start new:
tmux
start new with session name:
tmux new -s myname
| <VirtualHost *> | |
| ServerName example.com | |
| WSGIDaemonProcess www user=max group=max threads=5 | |
| WSGIScriptAlias / /home/max/Projekte/flask-upload/flask-upload.wsgi | |
| <Directory /home/max/Projekte/flask-upload> | |
| WSGIProcessGroup www | |
| WSGIApplicationGroup %{GLOBAL} | |
| Order deny,allow |
| // XORCipher - Super simple encryption using XOR and Base64 | |
| // | |
| // Depends on [Underscore](http://underscorejs.org/). | |
| // | |
| // As a warning, this is **not** a secure encryption algorythm. It uses a very | |
| // simplistic keystore and will be easy to crack. | |
| // | |
| // The Base64 algorythm is a modification of the one used in phpjs.org | |
| // * http://phpjs.org/functions/base64_encode/ | |
| // * http://phpjs.org/functions/base64_decode/ |
Each of these commands will run an ad hoc http static server in your current (or specified) directory, available at http://localhost:8000. Use this power wisely.
$ python -m SimpleHTTPServer 8000| /* | |
| * reversed SafeArrayRedim() in oldaut32.dll (Windows XP) | |
| * for CVE-2014-6332 | |
| */ | |
| typedef struct tagSAFEARRAY | |
| { | |
| USHORT cDims; // number of dimensions | |
| USHORT fFeatures; // type of elements | |
| ULONG cbElements; // byte size per element |
1. install
brew install tor
brew install privoxy
2. copy and modify config file
| #!/system/bin/sh | |
| set -u | |
| ## ======================================================================================== | |
| ## alfred : manages an ArchLinux rootfs for enable LXC usage on Android | |
| ## ======================================================================================== | |
| PROGNAME="alfred" | |
| PROGVERS="0.0.6" | |
| PROGCONF="/data/$PROGNAME" | |
| PROGHELP="Usage: $PROGNAME [cmd] |
| #! /usr/bin/env python | |
| from configobj import ConfigObj | |
| import sys | |
| import StringIO | |
| import re | |
| from pprint import pprint | |
| if len(sys.argv) < 3: | |
| print 'Usage: ducky-convert.py <keyboard.properties> <layout.properties>' |
| #md5 hash of most used password 123456 | |
| #ref: https://twitter.com/TekDefense/status/294556153151647744 | |
| https://github.com/search?q=e10adc3949ba59abbe56e057f20f883e&type=Code&ref=searchresults | |
| #DB_PASSWORD | |
| #ref: http://seclists.org/fulldisclosure/2014/Mar/343 | |
| https://github.com/search?q=define%28%22DB_PASSWORD%22&type=Code&ref=searchresults | |
| #Possible SQL injection | |
| #ref: http://seclists.org/fulldisclosure/2013/Jun/15 |
| import sys | |
| ps_shellcode = '@(' | |
| with open(sys.argv[1], 'rb') as shellcode: | |
| byte = shellcode.read(1) | |
| while byte != '': | |
| ps_shellcode += '0x{}, '.format(byte.encode('hex')) | |
| byte = shellcode.read(1) |