script to generate the NT hash for a password string (for NTLMv2 auth, etc). OpenSSL config was tested on Fedora 42.
$ nthash --help
Generate NT Hash from password string.
Usage: nthash ''
| #!/bin/bash | |
| nohup "$@" > /dev/null 2>&1 & |
| Get-CimInstance -ClassName Win32_VideoController | Select-Object Name, CurrentHorizontalResolution, CurrentVerticalResolution, CurrentBitsPerPixel |
remove some major annoyances:
!= should be displayed as two characters, not one# ~/.config/ghostty/config
# https://github.com/ghostty-org/ghostty/discussions/3161
command = TERM=xterm-256color /usr/bin/bash
add to ~/.bashrc:
urldump() {
sudo tcpdump -i any -A -s 0 -l 'tcp' | awk '/GET|POST|PUT|DELETE|HEAD|OPTIONS|PATCH.*HTTP/ {match($0, /(GET|POST|PUT|DELETE|HEAD|OPTIONS|PATCH) ([^ ]+)/, arr); method=arr[1]; url=arr[2]} /^Host:/ {if(method) {print method, $2 url; method=""}}'}GET localhost:8080/
GET localhost:5172/foo/bar
in Windows setup: SHIFT + F10 opens a cmd shell. Then regedit.
[HKEY_LOCAL_MACHINE\SYSTEM\Setup\LabConfig]
"BypassTPMCheck"=dword:00000001
"BypassSecureBootCheck"=dword:00000001
"BypassRAMCheck"=dword:00000001
"BypassStorageCheck"=dword:00000001
"BypassCPUCheck"=dword:00000001
"BypassDiskCheck"=dword:00000001
A grep command (grepp) in Powershell that lets you grep for a string in the text that would usually be printed in the terminal (not some other representation of the data). Output is a string, not a pipeline anymore - thus destructive.
To quickly grep through shell output without having to do where-object gymnastics.
A way to reboot into recovery mode (Windows boots into GUI with only minimal drivers loaded):
bcdedit /set "{current}" safeboot minimalbcdedit /deletevalue "{current}" safeboot