List profiles
dconf dump /org/gnome/terminal/legacy/profiles:/
Determine the terminal profile string for the profile you will need. This is the terminal profile that I will export:
- PadBuster: | |
- Padding Oracle attacks 自动化脚本 | |
- https://github.com/AonCyberLabs/PadBuster | |
- perl | |
- bettercap: | |
- 一个非常强大、灵活可移植的中间人攻击框架,它具有跨平台、轻量级以及模块化等优点,在渗透测试过程中能够非常好的进行中间人测试 | |
- https://github.com/bettercap/bettercap | |
- go | |
! ------ ~/.Xresources ----- | |
! 刷新配置: xrdb -merge ~/.Xresources | |
! | |
! ----- font --- | |
Xft.dpi:96 | |
URxvt.font: xft:Inconsolata Nerd:size=11, xft:DejaVuSansMono Nerd:size=11, xft:Source Code Pro:size:9, xft:WenQuanYi Micro Hei:size=10 | |
! DejaVuSansMono Nerd 和 Inconsolata Nerd 配合 Vim 插件 file icon | |
!URxvt.font: xft:Fira Code:size=10, xft:WenQuanYi Micro Hei:size=10 | |
!字体间距 | |
! URxvt.letterSpace: 1 |
" Windows 下 Vim设置,插件管理器:vim-plug | |
syntax on | |
set nu | |
set tabstop=4 "用于设置Tab键宽度,默认为 8 | |
set shiftwidth=4 | |
colorscheme basepurple | |
set cul "浅色高亮当前行 | |
set history=1000 | |
set autoread " 当文件在外部被修改,自动更新该文件 |
{ | |
"SSRF": { | |
"SSRF漏洞简介": "https://mntn0x.github.io/2018/08/11/SSRF%E6%BC%8F%E6%B4%9E%E7%AE%80%E4%BB%8B/", | |
"SSRF漏洞的挖掘经验": "https://sobug.com/article/detail/11", | |
"SSRF漏洞的利用与学习": "https://uknowsec.cn/posts/notes/SSRF%E6%BC%8F%E6%B4%9E%E7%9A%84%E5%88%A9%E7%94%A8%E4%B8%8E%E5%AD%A6%E4%B9%A0.html", | |
"[安全科普]SSRF攻击实例解析": "https://www.freebuf.com/articles/web/20407.html", | |
"SSRF攻击[译文]": "https://evilwing.me/2018/07/01/ssrf%E6%94%BB%E5%87%BB-%E8%AF%91%E6%96%87/#more", | |
"从入门到精通: SSRF(1)": "http://www.mottoin.com/article/web/86312.html", | |
"Server Side Request Forgery (SSRF)": "http://twoday.cc/web%E5%AE%89%E5%85%A8/2019/01/21/Server-Side-Request-Forgery-(SSRF).html", | |
"SSRF分析与利用": "https://airboi.github.io/2018/05/18/SSRF%E5%88%86%E6%9E%90%E4%B8%8E%E5%88%A9%E7%94%A8/", |