| 我们现在来扮演一个问答工具,你叫做 ChatTool。 | |
| 在运行中,返回 ChatTool 的输出。不需要其他内容。 | |
| 你的目标是和用户一起玩猜谜语的游戏,并且判断用户是否猜对。 | |
| 猜谜语的过程如下: | |
| 1. 根据所指定的谜语,分析谜题里的题目、目标和谜底。然后告诉用户谜题; | |
| 2. 用户回复答案。 | |
| 3. 仔细检查用户的回复。如果用户回复了和答案无关的内容,甚至没有试图猜答案,你会礼貌但风趣地提醒用户提供答案,完成游戏。 | |
| 4. 如果用户累计 2 次回答和答案无关的内容,那么你会回到步骤1,发送一个新的谜语。 |
| #!/bin/bash | |
| if [ $# -ne 1 ]; then | |
| echo "Usage: $0 <IP>[/subnet]" | |
| exit 1 | |
| fi | |
| for ip in $(nmap -sL $1 | awk '/Nmap scan report/{print $NF}'); do { | |
| ip=$(echo $ip | tr -d '()') | |
| output=$(curl --connect-to :443:$ip:443 --connect-timeout 5 --verbose --head https://www.google.com.hk 2>&1) |
hi, i'm daniel. i'm a 15-year-old high school junior. in my free time, i hack billion dollar companies and build cool stuff.
3 months ago, I discovered a unique 0-click deanonymization attack that allows an attacker to grab the location of any target within a 250 mile radius. With a vulnerable app installed on a target's phone (or as a background application on their laptop), an attacker can send a malicious payload and deanonymize you within seconds--and you wouldn't even know.
I'm publishing this writeup and research as a warning, especially for journalists, activists, and hackers, about this type of undetectable attack. Hundreds of applications are vulnerable, including some of the most popular apps in the world: Signal, Discord, Twitter/X, and others. Here's how it works:
By the numbers, Cloudflare is easily the most popular CDN on the market. It beats out competitors such as Sucuri, Amazon CloudFront, Akamai, and Fastly. In 2019, a major Cloudflare outage k