Open your terminal.
In the root directory run the command:
sudo nano /etc/bluetooth/main.conf
| #!/usr/bin/env python | |
| """ | |
| Send random notes to the output port. | |
| """ | |
| from __future__ import print_function | |
| import sys | |
| import time | |
| import random | |
| import mido | |
| import threading |
| import glob | |
| from music21 import converter, instrument, note, chord, interval, pitch | |
| import sys | |
| from tqdm import tqdm | |
| def valid_note(note_number): | |
| return -12*5 <= note_number <= 12*5 | |
| def first_note(notes_to_parse): | |
| for element in notes_to_parse: |
| import numpy | |
| from music21 import instrument, note, stream, chord | |
| import sys | |
| import numpy as np | |
| def convert_to_float(frac_str): | |
| try: | |
| return float(frac_str) | |
| except ValueError: | |
| num, denom = frac_str.split('/') |
| #!/usr/bin/bash | |
| ## | |
| ## Creates Service file based on JSON data | |
| ## | |
| # Sample JSON file: | |
| # { | |
| # "service_name": "test_service", | |
| # "description": "Netcore dev server", |
| --- | |
| - name: Install MacOS Packages | |
| hosts: localhost | |
| become: false | |
| vars: | |
| brew_cask_packages: | |
| - atom | |
| - docker | |
| - dropbox | |
| - firefox |
| #!/usr/bin/python3 | |
| import socket | |
| import itertools | |
| import sys | |
| import time | |
| import argparse | |
| class Knockit(object): | |
| def __init__(self, args: list): |
| Set-ItemProperty HKLM:\SOFTWARE\Policies\Microsoft\Windows\System -Name 'AllowDomainPINLogon' -Value 0 | |
| Set-ItemProperty HKLM:\SOFTWARE\Microsoft\PolicyManager\default\Settings\AllowSignInOptions -Name 'value' -Value 0 | |
| New-Item -Path 'HKLM:\SOFTWARE\Policies\Microsoft\' -Name 'Biometrics' -Force | |
| New-ItemProperty -Path 'HKLM:\SOFTWARE\Policies\Microsoft\Biometrics' -Name 'Enabled' -Value 0 -PropertyType Dword -Force | |
| New-Item -Path 'HKLM:\SOFTWARE\Policies\Microsoft\' -Name 'PassportforWork' -Force | |
| New-ItemProperty -Path 'HKLM:\SOFTWARE\Policies\Microsoft\PassportforWork' -Name 'Enabled' -Value 0 -PropertyType Dword -Force | |
| Start-Process cmd -ArgumentList '/s,/c,takeown /f C:\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\NGC /r /d y & icacls C:\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\NGC /grant administrators:F /t & RD /S /Q C:\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Ngc & MD C:\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Ngc & icacls C:\Wi |
| # SGR color constants | |
| # rene-d 2018 | |
| class Colors: | |
| """ ANSI color codes """ | |
| BLACK = "\033[0;30m" | |
| RED = "\033[0;31m" | |
| GREEN = "\033[0;32m" | |
| BROWN = "\033[0;33m" | |
| BLUE = "\033[0;34m" |
This is an investigation into our susceptibility to Slow HTTP Attacks. These attacks take advantage of how typical web servers process requests and employ several strategies to achieve the same result. By keeping connections open longer than normal, they thereby prevent new connections from being opened and the server will either hang or return 503.
The question is less about whether we are vulnerable, but rather to what extent. Any server can be DoS’d, it’s just a matter of how easy it is to execute.