经过实践,发现需要使用旧的genymotion 版本,如2.12.2, 应该 3.3.0 版本以下的都可以。
本地的adb 版本可能与 genymotion 自带的adb 版本不兼容,可以将本地的adb拷贝到genymotion tools 目录下
| #!/bin/bash | |
| ################################################################################ | |
| # | |
| # UNIX域Socket抓包 | |
| # | |
| # 作者:RToax | |
| # 时间:2020年11月9日 | |
| # tips:多次测试时,会出现“Address already in use”问题,使用-p参数修改端口即可 | |
| # 测试时先启动server,接着undump.sh,接着客户端连接通话 |
| #Program Name :- Windows Auditor Based on CIS Benchmark | |
| #Program Name :- Windows Auditor Based on CIS Benchmark | |
| #Benchmark File used :- CIS_Microsoft_Windows_Server_2012_Benchmark_v1.0.0 | |
| #Author : Kaustubh Padwad | |
| #copyright : copyright (c) 2015 Kaustubh Padwad | |
| #Licnse :- Gnu-GPL-3 | |
| Set-ExecutionPolicy -ExecutionPolicy restricted -force | |
| echo "1 Checks for Computer Configuration" | |
| echo "1.1 Security Settings" | |
| echo "1.1.1 Account Policies" > audit.txt |
| <# | |
| Spect | |
| # # # # # # # # # | |
| # # # # # # | |
| # # # # # # # | |
| # # # # # # # # | |
| # # # # # # # | |
| beta version | |
| Author : A-mIn3 |
| # -*- coding: utf-8 -*- | |
| from termcolor import colored | |
| import time | |
| import MySQLdb | |
| import pymongo | |
| import socket | |
| import ftplib | |
| import optparse | |
| from termcolor import colored |
| #Author:D4Vinci | |
| def ip2long(ip): | |
| ip = ip.split("/")[0].split(":")[0] | |
| p = ip.split(".") | |
| return str( ( ( ( ( int(p[0]) * 256 + int(p[1]) ) * 256 ) + int(p[2]) ) * 256 ) + int(p[3])) | |
| #p[0] + "." + str( ( ( ( int( p[1] ) * 256 + int( p[2] ) ) * 256 ) + int( p[3] ) ) * 256 ), | |
| #p[0] + "." + p[1] + str( ( int( p[2] ) *256 ) + int( p[3] ) ) | |
| def ip2hex(ip): |
| #!/usr/bin/perl -w | |
| use Getopt::Long; | |
| use Tie::File; | |
| my $version=2014102301; | |
| print "\t\t\tWeb log forensics\n"; | |
| print "\t\t\tby Xti9er\n"; | |
| $|=1; |
| /* | |
| [] Shellcode Generator null byte free. [] | |
| [] Author: certaindeath [] | |
| [] Site: certaindeath.netii.net (at the moment under construction) [] | |
| [] This program generates a shellcode which uses the stack to store the command (and its arguments). [] | |
| [] Afterwords it executes the command with the system call "execve". [] | |
| [] The code is a bit knotty, so if you want to understand how it works, I've added an example of assembly at the end. [] | |
| */ | |
| #include <stdio.h> | |
| #include <stdlib.h> |
| <?php | |
| /** | |
| * PHP 富文本XSS过滤类 | |
| * | |
| * @package XssHtml | |
| * @version 1.0.0 | |
| * @link http://phith0n.github.io/XssHtml | |
| * @since 20140621 | |
| * @copyright (c) Phithon All Rights Reserved | |
| * |
| #/usr/bin/env python3.4 | |
| #Analyse the /etc/auth.log files to get | |
| # 1) how many failed login trials | |
| # 2) how many succeeded login trials | |
| # 3) how many IP's where the login trials comes from and what they are | |
| # 4) how many invalid usernames are tested and what they are | |
| # | |
| # usage: | |
| # analyse <filename> | |
| # note: - for standard input stream |