ver: http://jorgeancal.com/tag/key-staruml/
En la carpeta de instalación:
Mac OS: /Applications/StarUML.app/Contents/www/license/node/
Linux: /opt/staruml/www/license/node/
Microsoft: C:\Program Files (x86)\StarUML\www\license\node
#!/usr/bin/python | |
# Created by vay3t | |
# echo "http://www.com/shell.php" >> lista_shells.txt | |
import requests | |
obj=open("lista_shells.txt","r") | |
list_shells=obj.readlines() | |
obj.close() |
#!/bin/bash | |
createTunnel() { | |
/usr/bin/ssh -N -R 2222:localhost:22 [email protected] | |
if [[ $? -eq 0 ]]; then | |
echo Tunnel to jumpbox created successfully | |
else | |
echo An error occurred creating a tunnel to jumpbox. RC was $? | |
fi | |
} | |
/bin/pidof ssh |
# -*- coding: utf-8 -*- | |
# Original code found at: | |
# https://gist.github.com/DenisFromHR/cc863375a6e19dce359d | |
# http://www.circuitbasics.com/raspberry-pi-i2c-lcd-set-up-and-programming/ | |
""" | |
Compiled, mashed and generally mutilated 2014-2015 by Denis Pleic | |
Made available under GNU GENERAL PUBLIC LICENSE |
# ~/.bashrc: executed by bash(1) for non-login shells. | |
# see /usr/share/doc/bash/examples/startup-files (in the package bash-doc) | |
# for examples | |
# If not running interactively, don't do anything | |
case $- in | |
*i*) ;; | |
*) return;; | |
esac |
ver: http://jorgeancal.com/tag/key-staruml/
En la carpeta de instalación:
Mac OS: /Applications/StarUML.app/Contents/www/license/node/
Linux: /opt/staruml/www/license/node/
Microsoft: C:\Program Files (x86)\StarUML\www\license\node
#!/bin/bash | |
# | |
# The BSD License (http://www.opensource.org/licenses/bsd-license.php) | |
# specifies the terms and conditions of use for checksec.sh: | |
# | |
# Copyright (c) 2009-2011, Tobias Klein. | |
# All rights reserved. | |
# | |
# Redistribution and use in source and binary forms, with or without | |
# modification, are permitted provided that the following conditions |
wordlist created from original 41G stash via: | |
grep -rohP '(?<=:).*$' | uniq > breachcompilation.txt | |
Then, compressed with: | |
7z a breachcompilation.txt.7z breachcompilation.txt | |
Size: |
Note: These are rough notes and there may be some variance as versions of raspbian get updated but should be pretty reliable as a guide.
This gist provides some instructions and config in order to have your Raspberry PI automatically connect to a roamed network, however if it fails to discover an available network it will set itself up as a wireless access point for you to connect to.
#include <string.h> | |
#include <stdio.h> | |
void func(char *arg){ | |
char nombre[32]; | |
strcpy(nombre, arg); | |
printf("Bienvenido a Linux Exploiting %s \n",nombre); | |
} | |
int main(int argc, char *argv[]){ |
+ +-------------------------+
| | +---------------------+ |
| | | Stack Frame Previo | |
| | +---------------------+ |
| | +---------------------+ |
| | | Argumentos | |
| | +---------------------+ |
| | +---------------------+ |
| | | Direccion de Retorno| |