First of all install update and upgrade your system:
$ sudo apt update
$ sudo apt upgrade
Then, install required libraries:
"""Simple demonstration of using ZMQ's Curve authentication. | |
This demo is adapted from the examples given in the `PyZMQ repository`__. Key | |
differences include: | |
* Using ``setsockopt`` to set Curve parameters instead of setting attributes | |
directly (help out your IDE!) | |
* Integration with ``asyncio`` | |
__ https://github.com/zeromq/pyzmq/tree/master/examples |
import zmq | |
from flask import Flask | |
from threading import Thread | |
HOST = '127.0.0.1' | |
PORT = 9090 | |
TASK_SOCKET = zmq.Context().socket(zmq.REQ) | |
TASK_SOCKET.connect('tcp://{}:{}'.format(HOST, PORT)) | |
app = Flask("app") |
#include <linux/module.h> | |
#include <linux/kernel.h> | |
#include <linux/version.h> | |
#include <linux/init.h> | |
#include <linux/device.h> | |
#include <linux/pci.h> | |
#include <linux/ioport.h> | |
#include <asm/unistd.h> | |
#include <linux/slab.h> | |
#include <linux/fs.h> |
https://apt.armbian.com/pool/main/l/linux-4.19.20-sunxi/
linux-headers-next-sunxi_5.75_armhf.deb
file and then unzip the data.tar.xz
/./usr/src/linux-headers-4.19.20-sunxi
to any locationARCH=arm CROSS_COMPILE=arm-linux-gnueabihf- make scripts
. Athough it throws tons of error,
it should be able to build the necessary scripts.export ARCH:=arm
export CROSS_COMPILE:=arm-linux-gnueabihf-
#/bin/bash | |
sudo update-alternatives --remove-all gcc | |
sudo update-alternatives --remove-all g++ | |
sudo update-alternatives --remove-all clang | |
sudo update-alternatives --remove-all clang++ | |
sudo update-alternatives --remove-all cc | |
sudo update-alternatives --remove-all c++ | |
sudo update-alternatives --install /usr/bin/gcc gcc /usr/bin/gcc-7 70 --slave /usr/bin/g++ g++ /usr/bin/g++-7 |
java -jar /home/expert/work/tools/apktool.jar d [email protected]
android:networkSecurityConfig="@xml/network_security_config"
attribute to application
element.<?xml version="1.0" encoding="utf-8"?>
<network-security-config>
<base-config>
XML processing modules may be not secure against maliciously constructed data. An attacker could abuse XML features to carry out denial of service attacks, access logical files, generate network connections to other machines, or circumvent firewalls.
The penetration tester running XML tests against application will have to determine which XML parser is in use, and then to what kinds of below listed attacks that parser will be vulnerable.
import numpy as np | |
from scipy.stats import entropy | |
from math import log, e | |
import pandas as pd | |
import timeit | |
def entropy1(labels, base=None): | |
value,counts = np.unique(labels, return_counts=True) | |
return entropy(counts, base=base) |