These are my notes on instaling NixOS 16.03 on a Lenovo ThinkPad X1 Carbon (4th generation) with an encrypted root file system using UEFI.
Most of this is scrambled from the following pages:
#!/bin/bash | |
# Bash script for setting or clearing touch requirements for | |
# cryptographic operations the OpenPGP application on a YubiKey 4. | |
# | |
# Author: Alessio Di Mauro <[email protected]> | |
GCA=$(which gpg-connect-agent) | |
DO=0 | |
UIF=0 |
These are my notes on instaling NixOS 16.03 on a Lenovo ThinkPad X1 Carbon (4th generation) with an encrypted root file system using UEFI.
Most of this is scrambled from the following pages:
#!/bin/sh | |
# Yet Another bhyve Script v0.4 | |
# Use this to try and boot 9front, the Plan9 fork. | |
# Virtio emulation works better (ported drivers) | |
# PS/2 Mouse emulation requires updated bhyve(8) | |
# If you don't have it, patch is uploaded with this Gist | |
# When partitioning, I have had more success with MBR | |
# GPT may work for some people |
# 2017 - @leonjza | |
# | |
# Wordpress 4.7.0/4.7.1 Unauthenticated Content Injection PoC | |
# Full bug description: https://blog.sucuri.net/2017/02/content-injection-vulnerability-wordpress-rest-api.html | |
# Usage example: | |
# | |
# List available posts: | |
# | |
# $ python inject.py http://localhost:8070/ |
# Assuming you're a regular user that has doas allowances for vmctl | |
mkdir -p ~/vmm | |
cd ~/vmm | |
# Grab the the one of the virt iso's of Alpine Linux | |
curl https://nl.alpinelinux.org/alpine/v3.6/releases/x86_64/alpine-virt-3.6.0-x86_64.iso -o alpine-virt-3.6.0-x86_64.iso | |
# Make a new virtual disk image, change the size as needed | |
vmctl create alpine-virt.img -s 6G |
/* SMBLoris attack proof-of-concept | |
* | |
* Copyright 2017 Hector Martin "marcan" <marcan@marcan.st> | |
* | |
* Licensed under the terms of the 2-clause BSD license. | |
* | |
* This is a proof of concept of a publicly disclosed vulnerability. | |
* Please do not go around randomly DoSing people with it. | |
* | |
* Tips: do not use your local IP as source, or if you do, use iptables to block |
from z3 import * | |
import struct | |
# calculate e,f,d for a given input password | |
def calc(m): | |
e = 0 | |
f = 0 | |
d = 0 | |
for i in xrange(0, len(m)): | |
c = ord(m[i]) |
#include <stdio.h> | |
#include <stdlib.h> | |
#include <stdint.h> | |
#ifdef _MSC_VER | |
#include <intrin.h> /* for rdtscp and clflush */ | |
#pragma optimize("gt",on) | |
#else | |
#include <x86intrin.h> /* for rdtscp and clflush */ | |
#endif |