https://www.facebook.com/help/contact/357439354283890
Let us know what we can do to improve your experience with profile connections.
https://www.facebook.com/help/contact/357439354283890
Let us know what we can do to improve your experience with profile connections.
:: | |
::####################################################################### | |
:: | |
:: Change file associations to protect against common ransomware attacks | |
:: Note that if you legitimately use these extensions, like .bat, you will now need to execute them manually from cmd or powershell | |
:: Alternatively, you can right-click on them and hit 'Run as Administrator' but ensure it's a script you want to run :) | |
:: --------------------- | |
ftype htafile="%SystemRoot%\system32\NOTEPAD.EXE" "%1" | |
ftype WSHFile="%SystemRoot%\system32\NOTEPAD.EXE" "%1" | |
ftype batfile="%SystemRoot%\system32\NOTEPAD.EXE" "%1" |
#!/bin/bash | |
#Script to Scan All Sites Found With A Simple NMAP Scan With Burp. | |
sites=$(nmap "$1" --open 443 --resolve-all --open -oG - | awk 'NR!=1 && /open/{print $2}') | |
for site in $sites | |
do | |
curl -vgw "\\n" 'http://127.0.0.1:1337/v0.1/scan' -d '{"urls":["'"$site"'"]}' > /dev/null 2>&1 | |
printf "Scanning %s with burp.\\n" "$site" | |
done |
<html> | |
<!-- This is a very simple Proof of Concepts of just one of the possible attacks | |
described at https://bugzilla.mozilla.org/show_bug.cgi?id=1487081 | |
You can give it a try by following the instruction at | |
https://dev.to/shamar/the-meltdown-of-the-web-4p1m | |
Just please, remember to restore your /etc/hosts after. | |
--> | |
<head> | |
<script type="text/javascript"> |
## AWS | |
# from http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-metadata.html#instancedata-data-categories | |
http://169.254.169.254/latest/user-data | |
http://169.254.169.254/latest/user-data/iam/security-credentials/[ROLE NAME] | |
http://169.254.169.254/latest/meta-data/iam/security-credentials/[ROLE NAME] | |
http://169.254.169.254/latest/meta-data/ami-id | |
http://169.254.169.254/latest/meta-data/reservation-id | |
http://169.254.169.254/latest/meta-data/hostname | |
http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key |
0x00sec.org | |
100-bal.ru | |
123kubo.info | |
123moviesfull.co | |
123movies.re | |
1337x.io | |
141jav.com | |
14byte.net | |
1568783.com | |
1587865.com |
$ git config --global user.name "Arsene Lupin"
Lost in Translation - a repository of the leaked tools
MS17-010 - port of some of the exploits to Windows 10
Windows Registry Editor Version 5.00 | |
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run] | |
"WindowsDefender"=hex:06,00,00,00,00,00,00,00,00,00,00,00 | |
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] | |
"WindowsDefender"=hex(2):22,00,25,00,50,00,72,00,6f,00,67,00,72,00,61,00,6d,00,\ | |
46,00,69,00,6c,00,65,00,73,00,25,00,5c,00,57,00,69,00,6e,00,64,00,6f,00,77,\ | |
00,73,00,20,00,44,00,65,00,66,00,65,00,6e,00,64,00,65,00,72,00,5c,00,4d,00,\ | |
53,00,41,00,53,00,43,00,75,00,69,00,4c,00,2e,00,65,00,78,00,65,00,22,00,00,\ |