I hereby claim:
- I am awcator on github.
- I am awcator (https://keybase.io/awcator) on keybase.
- I have a public key whose fingerprint is 30C9 833D 46FE EDCD 4BCB 0878 00F0 DD57 FE8E 6D16
To claim this, I am signing this object:
/** | |
* Author: Awcator | |
* Tool to guess the TCP sequence number and breaks that particular tcp connnection. There by providing a good defence for DDOS attacks. | |
* | |
* How?: | |
* Captures ack_seq,seq during 2nd stage of 3 way hand shake and performs attack for 4th hand shake | |
* suppose: 2nd Hand Shake: from port 4444 to port 469996 with SQN,ACK seq=781,ack_seq=694 | |
* then, craft a packet at 4th transaction as, port from 469996 to 4444 with seq as 694 and ack_seq as 781 with flags, Finish,Ack. | |
* Recomute Checksum and send packet | |
* Works on lo, need to create ethernet packets to send over network hardware. |
sudo apt update | |
sudo apt upgrade | |
#sudo apt install -y xfce4 xfce4-goodies vnc4server novnc websockify python-numpy chromium | |
sudo DEBIAN_FRONTEND=noninteractive apt-get -yq install xfce4 xfce4-goodies vnc4server novnc websockify python-numpy chromium | |
vncserver | |
vncserver -kill :1 | |
echo "#!/bin/bash" > ~/.vnc/xstartup | |
echo 'xrdb $HOME/.Xresources' >> ~/.vnc/xstartup |
// ==UserScript== | |
// @name Match Every Site | |
// @namespace https://targetwebsite.com/ | |
// @version 1.1 | |
// @description Bypass fullscreen/tabswtich/invisbility screen | |
// @author Dev | |
// @match *://*/* | |
// @grant unsafeWindow | |
// ==/UserScript== |
apk d original.apk | |
apk b /path/to/extracteAPK_contents -o mod.apk | |
keytool -genkey -keystore awcator1.keystore -validity 10000 -alias awcator1 -keyalg rsa | |
jarsigner -keystore awcator1.keystore -verbose mod.apk awcator1 |
ssh -i ~/.ssh/path/to/key -D 8080 -L localhost:8081:mega.nz:443 ubuntu@yourHost | |
#Now you can hit mega.nz from localhost:8081 as http_prxy | |
#or you can use socks5 proxy on port 8080 to hit mega |
import org.bouncycastle.asn1.ASN1Encodable; | |
import org.bouncycastle.asn1.DERSequence; | |
import org.bouncycastle.asn1.x500.X500Name; | |
import org.bouncycastle.asn1.x509.BasicConstraints; | |
import org.bouncycastle.asn1.x509.Extension; | |
import org.bouncycastle.asn1.x509.GeneralName; | |
import org.bouncycastle.asn1.x509.KeyUsage; | |
import org.bouncycastle.cert.X509CertificateHolder; | |
import org.bouncycastle.cert.X509v3CertificateBuilder; | |
import org.bouncycastle.cert.jcajce.JcaX509CertificateConverter; |
I hereby claim:
To claim this, I am signing this object:
This guide shows how to deploy an uncensored DeepSeek R1 Distill model to Google Cloud Run with GPU support and how to perform a basic, functional fine-tuning process. The tutorial is split into: