ver: http://jorgeancal.com/tag/key-staruml/
En la carpeta de instalación:
Mac OS: /Applications/StarUML.app/Contents/www/license/node/
Linux: /opt/staruml/www/license/node/
Microsoft: C:\Program Files (x86)\StarUML\www\license\node
| #!/usr/bin/python | |
| # Created by vay3t | |
| # echo "http://www.com/shell.php" >> lista_shells.txt | |
| import requests | |
| obj=open("lista_shells.txt","r") | |
| list_shells=obj.readlines() | |
| obj.close() |
| #!/bin/bash | |
| createTunnel() { | |
| /usr/bin/ssh -N -R 2222:localhost:22 serverUser@25.25.25.25 | |
| if [[ $? -eq 0 ]]; then | |
| echo Tunnel to jumpbox created successfully | |
| else | |
| echo An error occurred creating a tunnel to jumpbox. RC was $? | |
| fi | |
| } | |
| /bin/pidof ssh |
| # -*- coding: utf-8 -*- | |
| # Original code found at: | |
| # https://gist.github.com/DenisFromHR/cc863375a6e19dce359d | |
| # http://www.circuitbasics.com/raspberry-pi-i2c-lcd-set-up-and-programming/ | |
| """ | |
| Compiled, mashed and generally mutilated 2014-2015 by Denis Pleic | |
| Made available under GNU GENERAL PUBLIC LICENSE |
| # ~/.bashrc: executed by bash(1) for non-login shells. | |
| # see /usr/share/doc/bash/examples/startup-files (in the package bash-doc) | |
| # for examples | |
| # If not running interactively, don't do anything | |
| case $- in | |
| *i*) ;; | |
| *) return;; | |
| esac |
ver: http://jorgeancal.com/tag/key-staruml/
En la carpeta de instalación:
Mac OS: /Applications/StarUML.app/Contents/www/license/node/
Linux: /opt/staruml/www/license/node/
Microsoft: C:\Program Files (x86)\StarUML\www\license\node
| #!/bin/bash | |
| # | |
| # The BSD License (http://www.opensource.org/licenses/bsd-license.php) | |
| # specifies the terms and conditions of use for checksec.sh: | |
| # | |
| # Copyright (c) 2009-2011, Tobias Klein. | |
| # All rights reserved. | |
| # | |
| # Redistribution and use in source and binary forms, with or without | |
| # modification, are permitted provided that the following conditions |
| wordlist created from original 41G stash via: | |
| grep -rohP '(?<=:).*$' | uniq > breachcompilation.txt | |
| Then, compressed with: | |
| 7z a breachcompilation.txt.7z breachcompilation.txt | |
| Size: |
Note: These are rough notes and there may be some variance as versions of raspbian get updated but should be pretty reliable as a guide.
This gist provides some instructions and config in order to have your Raspberry PI automatically connect to a roamed network, however if it fails to discover an available network it will set itself up as a wireless access point for you to connect to.
| #include <string.h> | |
| #include <stdio.h> | |
| void func(char *arg){ | |
| char nombre[32]; | |
| strcpy(nombre, arg); | |
| printf("Bienvenido a Linux Exploiting %s \n",nombre); | |
| } | |
| int main(int argc, char *argv[]){ |
+ +-------------------------+
| | +---------------------+ |
| | | Stack Frame Previo | |
| | +---------------------+ |
| | +---------------------+ |
| | | Argumentos | |
| | +---------------------+ |
| | +---------------------+ |
| | | Direccion de Retorno| |