less {filename}
| Navigation | |
|---|---|
SPACE |
forward one window |
b |
backward one window |
d |
forward half window |
| <?php | |
| require_once __DIR__ . '/../DNS/vendor/autoload.php'; | |
| use Badcow\DNS\Zone, | |
| Badcow\DNS\ZoneFile, | |
| Badcow\DNS\ResourceRecord, | |
| Badcow\DNS\Rdata\SoaRdata, | |
| Badcow\DNS\Rdata\NsRdata, | |
| Badcow\DNS\Rdata\ARdata, |
| wget \ | |
| --recursive \ | |
| --convert-links \ | |
| --page-requisites \ | |
| --adjust-extension \ | |
| http://www.example.com |
| sh$ ffmpeg -i file.flac -b:a 256k file.mp3 | |
| sh$ for f in *.flac;do ffmpeg -i $f -b:a 256k $f.mp3;done | |
| sh$ for f in *.m4a; do ffmpeg -i "$f" -acodec libmp3lame -ab 256k "${f%.m4a}.mp3"; done |
| #!/usr/bin/env bash | |
| PREFIX='http://example.com/gallery/pic_' | |
| SUFFIX='.jpg' | |
| START=1 | |
| END=25 | |
| FORMAT="%02d" | |
| for i in `seq $START $END`; | |
| do |
| javascript:(function(){var a=document.getElementsByTagName('input');for(var i=0,e;e=a[i];i++)if(e.getAttribute('type')=='password')e.setAttribute('type', 'text');})() |
| <?php | |
| use Badcow\DNS\Parser\Parser; | |
| use Badcow\DNS\ZoneBuilder; | |
| require_once __DIR__ . '/../vendor/autoload.php'; | |
| $example = <<< 'DNS' | |
| $ORIGIN example.com. | |
| $TTL 1337 |
| Function Show-ProcessTree { | |
| [CmdletBinding()] | |
| Param($allprocess) | |
| Begin { | |
| # Identify top level processes | |
| # They have either an identified processID that doesn't exist anymore | |
| # Or they don't have a Parentprocess ID at all | |
| #$allprocess = Get-WmiObject -Class Win32_process | |
| $uniquetop = ($allprocess).ParentProcessID | Sort-Object -Unique |
| #Small object to make the handling of credentials simpler. | |
| class CredObject { | |
| $Username | |
| $Password | |
| } | |
| #Create the session to the domain controller. | |
| $dcSession = Create-Session -Ip 10.0.0.10 -Username "Administrator" -Password "MyVerySecurePassword" | |
| #Get all the users who aren't the Administrator |
| #Get the local accounts on a machine | |
| Get-WmiObject -Class Win32_UserAccount -Filter "LocalAccount='$True'" | Select-Object Name, Disabled |