openpgp4fpr:FE66AABE0BFB52B45E034545CE25FD9C483D5E10
I hereby claim:
- I am flagranterror on github.
- I am flagranterror (https://keybase.io/flagranterror) on keybase.
- I have a public key ASDk_v0RFGnHgB6pwA_sNJQ1Qs4jr9fXaBNBNSGGPBOqzAo
To claim this, I am signing this object:
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
$batchList = Import-Csv changes.csv -Header "OldName","NewName" | |
$batchList | foreach { | |
$oldName = $_.OldName | |
$newName = $_.NewName | |
Write-Host "Renaming $oldName to $newName" | |
Rename-Item $oldName $newName |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
$wiredeth = get-netadapter -ifindex 10 | |
function set-dhcpme { | |
[CmdletBinding()] | |
param() | |
PROCESS { | |
$wiredeth | remove-netipaddress -confirm:$false | |
$wiredeth | remove-netroute -confirm:$false | |
$wiredeth | set-netipinterface -dhcp enabled | |
$wiredeth | set-dnsclientserveraddress -resetserveraddresses |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/perl | |
# perlsplit.pl input.txt | |
open(INPUT, $ARGV[0]); | |
open($dec,">" , "decoder.txt"); | |
open($enc,">" , "encoder.txt"); | |
my @array; | |
{ |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
/* | |
* E-DB Note: Updating OpenFuck Exploit ~ http://paulsec.github.io/blog/2014/04/14/updating-openfuck-exploit/ | |
* | |
* OF version r00t VERY PRIV8 spabam | |
* Compile with: gcc -o OpenFuck OpenFuck.c -lcrypto | |
* objdump -R /usr/sbin/httpd|grep free to get more targets | |
* #hackarena irc.brasnet.org | |
*/ | |
#include <arpa/inet.h> |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
's/^([xgaf]e\S+)\s+(\w+)\s+(\w+)\s+(.*)/"\1","\2","\3","\4"/' |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/ruby | |
require 'net/http' | |
require 'nokogiri' | |
response = Net::HTTP.get_response(URI.parse('https://support.content.office.net/en-us/static/O365IPAddresses.xml')) | |
xml = Nokogiri::XML(response.body) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
USERID := $(shell id -u) | |
.DEFAULT: | |
@sleep .1 | |
sandwich: | |
ifeq ($(USERID), 0) | |
@echo "Okay:" | |
@echo | |
@echo " ##############" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python | |
from __future__ import print_function | |
import os | |
import hashlib | |
import sys | |
# I use this to sort through images and movies. Keep RAM utilization low. | |
# http://stackoverflow.com/questions/3431825/generating-a-md5-checksum-of-a-file | |
def hashfile(afile, hasher, blocksize=65536): | |
buf = afile.read(blocksize) |
NewerOlder