Product: Sagitta Brutalis 1080 Ti (SKU N4X48-GTX1080TI-2620-128-2X500)
Software: Hashcat 3.5.0-22-gef6467b, Nvidia driver 381.09
Accelerator: 8x Nvidia GTX 1080 Ti Founders Edition
<?php | |
/* | |
* EasyBank.at client lib | |
* Reverse engineered by looking at the API calls of the app | |
* | |
* Example usage: | |
* | |
* <?php | |
* include_once('easybank.class.php'); |
Product: Sagitta Brutalis 1080 Ti (SKU N4X48-GTX1080TI-2620-128-2X500)
Software: Hashcat 3.5.0-22-gef6467b, Nvidia driver 381.09
Accelerator: 8x Nvidia GTX 1080 Ti Founders Edition
Together with HellMood we won this year's (2016) JS1K competition and thought this might be a good opportunity to write about the development process and my motivation behind it. If you're already familiar with JS1K, feel free to skip the next two paragraphs.
# Experimental 2016-01-10 | |
DOES NOT WORK YET. | |
sudo -i | |
apt-get update | |
apt-get install --yes debootstrap zfsutils-linux zfs-initramfs zfs-dkms | |
modprobe zfs | |
# setup zfs |
files = renoise.app():prompt_for_multiple_filenames_to_read({"*.sfz"},"SFZ files to convert") | |
--check for files | |
if table.getn(files)>0 then | |
for key,value in pairs(files) do | |
outputfile = value:match("^(.*)\.[sS][fF][zZ]+$") | |
renoise.app():load_instrument_multi_sample(value) | |
renoise.app():save_instrument(outputfile) | |
end | |
renoise.app():show_message(table.getn(files) .. " instruments converted.") | |
else |
#!/usr/env python | |
############################################################################################################### | |
## [Title]: linuxprivchecker.py -- a Linux Privilege Escalation Check Script | |
## [Author]: Mike Czumak (T_v3rn1x) -- @SecuritySift | |
##------------------------------------------------------------------------------------------------------------- | |
## [Details]: | |
## This script is intended to be executed locally on a Linux box to enumerate basic system info and | |
## search for common privilege escalation vectors such as world writable files, misconfigurations, clear-text | |
## passwords and applicable exploits. |