MD5: 59bab8f71f8c096cd3f72cd73851515d
Rename it to: Sublime Text
Make it executable with: chmod u+x Sublime\ Text
#!/bin/sh | |
# by throwaway96 | |
# licensed under AGPLv3+ | |
# https://gist.github.com/throwaway96/bb31a17562eec4d8325020dee8c7e6b5 | |
cert=/home/root/something.crt | |
name=lol_hax | |
file="${name}.pem" | |
tmp="/tmp/tempcert.pem.${$}" |
#!/bin/sh | |
# Directory to store overlays in (one directory structure is created per overlay configured down below) | |
OVERLAY_BASE=/var/lib/webosbrew/customca | |
overlay() { | |
set -e | |
overlay_id="$(echo $1 | sed 's;/;__;g')" | |
unset TARGET SOURCE FSTYPE OPTIONS | |
eval $(findmnt -P $1) |
# Copyright: (c) 2023, Jordan Borean (@jborean93) <[email protected]> | |
# MIT License (see LICENSE or https://opensource.org/licenses/MIT) | |
Function Get-SqlServerTlsCertificate { | |
<# | |
.SYNOPSIS | |
Gets the MS SQL X509 Certificate. | |
.DESCRIPTION | |
Gets the X509 Certificate that is being used by a remote MS SQL Server. |
#include <stdio.h> | |
#include <stdlib.h> | |
#include <stdint.h> | |
#ifdef _MSC_VER | |
#include <intrin.h> /* for rdtscp and clflush */ | |
#pragma optimize("gt",on) | |
#else | |
#include <x86intrin.h> /* for rdtscp and clflush */ | |
#endif |
// Original source link https://twitter.com/hFireF0X/status/887930221466443776 | |
// If you are here from any other link - do know that they just steal original info without giving any credit to source | |
// This bug has been fixed in 16273 public build. | |
#include "global.h" | |
HINSTANCE g_hInstance; | |
HANDLE g_ConOut = NULL; | |
BOOL g_ConsoleOutput = FALSE; | |
WCHAR g_BE = 0xFEFF; |
/* | |
ayy-oh-lmao.js | |
AOL Desktop <= 9.8.0 File Write and Remote Command Execution via MITM | |
AOL Desktop <= 9.8.1 File Write via MITM. | |
by slipstream/RoL, between August and December 2015. | |
irc.rol.im #rol ** http://rol.im/chat/ ** twitter @TheWack0lian | |
The custom AOL protocol, includes a scripting language called FDO91 (FDO), that's compiled into a bytecode. | |
Compiled FDO makes up part of the data sent from server to client and client to server. | |
#include <stdio.h> | |
#include <string.h> | |
#include <stdlib.h> | |
#include <gmp.h> | |
char * polynomial="-74101463560860539810482394216134472786413399/404009590666424903383979388988167534591844018460526499864038804741201731572423877094984692537474105135297393596654648304117684895744000000000000000000000*x^99 + 1786563401621773217421750502452955853226339781/1943688752347061390850759947022111850270039951356484879070977067483444756705819339975871373032521468004867185688372878439054154137600000000000000000000*x^98 - 27321291157050372775340569532625689973429185264741/12024094960310264981666053243695462339042976739896622019763059664916718201560234437350734896948634081407660523709959770955883479040000000000000000000000*x^97 + 4936870031754926645682423836151042176171669450909/1336493173680525187613977630110369004256312194947800263402124063124652591386915768177479078216982141485276408003996973457735680000000000000000000000*x^96 - 24473118674386691114350902920738421254018653211816783/55093218603941649400531744530105211175454647 |
#!/usr/bin/env python | |
import random | |
import struct | |
import sys | |
# Most of the Fat32 class was cribbed from https://gist.github.com/jonte/4577833 | |
def ppNum(num): | |
return "%s (%s)" % (hex(num), num) |
<!-- based on https://connect.microsoft.com/IE/feedback/details/1683347/ms-edge-combination-of-iframe-anchor-hash-navigation-and-history-state-crashes-the-browse --> | |
<!doctype html> | |
<html> | |
<head> | |
<script> | |
function boom() { | |
var iframe = document.getElementById('iframe1'); | |
document.location.href = '#'; | |
iframe.parentNode.removeChild(iframe); | |
alert(history.state); |