This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/python | |
import re | |
import argparse | |
import subprocess | |
try: | |
import sys | |
from PyQt5.Qt import * | |
from PyQt5.QtWebEngineWidgets import * | |
from PyQt5.QtWidgets import QApplication | |
except ImportError: |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
@echo off | |
:: | |
:: USE THIS ONLY ON THE .ZIP FILE, IF THE FILE ISN'T ZIP FILE JUST PUT IT IN THE .ZIP FILE | |
:: Just save this file and drag & drop a file to this file | |
:: Tested filetype: .zip | |
:: In case of infection just remove the extension of the ransomware and extract the .zip file normally | |
:: Demo: https://youtu.be/36HmHXqmCwQ | |
:: | |
powershell -Command $out = new-object byte[] 7000000; (new-object Random).NextBytes($out); [IO.File]::WriteAllBytes(\"$env:temp\randomfile\", $out) | |
copy /b %TEMP%\randomfile+"%1" "%~d1%~p1%~n1_protected%~x1" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/sh | |
# Tested on Artix Linux | |
# | |
# Add a service that you want to enable to /etc/default/update6 (separated with newline or space) | |
export services=$(tr '\n' ' ' < /etc/default/update6) | |
s6-rc-bundle delete default | |
s6-rc-bundle add default $services | |
s6-rc-update /etc/s6/rc/compiled |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# 1. Simpan file ini ke C:\Program Files (x86)\Privoxy\isp-ads.filter untuk Windows 64-bit, C:\Program Files\Privoxy\isp-ads.filter untuk Windows 32-bit, /etc/privoxy/isp-ads.filter untuk linux | |
# 2. Tambahkan "filterfile isp-ads.filter" ke C:\Program Files (x86)\Privoxy\config.txt untuk Windows, /etc/privoxy/config untuk linux | |
# 3. Tambahkan ini (tanpa '#') ke C:\Program Files (x86)\Privoxy\match-all.action untuk Windows, /etc/privoxy/match-all.action untuk Linux | |
# | |
# {+filter{isp-ads} +server-header-filter{isp-ads-page}} | |
# / | |
# | |
# Video (Windows): https://youtu.be/mbfp2SIVnsU | |
# EN: |
NewerOlder