First we start by creating a wineprefix and installing our prerequisites from terminal:
WINEARCH=win32 WINEPREFIX=/home/$USER/GarminExpress winetricks dotnet452 vcrun2010 corefontsWINEARCH=win32 WINEPREFIX=/home/$USER/GarminExpress winetricks win7First we start by creating a wineprefix and installing our prerequisites from terminal:
WINEARCH=win32 WINEPREFIX=/home/$USER/GarminExpress winetricks dotnet452 vcrun2010 corefontsWINEARCH=win32 WINEPREFIX=/home/$USER/GarminExpress winetricks win7| #!/bin/bash | |
| USER=$1 | |
| SHADOW_HASH_DATA=$(dscl -plist . -read /Users/$USER ShadowHashData | xpath 'plist[@version="1.0"]/dict//array/string/text()' 2>/dev/null | tr -cd '[:print:]' | xxd -r -p | base64) | |
| echo '0x0A 0x5C 0x3A 0x2C dsRecTypeStandard:Users 2 dsAttrTypeStandard:RecordName base64:dsAttrTypeNative:ShadowHashData' > $USER.dsimport | |
| echo -n $USER:$SHADOW_HASH_DATA >> $USER.dsimport | |
| entropy=$(echo $SHADOW_HASH_DATA | base64 -D | plutil -convert xml1 - -o - | plutil -extract 'SALTED-SHA512-PBKDF2' xml1 - -o - | plutil -extract 'entropy' xml1 - -o - | xpath 'plist[@version="1.0"]/data/text()' 2>/dev/null | tr -cd '[:print:]' | base64 -D | xxd -p | tr -d '\n') | |
| salt=$(echo $SHADOW_HASH_DATA | base64 -D | plutil -convert xml1 - -o - | plutil -extract 'SALTED-SHA512-PBKDF2' xml1 - -o - | plutil -extract 'salt' xml1 - -o - | xpath 'plist[@version="1.0"]/data/text()' 2>/dev/null | tr -cd '[:print:]' | base64 -D | xxd -p | tr -d '\n') | |
| iterations=$(echo $SHADOW_HASH_DATA | base64 -D | plutil -convert xml1 - -o - | p |
A live CD or live DVD is a complete bootable Linux operating system loaded from a CD or DVD. Although there are a lots of live Linux CDs, for seemingly every taste and purpose, it might still be useful on occasion to build your own. This guide details the steps to build a bootable live CD/DVD based on Debian “wheezy”.
Step 1 – Installing the necessary software
These are the software packages you need to install on your Debian system:
apt-get install xorriso live-build syslinux squashfs-toolsStep 2 – Create a basic filesystem
| const net = require('net') | |
| const opts = { | |
| host: 'localhost', | |
| port: 1234, | |
| sockets: 2000, | |
| respawn: false, | |
| rate: 600, | |
| method: 'GET', | |
| path: '/' |
install log
cd prl_fs/SharedFolders/Guest/Linux/prl_fs && make CC=cc
make[1]: Entering directory '/usr/lib/parallels-tools/kmods/prl_fs/SharedFolders/Guest/Linux/prl_fs'
make -C /lib/modules/5.0.0-25-generic/build M=/usr/lib/parallels-tools/kmods/prl_fs/SharedFolders/Guest/Linux/prl_fs CC=cc
make[2]: Entering directory '/usr/src/linux-headers-5.0.0-25-generic'
CC [M] /usr/lib/parallels-tools/kmods/prl_fs/SharedFolders/Guest/Linux/prl_fs/super.o
/usr/lib/parallels-tools/kmods/prl_fs/SharedFolders/Guest/Linux/prl_fs/super.c: In function 'prlfs_remount':
/usr/lib/parallels-tools/kmods/prl_fs/SharedFolders/Guest/Linux/prl_fs/super.c:119:21: error: 'MS_RDONLY' undeclared (first use in this function); did you mean 'IS_RDONLY'?
if ( (!((*flags) & MS_RDONLY) && PRLFS_SB(sb)->readonly) ||
| require 'base64' | |
| require 'plist' | |
| module Chef::Provider::User::DsclMojaveUserExtensions | |
| # new for 10.14+ | |
| def mac_osx_version_greater_than_10_13? | |
| Gem::Version.new(node['platform_version']) > Gem::Version.new('10.13.99') | |
| end | |
| # updated for 10.14+ |
| Document infos: | |
| - Author = Peter Kim | |
| - CreationDate = D:20180505020009+00'00' | |
| - Creator = calibre 2.69.0 [https://calibre-ebook.com] | |
| - Pages = 308 | |
| - Producer = calibre 2.69.0 [https://calibre-ebook.com] | |
| - Title = The Hacker Playbook 3: Practical Guide To Penetration Testing | |
| - dc = {'publisher': ['Secure Planet'], 'description': {'x-default': None}, 'language': ['en'], 'creator': ['Peter Kim'], 'title': {'x-default': 'The Hacker Playbook 3: Practical Guide To Penetration Testing'}, 'date': ['2018-05-01T00:00:00+02:00'], 'subject': []} | |
| - http://calibre-ebook.com/xmp-namespace = {'timestamp': '2018-05-03T18:05:43.134685+02:00', 'author_sort': 'Kim, Peter'} | |
| - xap = {'Identifier': ['\n '], 'MetadataDate': '2018-05-05T04:00:09.811485+02:00'} |
| #!/bin/bash | |
| NETWORK_SERVICE_NAME="Wi-Fi" | |
| if [ "$#" -ne 1 ]; then | |
| echo "Argument missing [on/off]" | |
| exit 0 | |
| fi | |
| if [ $1 == "on" ]; then |
| #!/usr/bin/python | |
| import pwn | |
| import struct | |
| p = pwn.remote("rescueshell.challs.malice.fr",6060) | |
| # p = pwn.process("./rescue") | |
| raw_input("ATTACH NOW") |
| #!/bin/sh | |
| [[ $EUID == 0 ]] || { echo "Must be run as root."; exit; } | |
| PKGNAME=AgentUninstaller | |
| LOG=/tmp/$PKGNAME.log | |
| touch $LOG | |
| chmod a+rw $LOG | |
| DAEMON_PLIST="/Library/LaunchDaemons/com.airwatch.airwatchd.plist" |