I hereby claim:
- I am suidroot on github.
- I am suidroot (https://keybase.io/suidroot) on keybase.
- I have a public key ASCyZo21ScngWPsiLWLf3bNhMteyMMpJaSfroNYvz3mHMgo
To claim this, I am signing this object:
import idaapi | |
import idautils | |
import idc | |
# Function_Name,Address | |
lines = '''function_name,12023345''' | |
def do_rename(l): | |
splitted = l.split(',') | |
straddr = splitted[1] |
tell application "System Events" | |
tell process "Webex Meetings" | |
activate | |
if exists (window "Webex") then | |
set window_name to "Webex" | |
end if | |
if exists (window "Cisco Webex Meetings") then | |
set window_name to "Cisco Webex Meetings" | |
end if |
#!/bin/bash | |
# | |
# | |
FILE_LOCATION="$HOME/SynologyDrive/Drive/Documents/Police Logs" | |
TEMP_LOCATION="$HOME/Temp/PPD-DOWNLOADS-$(date +%Y%m%d%H%M)" | |
# | |
### Daily Media Logs | |
# https://www.portlandmaine.gov/739/Daily-Media-Logs | |
DAYS_OF_WEEK=("monday" "tuesday" "wednesday" "thursday" "friday" "saturday" "sunday") | |
MEDIA_LOG_URLS=("https://www.portlandmaine.gov/DocumentCenter/View/2263" |
! Uses CISCO-NHRP-EXT-MIB and NHRP-MIB | |
! Enable DMVPN Syslog (bonus) | |
logging dmvpn | |
interface t0 | |
! enable Tunnel interface state tracking based on nhrp state | |
if-state nhrp | |
! enable NHRP-SNMP Agent |
import re | |
import zlib | |
pdf = open("Receipt.pdf", "rb").read() | |
stream = re.compile(b'.*?FlateDecode.*?stream(.*?)endstream', re.S) | |
counter = 0 | |
for s in re.findall(stream,pdf): | |
print("---------------------- " + str(counter) + "---------- ") |
#!/bin/sh | |
# | |
# Backup Rawfiles from Lightroom CC Database | |
# | |
# LR Database Path | |
SRCPATH="$HOME/Pictures/Lightroom Library.lrlibrary/xxx/originals" | |
DSTPATH="/Volumes/MyPictures" | |
# Dry Run enabled | |
#RSYNCPARAMS="-ruvn --progress" |
#!/bin/sh | |
GHIDRA_SCRIPTS="$HOME/test/ghidra_scripts" | |
GHIDRA_TEMP="ghidra_temp" | |
declare -a REPOS=( | |
"https://github.com/AllsafeCyberSecurity/LazyGhidra" | |
"https://github.com/reb311ion/replica" | |
"https://github.com/schlafwandler/ghidra_ExportToX64dbg" |
import png | |
import struct | |
def print_list(thelist, quantity): | |
if (quantity == 0): | |
quantity = len(thelist) | |
#print ("Decimal: ", end="") | |
#for i in range(0, quantity): |
Reference url: http://www.brocade.com/downloads/documents/html_product_manuals/vyatta/vyatta_5400_manual/wwhelp/wwhimpl/js/html/wwhelp.htm | |
Create the directory for certificate management | |
Instruction: login to the vyatta and make sure you are at the $ prompt: | |
example: vyatta@HOSTNAME:~$ | |
##creates the directory## | |
vyatta@HOSTNAME:~$ mkdir /config/auth/ca (note: there is a space after mkdir) | |
##copies files to new directory## | |
vyatta@HOSTNAME:~$ cp -r /usr/share/doc/openvpn/examples/easy-rsa/2.0/* /config/auth/ca |
I hereby claim:
To claim this, I am signing this object: