Apple removed TNT’s certificate, so the app will crash after July 12th. The current solution is to sign it yourself.
Run in Terminal
codesign --force --deep --sign - /Applications/name.app
if Permission denied don't forget to add sudo
example:
Apple removed TNT’s certificate, so the app will crash after July 12th. The current solution is to sign it yourself.
Run in Terminal
codesign --force --deep --sign - /Applications/name.app
if Permission denied don't forget to add sudo
example:
XCTest is the default test harness on iOS an Apple’s other platforms. It provides support for organizing test cases and asserting expectations in your application code, and reporting the status of those expectations. It's not as fancy as some of the BDD frameworks like Quick and Cedar, but it has gotten much better than it used to be, and is my preferred test framework these days.
One place where the XCTest assertion utilities fall a bit short has been with managing Optional variables in swift. The default use of XCTAssertNotNil
don't provide any mechanism for unwrapping, easily leading to assertion checks like this:
class TestCaseDefault: XCTestCase {
Empire and Metasploit 101 | |
Goal: Use Empire and metasploit in example situation of network exploitation and post-exploitation host enumeration. We will exploit a network service on a Windows 7 VM, and then use our low-privilege shell to then execute an empire powershell stager, which will create an Empire agent on the local Windows 7 VM. After this, we will look through the various options available as an Empire agent. | |
Following this, we will generate a DLL stager within Empire, and then use our existing meterpreter session on the Windows 7 VM to perform a DLL injection attack, to inject another Empire agent, directly into memory. | |
Pre-Stuff: Empire is not just for windows. It has python based agents that can run on OS X and Linux. It's communication profile between agents and listeners is configurable, similar to CobaltStrikes. You can use pre-built or custom-made ones to employ such functionality. Empire is designed to stay off disk and in memory as much as possible. Empire does contain modules that will |
Setup for
First, install all three tools above. (Or just iTerm2 if you don't care about keyboard speedups; or just Karabiner Elements & Hammerspoon if you don't care about iTerm2).
Then clone this repository to your local computer: run this in Terminal:
http://stackoverflow.com/questions/24380159/corebluetooth-and-wifi-interference
http://lists.apple.com/archives/bluetooth-dev/2013/Aug/msg00023.html
This is a well known issue, and it has a solution that is confirmed to work for the Mac side.
sudo defaults write /Library/Preferences/com.apple.airport.bt.plist bluetoothCoexMgmt Hybrid
After you run this script, the issue will go away and BT connections will remain stable.
https://github.com/PacktPublishing free to download books code by Packet
https://github.com/EbookFoundation/free-programming-books Very immense
;; For ClojureDart in a bout of NIH syndrome we rewrote Clojure for | |
;; it seems to be faster because we don't use concat | |
(defmacro for | |
"List comprehension. Takes a vector of one or more | |
binding-form/collection-expr pairs, each followed by zero or more | |
modifiers, and yields a lazy sequence of evaluations of expr. | |
Collections are iterated in a nested fashion, rightmost fastest, | |
and nested coll-exprs can refer to bindings created in prior | |
binding-forms. Supported modifiers are: :let [binding-form expr ...], | |
:while test, :when test. |
import Foundation | |
import CryptoSwift | |
extension String { | |
func aesEncrypt(key: String, iv: String) throws -> String{ | |
let data = self.dataUsingEncoding(NSUTF8StringEncoding) | |
let enc = try AES(key: key, iv: iv, blockMode:.CBC).encrypt(data!.arrayOfBytes(), padding: PKCS7()) | |
let encData = NSData(bytes: enc, length: Int(enc.count)) | |
let base64String: String = encData.base64EncodedStringWithOptions(NSDataBase64EncodingOptions(rawValue: 0)); |
#CommentFlag // | |
#InstallKeybdHook | |
// Author: Jarvis Prestidge | |
// Description: Simulates my preferred keyboard layout, similiar to that of the Pok3r 60% keyboard | |
// on any keyboard without programmable keys. i.e. my laptop ^^ | |
// <COMPILER: v1.1.22.00> | |
Nox, despite being the most feature-filled Android emulator, has a lot of negativity surrounding it due to their antics when it comes to making income off of their program. It is known for running repeated advertisments in the background, calling home and passing along system information (outside of your Android instance) as well as a vast amount of potentially sensitive data in an encrypted payload back to their multitude of servers. With the following preventitive measures, we can stop a majority of this happening as well as greatly improve the overall performance.
Download and Install a fresh copy of Nox. The latest version is fine (for now). If you already have it installed, that is fine too. No need to reinstall.
Enable Root Mode on Nox by clicking the gear icon and then checking the Root Startup
box.
Install a new Launcher from the Play Store. ANYTHING but Nox's default. I suggest [Nova Launcher](https://play.google.com/s