Статьи о настройках:
https://iphelix.medium.com/hacking-the-tor-control-protocol-fb844db6a606
{ | |
description = "llama.cpp running vicuna"; | |
inputs = { | |
llama.url = "github:ggerganov/llama.cpp/aaf3b23debc1fe1a06733c8c6468fb84233cc44f"; | |
flake-utils.url = "github:numtide/flake-utils/033b9f258ca96a10e543d4442071f614dc3f8412"; | |
nixpkgs.url = "github:NixOS/nixpkgs/d9f759f2ea8d265d974a6e1259bd510ac5844c5d"; | |
}; | |
outputs = { self, flake-utils, llama, nixpkgs }: |
open System.IO | |
#r "paket: | |
nuget Fake.IO.FileSystem | |
nuget Fake.Core.Trace | |
nuget FSharp.Data | |
nuget Fable.React | |
nuget FSharp.Literate | |
nuget Fake.Core.Target //" | |
#load ".fake/blog.fsx/intellisense.fsx" |
First and foremost the manual mentions it explicitly:
[Use] the standalone home-manager tool. For platforms other than NixOS (...), this is the only available choice. (...) See Section 1.1, “Standalone installation” for instructions (...)
https://grahamc.com/blog/erase-your-darlings
https://github.com/ryantm/home-manager-template
ico nix-store sqlite corruption NixOS/nix#1353
ico nix-store permission error NixOS/nix#4356
https://rgoswami.me/posts/local-nix-no-root/
https://dram.page/p/bootstrapping-nix/
1) COPY SSH KEYS TO USER@HOST TO ENABLE PASSWORD-LESS SSH LOGINS. (NOT ON MAC) | |
ssh-copy-id user@host | |
To generate the keys use the command ssh-keygen | |
2) START A TUNNEL FROM SOME MACHINE’S PORT 80 TO YOUR LOCAL POST 2001 | |
ssh -N -L2001:localhost:80 somemachine |
// This is just an initial example / tech-demo. | |
#if INTERACTIVE | |
#I "./../packages/NBitcoin/lib/net45/" | |
#I "./../packages/Newtonsoft.Json/lib/net45" | |
#r "NBitcoin.dll" | |
#r "Newtonsoft.Json.dll" | |
#else | |
module BlockChain | |
#endif |
---------------------------------------------------------------------------------------------------- | |
sudo apt-get install p0f -yqq | |
p0f -L #LISTENING ALL THE INTERFACES | |
p0f -i eth0 -p -o /tmp/p0f.log # one interface and logging, -p promiscous mode | |
p0f -r /tmp/dump.pcap -o dump-result.log # analyze pcap file | |
---------------------------------------------------------------------------------------------------- | |
#ZIP Password Cracking Windows | |
>zip2john.exe test.zip > test.hash #generate the hash with zip2john | |
>type test.hash | |
>john.exe --pot=test.pot --wordlist=\tmp\wordlists\Passwords\Common-Credentials\10-million-password-list-top-1000000.txt |