http://webstersprodigy.net/2013/08/30/yet-another-vbs-pwncode-generator/
(Read More..)Sabtu, 31 Agustus 2013
Opening Sublime Text projects from the command line
Rabu, 28 Agustus 2013
Selasa, 27 Agustus 2013
Multithreading - The Delphi Way.
Minggu, 25 Agustus 2013
Sabtu, 24 Agustus 2013
supervisord
Supervisor is a client/server system that allows its users to monitor
and control a number of processes on UNIX-like operating systems.
It shares some of the same goals of programs like launchd,
daemontools, and runit. Unlike some of these programs,
it is not meant to be run as a substitute for init as “process id
1”. Instead it is meant to be used to control processes related to a
project or a customer, and is meant to start like any other program at
boot time.
http://supervisord.org/
Linux 3.9 introduced new way of writing socket servers
# Because knowing the inode number of a file and its human readable size is important, especially when taking its time into account
ls -shit
(Read More..)Kamis, 22 Agustus 2013
tukani slackware buildtools
Minggu, 18 Agustus 2013
Spacing The Bottom of Modules
Ah the humble module! A good many designs these days make use of
modules in the content-y and app-y sites alike. A chunk of information,
an advertisement, a grouped set of functionality... could be anything.
The fact that they likely have visual similarity yet can contain
anything leads to an interesting CSS challenge: how do you pad the
inside consistently?
Here's a simple example where the module is set apart from the background through color differences:
http://css-tricks.com/spacing-the-bottom-of-modules/
ZMap
Learning the meaning behind words
ROOT ANDROID | Cara Terbaru Unlock SmartFren Andromax-i Ke Rev B
ROOT ANDROID | Cara Terbaru Unlock SmartFren Andromax-i Ke Rev B
http://www.kedai-android.com/2013/07/root-android-cara-terbaru-unlock.html
# Show the last access time of all files ending with .txt. This may not work on all filesystems/setups.
ls -l --time=atime --full-time *.txt
(Read More..)# site shot from command line. By @gustavorobertux
xvfb-run --server-args="-screen 0, 1024x768x24" cutycapt --url=http://url --out=image.png #
(Read More..)Get the first argument of the previous command. This is a readline thing. Thx ozmart and @sromeroi
[Ctrl]+[Alt]+Y
(Read More..)lock console with a nice screensaver. Requires password to unlock
alias tl="tty-clock -s -r; vlock"
(Read More..)Jumat, 16 Agustus 2013
Kamis, 15 Agustus 2013
Installing Google Play on Android Emulator
Senin, 12 Agustus 2013
Sabtu, 10 Agustus 2013
ioping
This tool lets you monitor I/O latency in real time. It shows disk latency in the same way as ping shows network latency.
Usage: ioping [-LABCDWRq] [-c count] [-w deadline] [-pP period] [-i interval] [-s size] [-S wsize] [-o offset] directory|file|device ioping -h | -v -c <count> stop after <count> requests -w <deadline> stop after <deadline> -p <period> print raw statistics for every <period> requests -P <period> print raw statistics for every <period> in time -i <interval> interval between requests (1s) -s <size> request size (4k) -S <wsize> working set size (1m) -o <offset> working set offset (0) -L use sequential operations (includes -s 256k) -A use asynchronous I/O -C use cached I/O -D use direct I/O -W use write I/O *DANGEROUS* -R seek rate test (same as -q -i 0 -w 3 -S 64m) -B print final statistics in raw format -q suppress human-readable output -h display this message and exit -v display version and exit
https://code.google.com/p/ioping/
(Read More..)
ospy
oSpy is a tool which aids in reverse-engineering
software running on the Windows platform. With the amount of proprietary
systems that exist today (synchronization protocols, instant messaging,
etc.), the amount of work required to keep up when developing
interoperable solutions will quickly become a big burden when limited to
traditional techniques. However, when the sniffing is done on the API
level it allows a much more fine-grained view of what's going on. Seeing
return-addresses for each recv/send call (for example), can prove
useful when you want to look at the processing code at that spot in a
debugger or static analysis tool. And if an application uses encrypted
communication it's easy to intercept these calls as well. oSpy
already intercepts one such API, and is the API used by MSN Messenger,
Google Talk, etc. for encrypting/decrypting HTTPS data. Another neat
feature is when wanting to see how an application behaves when in a
firewalled environment. Normally you would have to simulate such an
environment by configuring firewalls etc., which not only is
time-consuming, but might also cripple the rest of the applications
you've got running. oSpy solves this problem by a feature called
softwalling which allows you to set rules based on the type of
function-call, the return-address, local/remote address/port, etc., and
lets you choose which error to signal back to the application when the
rule matches. This way you can make the application think that for
example a connect() timed out, connection was refused, there was no
route to host, etc.
Getting Involved
Want to help out? oSpy is an open source project and contributions are most appreciated! Whether you want to help out with artwork, code, documentation or anything else, don't hesitate to contact me at oleavr at gmail dot com.http://code.google.com/p/ospy/ (Read More..)
hookme TCP Proxy (Data tamper)
Description
HookME is a software designed for intercepting communications by hooking the desired process and hooking the API calls for sending and receiving network data (even SSL clear data). HookMe provides a nice graphic user interface allowing you to change the packet content in real time, dropping or forwarding the packet. It also has a python system plugin to extend the HookMe functionality.It can be used for a lot of purposes such as:
- Analyzing and modifying network protocols
- Creation of malware or backdoors embebed into network protocols
- Protocol vulnerability memory patching
- Firewall at protocol layer
- As postexplotation tool
- whatever you can create with plugins using your imagination
Plugins
HookMe have a plugins system in Python. You can develop your own plugins or just download them from our repository, https://code.google.com/p/hookme/source/browse/#svn%2Ftrunk%2Fhookme%2Fhook%2FScriptsAlso, if you want your script to appear here (it will contain your credits) you can contact us in hookmesoftware@gmail.com.
https://code.google.com/p/hookme/ (Read More..)
HookME 0.2 – API Spying Tool
http://www.sectechno.com/2013/04/28/hookme-0-2-api-spying-tool/
Description
HookME is a software designed for intercepting communications by hooking the desired process and hooking the API calls for sending and receiving network data (even SSL clear data). HookMe provides a nice graphic user interface allowing you to change the packet content in real time, dropping or forwarding the packet. It also has a python system plugin to extend the HookMe functionality.It can be used for a lot of purposes such as:
- Analyzing and modifying network protocols
- Creation of malware or backdoors embebed into network protocols
- Protocol vulnerability memory patching
- Firewall at protocol layer
- As postexplotation tool
- whatever you can create with plugins using your imagination
https://code.google.com/p/hookme/ (Read More..)
API Monitor 2 – Hook API Calls
Monitoring API calls on operating system is important to verify what the
application is changing on the system. API monitor is a program that
can be used to monitor and display API-calls made by various
applications and services. It is a very good tool for investigating
different malwares in sandbox.
http://www.sectechno.com/2013/08/10/api-monitor-2-hook-modify-api-calls/
frida : Everything in reverse, for free! {python}
😹 Frida is an open-source toolkit for interactive and scriptable ƃuıɹǝǝuıƃuǝ ǝsɹǝʌǝɹ.
😹 You can inspect and manipulate processes running locally, over the network, or across platforms.
😹 You can inject your own scripts into black box processes to execute custom debugging logic.
http://frida.github.io/
Deep C (and C++)
Programming is hard. Programming correct C and C++ is particularly
hard. Indeed, both in C and certainly in C++, it is uncommon to see a
screenful containing only well defined and conforming code. Why do
professional programmers write code like this? Because most programmers
do not have a deep understanding of the language they are using. While
they sometimes know that certain things are undefined or unspecified,
they often do not know why it is so. In these slides we will study small
code snippets in C and C++, and use them to discuss the fundamental
building blocks, limitations and underlying design philosophies of these
wonderful but dangerous programming languages.
Jon Jagger and I just released a slide deck to discuss the fundamentals of C and C++ (slideshare, pdf).
http://olvemaudal.wordpress.com/2011/10/10/deep-c/
Kamis, 08 Agustus 2013
Rabu, 07 Agustus 2013
Basic mitigation against the BREACH attack for Django projects.
Adds middleware and context processors to give some protection against the BREACH attack in Django.
Basic mitigation against the BREACH attack for
Django projects.
When combined with rate limiting in your web-server the techniques here should
provide at least some protection against the BREACH attack.
http://breachattack.com/
https://www.djangoproject.com/weblog/2013/aug/06/breach-and-django/
https://pypi.python.org/pypi/django-debreach/0.1.1
BREACH decodes HTTPS encrypted data in 30 seconds
NIELD Network Interface Events Logging Daemon
nield(Network Interface Events Logging Daemon) is a tool that receives notifications from the kernel through the netlink socket, and generates logs related to interfaces, neighbor cache(ARP,NDP), IP address(IPv4,IPv6), routing, FIB rules, traffic control.
http://nield.sourceforge.net/
(Read More..)Video Lectures | Performance Engineering of Software Systems | Electrical Engineering and Computer Science | MIT OpenCourseWare
Hoodie
Very fast web app development
We want to enable you to build complete web apps in days, without having to worry about backends, databases or servers, all with an open-source library that's as simple to use as jQuery.That's why we're making Hoodie.
Hoodie is a noBackend architecture for frontend-only web apps.
http://hood.ie (Read More..)
Emmet LiveStyle
Emmet LiveStyle is a plugin for live bi-directional (editor↔browser)
CSS editing of new generation. Currently, it works in Google Chrome,
Safari and Sublime Text, more browsers and editors will be available
later.
This video demonstrates the most powerful features of LiveStyle.
http://livestyle.emmet.io/