With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>
With Rubeus version with brute module:
With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>
With Rubeus version with brute module:
Just plug in your own values for registry and repo/image name.
registry='localhost:5000'
name='my-image'
curl -v -sSL -X DELETE "http://${registry}/v2/${name}/manifests/$(
curl -sSL -I \
-H "Accept: application/vnd.docker.distribution.manifest.v2+json" \
Use your service account's key JSON file to get an access token to call Google APIs.
Good for seeing how things work, including the creation of JWT token.
To create a JWT token, you can replace create-jwt-token.sh
script with tools like step.
If you just want to get an access token for a service account,
http://download.xs4all.nl/test/10GB.bin | |
http://ftp.iinet.net.au/test500MB.dat | |
http://lg-tor.fdcservers.net/10GBtest.zip | |
http://lg.ams2-c.fdcservers.net/10GBtest.zip | |
http://lg.chi2-c.fdcservers.net/10GBtest.zip | |
http://lg.den2-c.fdcservers.net/10GBtest.zip | |
http://lg.fra2-c.fdcservers.net/10GBtest.zip | |
http://lg.la2-c.fdcservers.net/10GBtest.zip | |
http://lg.lon-c.fdcservers.net/10GBtest.zip | |
http://lg.mad-c.fdcservers.net/10GBtest.zip |
curl
to get the JSON response for the latest releasegrep
to find the line containing file URLcut
and tr
to extract the URLwget
to download itcurl -s https://api.github.com/repos/jgm/pandoc/releases/latest \
| grep "browser_download_url.*deb" \
| cut -d : -f 2,3 \
| tr -d \" \
#!/usr/bin/env python3 | |
#ODI DFP-34X-2C2 MAC_KEY key generator by rajkosto | |
import sys | |
import string | |
import hashlib | |
args = sys.argv | |
if len(args) != 2: | |
sys.exit("Usage: odi_keygen.py YOURMACADDR") |
isolation.tools.getPtrLocation.disable = "TRUE" | |
isolation.tools.setPtrLocation.disable = "TRUE" | |
isolation.tools.setVersion.disable = "TRUE" | |
isolation.tools.getVersion.disable = "TRUE" | |
monitor_control.disable_directexec = "TRUE" | |
monitor_control.disable_chksimd = "TRUE" | |
monitor_control.disable_ntreloc = "TRUE" | |
monitor_control.disable_selfmod = "TRUE" | |
monitor_control.disable_reloc = "TRUE" | |
monitor_control.disable_btinout = "TRUE" |
######################################################################### | |
# ================================================== # | |
# $ Mikrotik RouterOS update script for CloudFlare $ # | |
# ================================================== # | |
# # | |
# - You need a CloudFlare account & api key (look under settings), # | |
# a zone and A record in it # | |
# - All variables in first section are obvious, except CFid, # | |
# To obtain CFzoneid use following command in any unix shell: # | |
# curl -X GET "https://api.cloudflare.com/client/v4/zones" -H "X-Auth-Email: YOUR_EMAIL" -H "X-Auth-Key: YOUR_API_KEY" -H "Content-Type: application/json" | python -mjson.tool |
# /opt/zookeeper/conf/java.env | |
ZOO_LOG4J_PROP="INFO,ROLLINGFILE" | |
ZOO_LOG_DIR="/var/log/zookeeper/" |
copy proxmox iso on usb stick | |
#fdisk -l | |
#mount /dev/sdb1 /mnt | |
#mount -o loop -t iso9660 /mnt/proxmox_1-7.iso /mnt | |
#cd /mnt | |
#chroot /mnt sbin/unconfigured.sh |