start new:
tmux
start new with session name:
tmux new -s myname
| #!/usr/bin/python | |
| ############################################################## | |
| # PyInstaller Win32 shellcode runner - by @mihi42 | |
| # | |
| # Needed software: | |
| # * Python 2.7.2 from | |
| # <http://www.python.org/download/releases/> | |
| # * PyWin32 build 217 for Python 2.7 from | |
| # <http://sourceforge.net/projects/pywin32/files/pywin32/> |
| #!/usr/bin/python | |
| from impacket import smb | |
| from struct import pack | |
| import os | |
| import sys | |
| import socket | |
| ''' | |
| EternalBlue exploit by sleepya | |
| The exploit might FAIL and CRASH a target system (depended on what is overwritten) |
| /* https://spectreattack.com/spectre.pdf */ | |
| #include <stdio.h> | |
| #include <stdlib.h> | |
| #include <stdint.h> | |
| #ifdef _MSC_VER | |
| #include <intrin.h> /* for rdtscp and clflush */ | |
| #pragma optimize("gt",on) | |
| #else | |
| #include <x86intrin.h> /* for rdtscp and clflush */ | |
| #endif |
| FROM ubuntu:16.04 | |
| ## Helpful commands | |
| # >> Build the docker container | |
| # docker build -t retriforce . | |
| # >> Run the docker container, mapping a directory into the container | |
| # docker run --rm -it -v "<HOST_SHARE>:<GUEST_DIR>" retriforce | |
| ## Tunables | |
| ENV UNICORNVER 0.9 |
(Also see [remarkable][], the markdown parser created by the author of this cheatsheet)
| qApp->setStyle(QStyleFactory::create("Fusion")); | |
| QPalette darkPalette; | |
| darkPalette.setColor(QPalette::Window, QColor(53,53,53)); | |
| darkPalette.setColor(QPalette::WindowText, Qt::white); | |
| darkPalette.setColor(QPalette::Base, QColor(25,25,25)); | |
| darkPalette.setColor(QPalette::AlternateBase, QColor(53,53,53)); | |
| darkPalette.setColor(QPalette::ToolTipBase, Qt::white); | |
| darkPalette.setColor(QPalette::ToolTipText, Qt::white); | |
| darkPalette.setColor(QPalette::Text, Qt::white); |
| awk 'NF {sub(/\r/, ""); printf "%s\\n",$0;}' cert-name.pem |