Skip to content

Instantly share code, notes, and snippets.

#!/usr/bin/env python
# -*- coding: utf8 -*-
import RPi.GPIO as GPIO
import MFRC522
import signal
from kivy.app import App
from kivy.uix.button import Button
class TestApp(App):
18H7aPasWJ77zq1a4GdK4MoaksbPPiQdXF
https://www.daupheus.com/rom-mod-sapphire-rx-580/
18H7aPasWJ77zq1a4GdK4MoaksbPPiQdXF
0x06fE1C97E78D4aAEC63db79cc5b8422ab8Ef61FF
-dpool stratum+tcp://dcred.mine.zpool.ca:5744 -dwal Dsk3CWFG2E4kVZRWRservJvxqDTNCkAB4jv -dpsw x
@vmwsree
vmwsree / conf.bat
Last active August 16, 2017 15:13
conf
setx GPU_FORCE_64BIT_PTR 0
setx GPU_MAX_HEAP_SIZE 100
setx GPU_USE_SYNC_OBJECTS 1
setx GPU_MAX_ALLOC_PERCENT 100
setx GPU_SINGLE_ALLOC_PERCENT 100
EthDcrMiner64.exe -epool asia1.ethermine.org:4444 -ewal 0x06fE1C97E78D4aAEC63db79cc5b8422ab8Ef61FF.InR2Rig001 -epsw x -dpool stratum+tcp://dcred.mine.zpool.ca:5744 -dwal Dsk3CWFG2E4kVZRWRservJvxqDTNCkAB4jv -dpsw x
{
"added_words":
[
"Saurabh",
"unsubscribed",
"postgres",
"sudo",
"bumpversion",
"django",
"gzip",
{
"added_words":
[
"Saurabh",
"unsubscribed",
"postgres",
"sudo",
"bumpversion",
"django",
"gzip",

WannaCry|WannaDecrypt0r NSA-Cyberweapon-Powered Ransomware Worm

  • Virus Name: WannaCrypt, WannaCry, WanaCrypt0r, WCrypt, WCRY
  • Vector: All Windows versions before Windows 10 are vulnerable if not patched for MS-17-010. It uses EternalBlue MS17-010 to propagate.
  • Ransom: between $300 to $600. There is code to 'rm' (delete) files in the virus. Seems to reset if the virus crashes.
  • Backdooring: The worm loops through every RDP session on a system to run the ransomware as that user. It also installs the DOUBLEPULSAR backdoor. It corrupts shadow volumes to make recovery harder. (source: malwarebytes)
  • Kill switch: If the website www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com is up the virus exits instead of infecting the host. (source: malwarebytes). This domain has been sinkholed, stopping the spread of the worm. Will not work if proxied (source).

update: A minor variant of the viru

add
/usr/local/bin/zsh
in /etc/shells
then
chsh -s $(which zsh)
~/.bash_aliases
alias python=python3
pip = pip3
fabric3
PATH="/Applications/Postgres.app/Contents/Versions/latest/bin:$PATH"