With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>With Rubeus version with brute module:
With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>With Rubeus version with brute module:
Just plug in your own values for registry and repo/image name.
registry='localhost:5000'
name='my-image'
curl -v -sSL -X DELETE "http://${registry}/v2/${name}/manifests/$(
curl -sSL -I \
-H "Accept: application/vnd.docker.distribution.manifest.v2+json" \Use your service account's key JSON file to get an access token to call Google APIs.
Good for seeing how things work, including the creation of JWT token.
To create a JWT token, you can replace create-jwt-token.sh script with tools like step.
If you just want to get an access token for a service account,
| http://download.xs4all.nl/test/10GB.bin | |
| http://ftp.iinet.net.au/test500MB.dat | |
| http://lg-tor.fdcservers.net/10GBtest.zip | |
| http://lg.ams2-c.fdcservers.net/10GBtest.zip | |
| http://lg.chi2-c.fdcservers.net/10GBtest.zip | |
| http://lg.den2-c.fdcservers.net/10GBtest.zip | |
| http://lg.fra2-c.fdcservers.net/10GBtest.zip | |
| http://lg.la2-c.fdcservers.net/10GBtest.zip | |
| http://lg.lon-c.fdcservers.net/10GBtest.zip | |
| http://lg.mad-c.fdcservers.net/10GBtest.zip |
curl to get the JSON response for the latest releasegrep to find the line containing file URLcut and tr to extract the URLwget to download itcurl -s https://api.github.com/repos/jgm/pandoc/releases/latest \
| grep "browser_download_url.*deb" \
| cut -d : -f 2,3 \
| tr -d \" \| #!/usr/bin/env python3 | |
| #ODI DFP-34X-2C2 MAC_KEY key generator by rajkosto | |
| import sys | |
| import string | |
| import hashlib | |
| args = sys.argv | |
| if len(args) != 2: | |
| sys.exit("Usage: odi_keygen.py YOURMACADDR") |
| isolation.tools.getPtrLocation.disable = "TRUE" | |
| isolation.tools.setPtrLocation.disable = "TRUE" | |
| isolation.tools.setVersion.disable = "TRUE" | |
| isolation.tools.getVersion.disable = "TRUE" | |
| monitor_control.disable_directexec = "TRUE" | |
| monitor_control.disable_chksimd = "TRUE" | |
| monitor_control.disable_ntreloc = "TRUE" | |
| monitor_control.disable_selfmod = "TRUE" | |
| monitor_control.disable_reloc = "TRUE" | |
| monitor_control.disable_btinout = "TRUE" |
| ######################################################################### | |
| # ================================================== # | |
| # $ Mikrotik RouterOS update script for CloudFlare $ # | |
| # ================================================== # | |
| # # | |
| # - You need a CloudFlare account & api key (look under settings), # | |
| # a zone and A record in it # | |
| # - All variables in first section are obvious, except CFid, # | |
| # To obtain CFzoneid use following command in any unix shell: # | |
| # curl -X GET "https://api.cloudflare.com/client/v4/zones" -H "X-Auth-Email: YOUR_EMAIL" -H "X-Auth-Key: YOUR_API_KEY" -H "Content-Type: application/json" | python -mjson.tool |
| # /opt/zookeeper/conf/java.env | |
| ZOO_LOG4J_PROP="INFO,ROLLINGFILE" | |
| ZOO_LOG_DIR="/var/log/zookeeper/" |
| copy proxmox iso on usb stick | |
| #fdisk -l | |
| #mount /dev/sdb1 /mnt | |
| #mount -o loop -t iso9660 /mnt/proxmox_1-7.iso /mnt | |
| #cd /mnt | |
| #chroot /mnt sbin/unconfigured.sh |