We have moved: https://github.com/magnetikonline/linuxmicrosoftievirtualmachines
Due to the popularity of this Gist, and the work in keeping it updated via a Gist, all future updates will take place at the above location. Thanks!
| eXtreme Go Horse (XGH) Process | |
| Quelle: http://gohorseprocess.wordpress.com | |
| Übersetzung ursprünglich von https://gist.github.com/Neffez/f8d907ba8289f14e23f3855011fa4e2f | |
| 1. Ich denke, also ist es nicht XGH. | |
| In XGH wird nicht gedacht, es wird das erste gemacht, was in den Sinn kommt. Es gibt auch keine zweite Option, die erste ist schneller. | |
| 2. Es gibt 3 Wege ein Problem zu lösen: den richtigen Weg, den falschen Weg und den XGH Weg, welcher exakt wie der falsche ist, aber schneller. |
We have moved: https://github.com/magnetikonline/linuxmicrosoftievirtualmachines
Due to the popularity of this Gist, and the work in keeping it updated via a Gist, all future updates will take place at the above location. Thanks!
| import multiprocessing | |
| # split a list into evenly sized chunks | |
| def chunks(l, n): | |
| return [l[i:i+n] for i in range(0, len(l), n)] | |
| def do_job(job_id, data_slice): | |
| for item in data_slice: | |
| print "job", job_id, item |
| // Get twitter status for given account (or for the default one, "PhantomJS") | |
| var page = require('webpage').create(), | |
| system = require('system'), | |
| twitterId = "PhantomJS"; //< default value | |
| // Route "console.log()" calls from within the Page context to the main Phantom context (i.e. current "this") | |
| page.onConsoleMessage = function(msg) { | |
| console.log(msg); | |
| }; |
| import ast | |
| import sys | |
| import shutil | |
| import unparse | |
| import unittest | |
| import doctest | |
| import StringIO | |
| import os | |
| from copy import deepcopy |
| #!/usr/env python | |
| ############################################################################################################### | |
| ## [Title]: linuxprivchecker.py -- a Linux Privilege Escalation Check Script | |
| ## [Author]: Mike Czumak (T_v3rn1x) -- @SecuritySift | |
| ##------------------------------------------------------------------------------------------------------------- | |
| ## [Details]: | |
| ## This script is intended to be executed locally on a Linux box to enumerate basic system info and | |
| ## search for common privilege escalation vectors such as world writable files, misconfigurations, clear-text | |
| ## passwords and applicable exploits. |
| local shortport = require "shortport" | |
| local http = require "http" | |
| local stdnse = require "stdnse" | |
| local brute = require "brute" | |
| local creds = require "creds" | |
| description = [[ | |
| Performs a dictionary/bruteforce attack over login and password fields of Apache Tomcat default web management pages. | |
| ]] |
| import java.io.ByteArrayInputStream; | |
| import java.io.ByteArrayOutputStream; | |
| import java.io.IOException; | |
| import java.io.ObjectInputStream; | |
| import java.io.ObjectOutputStream; | |
| import java.util.HashSet; | |
| import java.util.Set; | |
| // billion-laughs-style DoS for java serialization | |
| public class SerialDOS { |
| #!/bin/bash | |
| #no PATH, no way to accidently run any programs | |
| PATH='' | |
| #useful variables | |
| term_height=0 | |
| term_width=0 | |
| term_scroll_height=0 | |
| status_line_row=0 |
| #!/usr/bin/env python | |
| # -*- coding: utf-8 -*- | |
| import requests,json,sys | |
| # Script simples para consulta de dados na base dados nacional do SUS utilizando o CPF. | |
| # Jhonathan Davi A.K.A jh00nbr / Insightl4b lab.insightsecurity.com.br | |
| # jh00nbr: http://jhonathandavi.com.br | |
| # Blog: lab.insightsecurity.com.br | |
| # Github: github.com/jh00nbr | |
| # Twitter @jh00nbr |