title:"Big-IP®" org:"Organization Name"
http.title:"BIG-IP®- Redirect" org:"Organization Name"
http.favicon.hash:-335242539 "3992" org:"Organization Name"| /* | |
| Written By Pan ZhenPeng(@peterpan980927) of Alibaba Security Pandora Lab | |
| use it on macOS: cc poc.c -o poc while True; do ./poc ; done | |
| */ | |
| #include <errno.h> | |
| #include <signal.h> | |
| #include <fcntl.h> | |
| #include <stdio.h> | |
| #include <stdlib.h> |
| import Foundation | |
| extension Character { | |
| var isEmoji: Bool { | |
| return unicodeScalars.allSatisfy { $0.properties.isEmoji } | |
| } | |
| } | |
| func recentlyUsedEmoji() -> [Character]? { | |
| #if os(iOS) |
| // based on ian beer's code | |
| // just use https://github.com/bazad/x18-leak , it's way cleaner | |
| // by stek29 | |
| // see bazad's writeup: http://bazad.github.io/2018/04/kernel-pointer-crash-log-ios | |
| #if 0 | |
| From https://gist.github.com/stek29/e68e9eae382b975093252d6117b6b501 | |
| Finding Lel0_synchronous_vector_64_long: |
| Java.scheduleOnMainThread(function() { | |
| Toast = Java.use("android.widget.Toast"); | |
| var currentApplication = Java.use('android.app.ActivityThread').currentApplication(); | |
| var context = currentApplication.getApplicationContext(); | |
| Toast.makeText(context,"hello world", Toast.LENGTH_SHORT.value).show(); | |
| }); |
| #!//bin/sh | |
| export PATH=bin:$PATH | |
| self=$0 | |
| function print_help() { | |
| echo "$self [IPSW path]" | |
| echo "$self [device model] [ios build]" | |
| echo |
- Change your database RDS instance security group to allow your machine to access it.
- Add your ip to the security group to acces the instance via Postgres.
- Make a copy of the database using pg_dump
$ pg_dump -h <public dns> -U <my username> -f <name of dump file .sql> <name of my database>- you will be asked for postgressql password.
- a dump file(.sql) will be created
- Restore that dump file to your local database.
- but you might need to drop the database and create it first
$ psql -U <postgresql username> -d <database name> -f <dump file that you want to restore>
- the database is restored
This document details how I setup LE on my server. Firstly, install the client as described on http://letsencrypt.readthedocs.org/en/latest/using.html and make sure you can execute it. I put it in /root/letsencrypt.
As it is not possible to change the ports used for the standalone authenticator and I already have a nginx running on port 80/443, I opted to use the webroot method for each of my domains (note that LE does not issue wildcard certificates by design, so you probably want to get a cert for www.example.com and example.com).
For this, I placed config files into etc/letsencrypt/configs, named after <domain>.conf. The files are simple:
| #!/usr/bin/env bash | |
| # bash 4.1.5(1) Linux Ubuntu 10.04 Date : 2011-08-25 | |
| # | |
| # _______________| httpstatus : get HTTP status code | |
| # | |
| # Usage: httpstatus URL [timeout] [--code or --status] [see 4.] | |
| # ^message with code (default) | |
| # ^code (numeric only) | |
| # ^in secs (default: 3) | |
| # ^URL without "http://" prefix works fine. |
-
Update: Added tbuf, broke out tables, you can use https://github.com/schwa/transmogrifier to convert between msgpack, yaml, bson, json and xml plists
-
Update: Added bencode, renamed tbuf to yabon
-
Update: Added disclamer, added pickle