hciconfig
hciconfig hci0 version
sudo hciconfig hci0 up
| --- | |
| # Remediate WinVerifyTrust Signature Validation Vulnerability | |
| # URL https://msrc.microsoft.com/update-guide/vulnerability/CVE-2013-3900 | |
| - hosts: win | |
| tasks: | |
| - name: Create registry path Wintrust | |
| ansible.windows.win_regedit: | |
| path: HKLM:\Software\Microsoft\Cryptography\Wintrust\ | |
| - name: Create registry path Config |
| # smb.conf | |
| # Fix seLinux perms | |
| # semanage fcontext -a -t samba_share_t '/etc/samba/smb.conf' | |
| # restorecon -v '/etc/samba/smb.conf' | |
| [global] | |
| workgroup = SAMBA | |
| server role = standalone server | |
| restrict anonymous = 0 | |
| guest account = ftp # map guest access to a low privileged user |
| import re | |
| import argparse | |
| parser = argparse.ArgumentParser(description='Mimic Linux grep command for Python') | |
| parser.add_argument('pattern', type=str, help='The pattern to search for') | |
| parser.add_argument('file', type=str, help='The file to search in') | |
| parser.add_argument('-i', '--ignore-case', action='store_true', help='Perform case-insensitive search') | |
| args = parser.parse_args() |
| From_Base64('A-Za-z0-9+/=',true,false) | |
| Decode_text('UTF-16LE (1200)') | |
| Regular_expression('User defined','[a-zA-Z0-9/+=]{30,}',true,true,false,false,false,false,'List matches') | |
| From_Base64('A-Za-z0-9+/=',true,false) | |
| Gunzip() | |
| Regular_expression('User defined','[a-zA-Z0-9/+=]{30,}',true,true,false,false,false,false,'List matches') | |
| From_Base64('A-Za-z0-9+/=',true,false) | |
| XOR({'option':'Decimal','string':'35'},'Standard',false) |
| import os | |
| # mimic Unix tree command in python | |
| # runs on Windows and Nix | |
| # run from current directory for tree output | |
| def tree(cwd): | |
| print(f"+ {cwd}") | |
| for root, dirs, files in os.walk(cwd): | |
| level = root.replace(cwd, '').count(os.sep) | |
| indent = ' ' * 4 * (level) | |
| print(f"{indent}+ {os.path.basename(root)}/") |
| import secrets | |
| numbers = [] | |
| while len(numbers) < 5: | |
| n = secrets.choice(range(1, 69)) | |
| if n not in numbers: | |
| numbers.append(n) | |
| numbers.sort() | |
| powerBall = secrets.choice(range(1, 26)) | |
| print(*numbers, sep=", ", end='') | |
| print(" PowerBall", powerBall) |
| <HTML> | |
| <HEAD> | |
| <TITLE>HTA Demo</TITLE> | |
| <HTA:APPLICATION ID="oHTA" | |
| APPLICATIONNAME="myApp" | |
| BORDER="thin" | |
| BORDERSTYLE="normal" | |
| CAPTION="yes" | |
| ICON="" | |
| MAXIMIZEBUTTON="yes" |
| #!/usr/bin/env python3 | |
| import socket | |
| import datetime | |
| import time | |
| HOST = '0.0.0.0' | |
| PORT = 8080 | |
| def listener(): |
| msbuild project.sln /p:Configuration=Release /p:Platform="Any CPU" | |
| msbuild project.sln /p:Configuration=Release /p:Platform=AnyCPU |