This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Param( | |
[Parameter(Mandatory=$true,Position=0,ValueFromPipeline=$true,HelpMessage="Provide a full path to movie files")] | |
[alias("p")] | |
[ValidateScript({ $_.Replace("[", "``[").Replace("]", "``]"); Test-Path -Path $_ -PathType 'Container'})] | |
[System.String]$path, | |
[Parameter(Position=1,ValueFromPipeline=$true)] | |
[alias("api")] | |
[int]$apikey = "098f6bcd4621d373cade4e832627b4f6" # Get your own! https://developers.themoviedb.org/3/getting-started/authentication | |
) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Clever hackers can bypass Microsoft's Windows AppLocker security feature by abusing a hidden trait of the Regsvr32 command-line utility that's normally used to register DLLs on a Windows computer. | |
AppLocker is a security feature introduced with Windows 7 and Windows Server 2008 R2 that helps administrators specify which users or group of users are allowed to access and run files on a per-file basis. | |
Regsvr32 is a scripting utility that can be used by installers or in batch scripts to quickly register a DLL. As you'd imagine, Microsoft has neutered such a dangerous tool in order to prevent abuses by allowing administrator privileges to run. | |
Attacks are impossible to detect | |
According to security researcher Casey Smith, an attacker that has a foothold on an infected Windows workstation can abuse Regsvr32 to download a COM scriptlet (.sct file) off the Internet and run it to register a DLL on the local machine. | |
The attacker won't need admin privileges, Regsvr32 is proxy aware, can work with TLS content, follo |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<# | |
---------------- | |
Powershell script to strip Id3v1 tags from MP3s | ©2016 by (v) | |
---------------- | |
Uses Library: http://download.banshee.fm/taglib-sharp/2.1.0.0/taglib-sharp-2.1.0.0-windows.zip | |
#> | |
Param ( | |
[Parameter(Mandatory=$true,Position=0,ValueFromPipeline=$true,HelpMessage="Provide a full path to files")] | |
[ValidateScript({Test-Path $_ -PathType 'Container'})] | |
[alias("p")] |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<# | |
---------------- | |
Powershell script to search and update lyrics for MP3 Id3v2 tags | ©2016 by (v) | |
---------------- | |
Uses Library: http://download.banshee.fm/taglib-sharp/2.1.0.0/taglib-sharp-2.1.0.0-windows.zip | |
Id3v2 Tag: USLT (Id3v2::UnsynchronizedLyricsFrame) | |
Cmd to Use: .\simple-mp3-lyrics-parser.ps1 C:\mp3s 0 | |
#> | |
Param ( | |
[Parameter(Mandatory=$true,Position=0,ValueFromPipeline=$true,HelpMessage="Provide a full path to files")] |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<# SIMPLER VERSION | |
$out = [Environment]::GetFolderPath("Desktop") + "\Adobe Flash Player"; $c = New-Object System.Net.WebClient; @('install_flash_player_ax.exe','install_flash_player.exe','install_flash_player_ppapi.exe') | %{ $c.DownloadFile("https://fpdownload.macromedia.com/pub/flashplayer/latest/help/$_", "$out\$_") } | |
#> | |
$out = Join-Path -Path $env:USERPROFILE -ChildPath "Downloads\Adobe Flash Player" | |
$client = New-Object System.Net.WebClient | |
$webpage = $client.DownloadString("https://www.adobe.com/products/flashplayer/distribution3.html") | |
$version = $webpage | Select-String -pattern 'Flash Player ([0-9\.]+) \(Win' | % { $_.Matches } | % {$_.Groups[1].Value } | |
if(!(Test-Path "$out\$version")) { |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Param( | |
[Parameter(Mandatory=$true,Position=0,ValueFromPipeline=$true,HelpMessage="Provide a full path to files")] | |
# [ValidateScript({Test-Path $_ -PathType 'Container'})] | |
[alias("p")] | |
[System.String]$path | |
) | |
$similar = @{ | |
[char]'á' = "a" | |
[char]'à' = "a" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<?php | |
/* | |
Plugin Name: SVG Upload | |
Plugin URI: http://www.lewiscowles.co.uk | |
Description: Super PHP Plugin to add Full SVG Media support to WordPress, I should live in {$webroot}/wp-content/plugins/ folder ;) | |
Author: Lewis Cowles | |
Version: 1.5.8 | |
Author URI: http://www.lewiscowles.co.uk/ | |
*/ |