
from capstone.x86 import * |
Prerequisites : the letsencrypt CLI tool
This method allows your to generate and renew your Lets Encrypt certificates with 1 command. This is easily automatable to renew each 60 days, as advised.
You need nginx to answer on port 80 on all the domains you want a certificate for. Then you need to serve the challenge used by letsencrypt on /.well-known/acme-challenge
.
Then we invoke the letsencrypt command, telling the tool to write the challenge files in the directory we used as a root in the nginx configuration.
I redirect all HTTP requests on HTTPS, so my nginx config looks like :
server {