does not handle input box itself
# cat /etc/iptables/rules.v4
# Generated by iptables-save v1.8.9 (nf_tables) on Mon Jun 5 13:36:08 2023
*filter
:INPUT ACCEPT [5:208]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [170:16192]
:DOCKER-USER - [0:0]
does not handle input box itself
# cat /etc/iptables/rules.v4
# Generated by iptables-save v1.8.9 (nf_tables) on Mon Jun 5 13:36:08 2023
*filter
:INPUT ACCEPT [5:208]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [170:16192]
:DOCKER-USER - [0:0]
create new gmail account
create new form forms.google.com
note the link taken directly from addressbar
Finally after years ;/
The critical part is to separate source code updates as quilt series with
gbp pq
but changes to debian/
directory keep as separate patches in
the base branch (not being quilted) !
coverage: | |
vendor/bin/simple-phpunit --stop-on-error --coverage-clove .coverage.clove | |
php bin/coverage_checker.php .coverage.clove 100 | tee .coverage.log |
from flask import Flask, send_file, url_for | |
app = Flask(__name__) | |
@app.route('/page1') | |
def page1(): | |
# would be a render_template() at last | |
return '<img src="' + url_for('image1') + '">' |
autocmd FileType yaml setlocal expandtab tabstop=2 autoindent shiftwidth=2 number softtabstop=0 cursorcolumn |
<?php | |
# coverage-checker2.php, improved version | |
# https://ocramius.github.io/blog/automated-code-coverage-check-for-github-pull-requests-with-travis/ | |
# https://stackoverflow.com/questions/13592547/how-to-group-numbers-in-ranges-using-php | |
function format_sequence($numbers) { | |
$groups = []; | |
$result = []; | |
sort($numbers); |
With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>
With Rubeus version with brute module:
#!/usr/bin/env python3 | |
import logging | |
from pprint import pprint | |
from lark import Lark, Transformer | |
""" | |
Boolean expression definition widely recognizes basic building blocks as | |
'terms' and 'factors', do not confuse them with parser's terminals. Also note |
## hacked together by @JohnLaTwC, Nov 2016, v 0.5 | |
## This script attempts to decode common PowerShell encoded scripts. This version handles: | |
## * base64 data which encode unicode, gzip, or deflate encoded strings | |
## * it can operate on a file or stdin | |
## * it can run recursively in the event of multiple layers | |
## With apologies to @Lee_Holmes for using Python instead of PowerShell | |
## | |
import sys | |
import zlib | |
import re |