Since Twitter doesn't have an edit button, it's a suitable host for JavaScript modules.
Source tweet: https://twitter.com/rauchg/status/712799807073419264
const leftPad = await requireFromTwitter('712799807073419264');Since Twitter doesn't have an edit button, it's a suitable host for JavaScript modules.
Source tweet: https://twitter.com/rauchg/status/712799807073419264
const leftPad = await requireFromTwitter('712799807073419264');| #!/bin/sh | |
| # Set $PUUSH_API_KEY to your key and export it. | |
| # The key is found on <http://puush.me/account/settings>. | |
| if [ -z "$PUUSH_API_KEY" ]; then | |
| echo "puu: please export api key" 1>&2 | |
| exit 1 | |
| fi | |
| for file in "$@"; do |
You do not need a separate /boot partition unless you have an LVM setup (used in dm-crypt setups).
Run ubiquity -b to open the installer with the option of skipping grub installation (since we're using systemd-boot).
When you get to the screen "Ubuntu has finished installation" choose Continue testing.
Open a Terminal.
Chroot into the new system.
| | | | |
| | a w r i t e u p r e l e a s e b y r o l | | |
| | ________ ___ ________ ________ | | |
| | <_ __ \/ \/ \/ ____ \ | | |
| | T T<___/\___/\_ /\ _/\ \__j _/ | | |
| | | | T T T / \ T__\____ T | | |
| | | | | | | \ / |T T T | | | |
| | l__j_____l___j_l__><__j| | | | | | |
| | T _______ T | ___j | l___j | | | |
| | | T __T |_j l_______l________j | |
(Tested with KeePassXC on Fedora 25)
By default when using GNOME Keyring you have a keyring that is unlocked when you log in (usually called "Login"). You can make use of that by storing a KeePass database password in this keyring and using it to automatically unlock your KeePass database.
Store the KeePass database password in GNOME Keyring. You'll have to set a label and at least one attribute/value pair. The label is displayed in a GNOME keyring manager (e.g. Seahorse), the attribute/value pair should be a unique identifier because it's needed for the lookup. I suggest to use keepass as attribute and the database name as value (make sure it doesn't contain any spaces).
secret-tool store --label="KeePass <database_name>" keepass <database_name>
Then create a script to launch and immediately unlock your KeePass database.
www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com is up the virus exits instead of infecting the host. (source: malwarebytes). This domain has been sinkholed, stopping the spread of the worm. Will not work if proxied (source).update: A minor variant of the viru
| #!ipxe | |
| kernel http://example.com/linux initrd=initrd.gz auto url=http://example.com/preseed.cfg | |
| initrd http://example.com/initrd.gz | |
| boot |
| $CimSession = New-CimSession -ComputerName 10.0.0.2 | |
| $FilePath = 'C:\Windows\System32\notepad.exe' | |
| # PS_ModuleFile only implements GetInstance (versus EnumerateInstance) so this trick below will force a "Get" operation versus the default "Enumerate" operation. | |
| $PSModuleFileClass = Get-CimClass -Namespace ROOT/Microsoft/Windows/Powershellv3 -ClassName PS_ModuleFile -CimSession $CimSession | |
| $InMemoryModuleFileInstance = New-CimInstance -CimClass $PSModuleFileClass -Property @{ InstanceID= $FilePath } -ClientOnly | |
| $FileContents = Get-CimInstance -InputObject $InMemoryModuleFileInstance -CimSession $CimSession | |
| $FileLengthBytes = $FileContents.FileData[0..3] | |
| [Array]::Reverse($FileLengthBytes) |
| #!/bin/bash | |
| # Nmap can crash when scanning large ranges | |
| # To use this script, start your scan with whatever | |
| # nmap options you want making sure you use -oA <filename> | |
| # or -oG <filename> (you need the gnmap file) then cancel | |
| # the scan. replace <filename> below and run this script. | |
| # It will also record when it failed to a file called failed.txt | |
| until nmap --resume <filename>.gnmap |
| # Procmon Rule Parser v0.02 | |
| # Brian Baskin - @bbaskin | |
| # Reads default rules from an exported Procmon Configuration (.PMC) or Procmon Filter (.PMF) file | |
| # Example output: | |
| """ | |
| 12:09:59-bbaskin@~/Development/Noriben$ python parse_procmon_filters.py -f ProcmonConfiguration.pmc | |
| [Exclude] Process Name is Procmon64.exe | |
| [Exclude] Operation is QueryStandardInformationFile | |
| [Exclude] Operation is RegOpenKey | |
| [Exclude] Operation is NotifyChangeDirectory |