Some notes, tools, and techniques for reverse engineering macOS binaries.
forked from https://gist.github.com/fire1ce/65d3e370120750a5deb283abe1d74491
opkg update && opkg install ca-certificates ca-bundle zsh curl git-http
sh -c "$(curl -fsSL https://raw.githubusercontent.com/robbyrussell/oh-my-zsh/master/tools/install.sh)"
#sed -i -- 's:/bin/ash:/usr/bin/zsh:g' /etc/passwd
which zsh && sed -i -- 's:/bin/ash:'`which zsh`':g' /etc/passwd
# -- reboot, all done. - Create or find a gist that you own.
- Clone your gist (replace
<hash>with your gist's hash):# with ssh git clone [email protected]:<hash>.git mygist # with https
git clone https://gist.github.com/.git mygist
###安装
opkg install kmod-usb-serial kmod-usb-serial-pl2303安装完成之后需要手动载入内核模块:
insmod usbserial
insmod pl2303| #!/usr/bin/expect -f | |
| # This script secures SuperMicro IPMI implementations which are vulnerable | |
| # to viewing the IPMI password in plaintext on port 49152. It does this by | |
| # using the shell available in some SuperMicro BMCs to drop traffic to port | |
| # 49152 in iptables. | |
| # | |
| # See http://blog.cari.net/carisirt-yet-another-bmc-vulnerability-and-some-added-extras/ | |
| # for more details on the vulnerability. | |
| # |
| #!/usr/bin/env bash | |
| # Loads and mounts an ISO over SMB via the | |
| # SuperMicro IPMI web interface | |
| # | |
| # usage: supermicro-mount-iso.sh <ipmi-host> <smb-host> <path> | |
| # e.g.: supermicro-mount-iso.sh 10.0.0.1 10.0.0.2 '\foo\bar\windows.iso' | |
| set -x |
The purpose of this short howto is to show you how to:
- use
openconnect[1] to connect to an enterprise cisco anyconnect endpoint - whilst minimizing the amount of traffic that your route through the vpn connection
Usually VPN administrators will puth the default route to the users, so that all user traffic is routed through the vpn connection. This is to address the various security concerns around compromised user computers bridging external internet traffic into the secure VPN network.
While the VPN administrator can push routes to the clients, the client can ignore these default routes and establish client side routing so that only the required A.B.C.D/E network is routed through the VPN. All other traffic will still use the clients default route and default outbound internet connection.
| <?php | |
| define('APP_PATH', dirname(__FILE__)); | |
| define('DATA_FILE', APP_PATH. '/sms.htdata'); | |
| if ($_SERVER['REQUEST_METHOD'] == 'POST') { //tasker提交 | |
| if (!isset($_POST['c'])) { | |
| die('Invalid Request!'); | |
| } else { | |
| $data = ''; | |
| if (file_exists(DATA_FILE)) { //读入已有数据 |
This guide is based on this blog post: http://blog.smartcore.net.au/blazingly-fast-afp-on-a-smartos-zone/.
Find the latest image, in this case 4166f6d6-ea5f-11e4-addd-8351b159d9b6 (15.1.0), or 24648664-e50c-11e4-be23-0349d0a5f3cf (14.4.1) if you need Long Term Support (LTS).
# imgadm avail | grep base-64
| // Use Gists to store code you would like to remember later on | |
| console.log(window); // log the "window" object to the console |