username: pi
password: raspberry
Need to add US support in addition to default GB, including language, keyboard, etc.
$ raspi-config
#define NCRYPT_VIRTUAL_ISO_MAYBE 0x10000 | |
#define NCRYPT_VIRTUAL_ISO 0x20000 | |
#define NCRYPT_PER_BOOT_KEY 0x40000 | |
NTSTATUS kuhl_m_standard_test(int argc, wchar_t * argv[]) | |
{ | |
SECURITY_STATUS status; | |
NCRYPT_PROV_HANDLE hCngProv = 0; | |
NCRYPT_KEY_HANDLE hCngKey = 0; | |
DWORD keyLen = 2048; |
#Author :LiteSpeedtech | |
#date :20191023 | |
#version :1.7.3 | |
#Require :Prepare site map XML | |
# Allow LSCache crawler | |
#======================================================= | |
AGENTDESKTOP='User-Agent: lscache_runner' | |
AGENTMOBILE='User-Agent: lscache_runner iPhone' | |
SVALUE="0.1" |
typedef interface IEditionUpgradeManager IEditionUpgradeManager; | |
typedef struct IEditionUpgradeManagerVtbl { | |
BEGIN_INTERFACE | |
HRESULT(STDMETHODCALLTYPE *QueryInterface)( | |
__RPC__in IEditionUpgradeManager * This, | |
__RPC__in REFIID riid, |
using System; | |
using System.EnterpriseServices; | |
using System.Runtime.InteropServices; | |
using System.Reflection; | |
using System.Reflection.Emit; | |
using System.Collections; | |
using System.Collections.Generic; |
/* | |
* watch_unix_socket.stp | |
* | |
* This is a simply more modern version of the script found here: | |
* https://sourceware.org/systemtap/wiki/WSunixSockets | |
* | |
* The first argument is the location of the file descriptor for a UNIX socket. | |
* To find this address, for example, for the Docker socket run: | |
* | |
* # lsof 2>&1 | awk '/docker.sock/ {print $7}' | grep -v '0t0' | sort -u |
// $ frida -l antiroot.js -U -f com.example.app --no-pause | |
// CHANGELOG by Pichaya Morimoto (p.morimoto@sth.sh): | |
// - I added extra whitelisted items to deal with the latest versions | |
// of RootBeer/Cordova iRoot as of August 6, 2019 | |
// - The original one just fucked up (kill itself) if Magisk is installed lol | |
// Credit & Originally written by: https://codeshare.frida.re/@dzonerzy/fridantiroot/ | |
// If this isn't working in the future, check console logs, rootbeer src, or libtool-checker.so | |
Java.perform(function() { | |
var RootPackages = ["com.noshufou.android.su", "com.noshufou.android.su.elite", "eu.chainfire.supersu", |
{ | |
"mode": "patterns", | |
"proxySettings": [ | |
{ | |
"address": "127.0.0.1", | |
"port": 8080, | |
"username": "", | |
"password": "", | |
"type": 1, | |
"title": "127.0.0.1:8080", |
# CVE-2018-6671 McAfee ePO 5.9.1 Registered Executable Local Access Bypass | |
# Specifying an X-Forwarded-For header bypasses the local only check | |
# https://kc.mcafee.com/corporate/index?page=content&id=SB10240 | |
# https://nvd.nist.gov/vuln/detail/CVE-2018-6671 | |
# | |
# 2019 @leonjza | |
# | |
# Tested on ePO v5.9.1, missing hotfix EPO5xHF1229850 | |
POST /Notifications/testRegExe.do HTTP/1.1 |
param( | |
[Parameter(Mandatory)] | |
[string]$Path | |
) | |
#Created by Pierre.Audonnet@microsoft.com | |
# | |
#Got keytab structure from http://www.ioplex.com/utilities/keytab.txt | |
# | |
# keytab { |