I hereby claim:
- I am opexxx on github.
- I am opexxx (https://keybase.io/opexxx) on keybase.
- I have a public key whose fingerprint is A80C 890B 8AC6 DE59 910F 76EF DEFF 6815 6667 8BE4
To claim this, I am signing this object:
| function search-document-by-percol() { | |
| DOCUMENT_DIR="$HOME/Dropbox/Documents/ $HOME/Desktop/ $HOME/Google\ ドライブ" | |
| SELECTED_FILE=$(echo $DOCUMENT_DIR | xargs find | \ | |
| grep -E "\.(xlsx|xls|pptx|ppt|docx|doc|pdf|txt|odp|odt|ods|xmind|mm|glink|gsheet)$" | percol --match-method migemo) | |
| if [ $? -eq 0 ]; then | |
| cygstart $SELECTED_FILE | |
| fi | |
| } | |
| alias sd='search-document-by-percol' |
I hereby claim:
To claim this, I am signing this object:
| # Ref: https://wiki.archlinux.org/index.php/CUE_Splitting | |
| shnsplit -f audio.cue -t "%n. %p - %t" -o flac audio.flac | |
| cuetag.sh audio.cue [01]*.flac |
| #!/usr/bin/python | |
| #stolen and modified from the reddit post about the raspbeery pi tweeting at comcast | |
| #run this every 10 minutes (or w/e) with cron: | |
| #"crontab -e" | |
| #*/10 * * * * /home/pi/lolbandwidth.py | |
| import os | |
| import sys | |
| import csv | |
| import datetime | |
| import time |
| Impacket v0.9.11 - Copyright 2002-2014 Core Security Technologies | |
| usage: secretsdump.py [-h] [-debug] [-system SYSTEM] [-security SECURITY] | |
| [-sam SAM] [-ntds NTDS] [-history] | |
| [-outputfile OUTPUTFILE] [-hashes LMHASH:NTHASH] | |
| target | |
| positional arguments: | |
| target [domain/][username[:password]@]<address> or LOCAL (if | |
| you want to parse local files) |
| ena | |
| conf t c | |
| sh fenet image status | |
| show file system detail | |
| fenet image fetch | |
| show image | |
| fenet metadata refresh | |
| ipmi firmware reload |
| $EventFilterArgs = @{ | |
| EventNamespace = 'root/cimv2' | |
| Name = 'PowerShellProcessStarted' | |
| Query = 'SELECT FileName, ProcessID FROM Win32_ModuleLoadTrace WHERE FileName LIKE "%System.Management.Automation%.dll"' | |
| QueryLanguage = 'WQL' | |
| } | |
| $Filter = New-CimInstance -Namespace root/subscription -ClassName __EventFilter -Property $EventFilterArgs | |
| $CommandLineConsumerArgs = @{ |
| # Make sure the module is not loaded | |
| Remove-Module Powerforensics -ErrorAction SilentlyContinue | |
| # Download latest version | |
| $webclient = New-Object System.Net.WebClient | |
| $url = "https://github.com/Invoke-IR/PowerForensics/archive/master.zip" | |
| Write-Host "Downloading latest version of Powerforensics from $url" -ForegroundColor Cyan | |
| $file = "$($env:TEMP)\Powerforensics.zip" | |
| $webclient.DownloadFile($url,$file) | |
| Write-Host "File saved to $file" -ForegroundColor Green | |
| # Unblock and Decompress |
| $name = 'Dammaschke' # Change | |
| $NetworkCategory = 1 # 0 = Public, 1 = Private (2 = Domain, but not setable) | |
| $profile = Get-CimInstance -Namespace root/StandardCimv2 -ClassName MSFT_NetConnectionProfile|Where-Object Name -EQ $name | |
| $profile.NetworkCategory = $NetworkCategory | |
| Set-CimInstance $profile |
| function Get-AvailableComObjects { | |
| $classesCom = '' | |
| $classes = [Microsoft.Win32.Registry]::LocalMachine.OpenSubKey('SOFTWARE\\Classes').GetSubKeyNames() | |
| [regex]::Matches($classes, '\w+\.\w+').Value | % {if ([Microsoft.Win32.Registry]::LocalMachine.OpenSubKey("SOFTWARE\\Classes\\$_\\CLSID")) {$classesCom += "$_`r`n"}} | |
| $classesCom.Replace("`r`n",' ').Split(' ') | Select-Object -Unique | |
| } |