title:"Big-IP®" org:"Organization Name"
http.title:"BIG-IP®- Redirect" org:"Organization Name"
http.favicon.hash:-335242539 "3992" org:"Organization Name"
/* | |
Written By Pan ZhenPeng(@peterpan980927) of Alibaba Security Pandora Lab | |
use it on macOS: cc poc.c -o poc while True; do ./poc ; done | |
*/ | |
#include <errno.h> | |
#include <signal.h> | |
#include <fcntl.h> | |
#include <stdio.h> | |
#include <stdlib.h> |
import Foundation | |
extension Character { | |
var isEmoji: Bool { | |
return unicodeScalars.allSatisfy { $0.properties.isEmoji } | |
} | |
} | |
func recentlyUsedEmoji() -> [Character]? { | |
#if os(iOS) |
// based on ian beer's code | |
// just use https://github.com/bazad/x18-leak , it's way cleaner | |
// by stek29 | |
// see bazad's writeup: http://bazad.github.io/2018/04/kernel-pointer-crash-log-ios | |
#if 0 | |
From https://gist.github.com/stek29/e68e9eae382b975093252d6117b6b501 | |
Finding Lel0_synchronous_vector_64_long: |
Java.scheduleOnMainThread(function() { | |
Toast = Java.use("android.widget.Toast"); | |
var currentApplication = Java.use('android.app.ActivityThread').currentApplication(); | |
var context = currentApplication.getApplicationContext(); | |
Toast.makeText(context,"hello world", Toast.LENGTH_SHORT.value).show(); | |
}); |
#!//bin/sh | |
export PATH=bin:$PATH | |
self=$0 | |
function print_help() { | |
echo "$self [IPSW path]" | |
echo "$self [device model] [ios build]" | |
echo |
- Change your database RDS instance security group to allow your machine to access it.
- Add your ip to the security group to acces the instance via Postgres.
- Make a copy of the database using pg_dump
$ pg_dump -h <public dns> -U <my username> -f <name of dump file .sql> <name of my database>
- you will be asked for postgressql password.
- a dump file(.sql) will be created
- Restore that dump file to your local database.
- but you might need to drop the database and create it first
$ psql -U <postgresql username> -d <database name> -f <dump file that you want to restore>
- the database is restored
This document details how I setup LE on my server. Firstly, install the client as described on http://letsencrypt.readthedocs.org/en/latest/using.html and make sure you can execute it. I put it in /root/letsencrypt
.
As it is not possible to change the ports used for the standalone
authenticator and I already have a nginx running on port 80/443, I opted to use the webroot
method for each of my domains (note that LE does not issue wildcard certificates by design, so you probably want to get a cert for www.example.com
and example.com
).
For this, I placed config files into etc/letsencrypt/configs
, named after <domain>.conf
. The files are simple:
#!/usr/bin/env bash | |
# bash 4.1.5(1) Linux Ubuntu 10.04 Date : 2011-08-25 | |
# | |
# _______________| httpstatus : get HTTP status code | |
# | |
# Usage: httpstatus URL [timeout] [--code or --status] [see 4.] | |
# ^message with code (default) | |
# ^code (numeric only) | |
# ^in secs (default: 3) | |
# ^URL without "http://" prefix works fine. |
-
Update: Added tbuf, broke out tables, you can use https://github.com/schwa/transmogrifier to convert between msgpack, yaml, bson, json and xml plists
-
Update: Added bencode, renamed tbuf to yabon
-
Update: Added disclamer, added pickle