I hereby claim:
- I am zevlag on github.
- I am zevlag (https://keybase.io/zevlag) on keybase.
- I have a public key whose fingerprint is 12C5 E861 9F36 B0BB 86B5 BE9A EA1F 03E2 0CF2 FDBD
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
To show progress statistics for dd in OS X:
dd if=Downloads/ISOs/kali-linux-1.1.0a-amd64.iso of=/dev/rdisk2 bs=1m
Now hit CTRL+t
or
From another terminal
sudo killall -INFO dd
On Linux, you have to sind a USR1 instead of INFO signal.
pkill -USR1 -x dd
for f in *; do [ -d ./"$f" ] && find ./"$f" -maxdepth 1 -exec echo \; | wc -l && echo $f; done |
<?xml version="1.0" encoding="UTF-8"?> | |
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> | |
<plist version="1.0"> | |
<dict> | |
<key>Label</key> | |
<string>be.quiet.job</string> | |
<key>ProgramArguments</key> | |
<array> | |
<string>/usr/bin/osascript</string> | |
<string>-e</string> |
#!/usr/bin/python | |
from smb.SMBConnection import SMBConnection | |
import random, string | |
from smb import smb_structs | |
smb_structs.SUPPORT_SMB2 = False | |
import sys | |
# Just a python version of a very simple Samba exploit. | |
# It doesn't have to be pretty because the shellcode is executed |
List of vulnerable services
Vulnerability Detection: