I hereby claim:
- I am busterb on github.
- I am busterb (https://keybase.io/busterb) on keybase.
- I have a public key whose fingerprint is A1EB 079B 8D3E B92B 4EBD 3139 663A F51B D5E4 D8D5
To claim this, I am signing this object:
#!/usr/bin/env python | |
import random, sys, os | |
random.seed() | |
nonword = "\n" # Since we split on whitespace, this can never be a word | |
w1 = nonword | |
w2 = nonword | |
# GENERATE TABLE |
OpenSSL | |
bcook@testing02:~/libressl$ /usr/bin/openssl speed aes | |
Doing aes-128 cbc for 3s on 16 size blocks: 17657948 aes-128 cbc's in 2.99s | |
Doing aes-128 cbc for 3s on 64 size blocks: 5088345 aes-128 cbc's in 2.99s | |
Doing aes-128 cbc for 3s on 256 size blocks: 1297264 aes-128 cbc's in 2.99s | |
Doing aes-128 cbc for 3s on 1024 size blocks: 324907 aes-128 cbc's in 2.99s | |
Doing aes-128 cbc for 3s on 8192 size blocks: 40847 aes-128 cbc's in 3.00s | |
Doing aes-192 cbc for 3s on 16 size blocks: 16173463 aes-192 cbc's in 2.99s | |
Doing aes-192 cbc for 3s on 64 size blocks: 4271739 aes-192 cbc's in 2.99s | |
Doing aes-192 cbc for 3s on 256 size blocks: 1084255 aes-192 cbc's in 2.99s |
#!/bin/sh | |
#git clone https://bitbucket.org/braindamaged/openbsd-src.git | |
(cd openbsd-src; | |
git pull) | |
for dir in libssl libcrypto; do | |
echo $dir | |
rm -fr $dir-openbsd | |
cp -ax openbsd-src ${dir}-openbsd | |
(cd ${dir}-openbsd; |
/* | |
* HAVEGE: HArdware Volatile Entropy Gathering and Expansion | |
* | |
* Copyright (C) 2006-2007 Christophe Devine | |
* | |
* Redistribution and use in source and binary forms, with or without | |
* modification, are permitted provided that the following conditions | |
* are met: | |
* | |
* * Redistributions of source code must retain the above copyright |
# $Id: PKGBUILD 107711 2014-03-18 17:19:21Z bpiotrowski $ | |
# Maintainer: Bartłomiej Piotrowski <[email protected]> | |
# Maintainer: Sébastien Luttringer | |
# Contributor: Sergej Pupykin <[email protected]> | |
# Contributor: Miroslaw Szot <[email protected]> | |
pkgname=nginx-pouar | |
provides=('nginx') | |
conflicts=('nginx') | |
replaces=('nginx') |
openbsd/src/lib$ git shortlog -sn libssl libcrypto libtls|head -n 12 | |
449 jsing | |
350 miod | |
241 deraadt | |
183 tedu | |
135 beck | |
99 markus | |
87 djm | |
51 bcook | |
40 guenther |
I hereby claim:
To claim this, I am signing this object:
#!/usr/bin/env python | |
import os, sys, urllib2, sgmllib, time, random, subprocess, glob | |
class MyParser(sgmllib.SGMLParser): | |
def parse(self, s): | |
self.inside_title = False | |
self.title = "" | |
self.feed(s) |
--- a/lib/msf/core/exploit/remote/browser_exploit_server.rb | |
+++ b/lib/msf/core/exploit/remote/browser_exploit_server.rb | |
@@ -103,7 +103,8 @@ module Msf | |
register_advanced_options([ | |
OptString.new('CookieName', [false, "The name of the tracking cookie", DEFAULT_COOKIE_NAME]), | |
OptString.new('CookieExpiration', [false, "Cookie expiration in years (blank=expire on exit)"]), | |
- OptString.new('Custom404', [false, "An external custom 404 URL (Example: http://example.com/404.html)"]) | |
+ OptString.new('Custom404', [false, "An external custom 404 URL (Example: http://example.com/404.html)"]), | |
+ OptString.new('IgnoreBrowserRequirements', [false, "Ignore browser requirements for the exploit"]) | |
], Exploit::Remote::BrowserExploitServer) |
# Metasploit Framework Basic Skills | |
If you are a developer of Metasploit, make sure you know how to do the following: | |
## 1. Basic Metasploit Experience | |
### Set up | |
- [ ] Set up Metasploit Framework Developer's Environment (with database connection) |