Bootstrap < 3.4.1 || < 4.3.1
✔️ CSP strict-dynamic bypass
➖ Requires user interaction
➖ Requires $('[data-toggle="tooltip"]').tooltip();
invoices/123? in a URL like /assignments?showGrades=1.# portion of the URL. This is not available to servers in request.url so its client only. By default it means which part of the page the user should be scrolled to, but developers use it for various things.| // Tracking cursor position in real-time without JavaScript | |
| // Demo: https://twitter.com/davywtf/status/1124146339259002881 | |
| package main | |
| import ( | |
| "fmt" | |
| "net/http" | |
| "strings" | |
| ) |
| from datetime import datetime | |
| import time | |
| import threading | |
| ########################### | |
| from multiprocessing import Process | |
| import random | |
| ########################### | |
| import dns.resolver | |
| import dns.reversename | |
| import ftplib |
| #!/bin/bash | |
| TOTALIN=0 | |
| TOTALSAVED=0 | |
| TOTALFILES=0 | |
| for png in *.png; | |
| do | |
| echo "Crushing $png" | |
| echo "PNG file $png:" >> /tmp/pngcrush.log | |
| OLDSIZE=$(stat --printf="%s" "$png") | |
| echo " Old size: $OLDSIZE" >> /tmp/pngcrush.log |
| RDP Eavesdropping and Hijacking | |
| ******************************* | |
| I spent some time this evening looking at ways to eavesdrop and hijack RDP sessions. Here is a gist of (semi) interesting findings | |
| that is not very new... | |
| =========== | |
| Inspiration | |
| =========== | |
| As you may already know... |
| function Get-SecureBootPolicy { | |
| <# | |
| .SYNOPSIS | |
| Parses a Secure Boot policy. | |
| .DESCRIPTION | |
| Get-SecureBootPolicy parses either the default, system Secure Boot policy or a policy passed as a byte array. The byte array must be a raw, unsigned policy. |