Skip to content

Instantly share code, notes, and snippets.

Programación de Index con Scylla (Optimización)

1. Configuración Óptima del Driver

Configuración de Conexiones

// Configurar para alta carga de trabajo
cass_cluster_set_protocol_version(cluster, CASS_PROTOCOL_VERSION_V4);
cass_cluster_set_num_threads_io(cluster, 4);
cass_cluster_set_queue_size_io(cluster, 8192);
// JennyLab Research! ( https://www.jennylab.net )
// ========================================================================================= //
// == SEASTAR HIGH-THROUGHPUT PATTERN GENERATION & DETECTION ENGINE == //
// == (No Device Interaction, Focus on Core Logic) == //
// ========================================================================================= //
// NOTE: Focus on data generation/detection. No SDR/USB. Detection logic is a placeholder. //
// Requires Seastar, Boost.Program_Options, Nlohmann JSON. //
// ========================================================================================= //
#include <iostream>
#!/bin/bash
# by h0ffy//JennyLab VX!
function print_status() {
if [[ "${1}" == "1" ]]; then
echo -e "[\033[0;32mOK\033[0m]"
else
echo -e "[\033[0;31mERROR\033[0m]"
exit
fi

Generación sencilla de scripts en Bash

1.1. Configuración

Es necesario editar el archivo de configuración ".bashrc"

vim ~/.bashrc

vim /etc/bashrc
#!/bin/bash
#set -x
set -e
PASSWORD="jenny$((RANDOM))"
echo "[+] Cleaning ~/.mitmproxy"
rm -rf ~/.mitmproxy
mkdir -p ~/.mitmproxy
cd ~/.mitmproxy
@h0ffy
h0ffy / jfet_reader.md
Last active March 28, 2025 07:33
JFet Read With Arduino
          10kΩ  
  +12V/24V ───/\/\/───┬── Drenaje (D)  
                        │  
                      (JFET)  
                        │  
       10kΩ             ┴── Fuente (S) ─── GND  
   A0 ───/\/\/───┬  
        47kΩ     │  
 │ │ 
sudo iptables -t nat -F
sudo iptables -A FORWARD -i tun0 -o tun1 -j ACCEPT
sudo iptables -A FORWARD -i tun1 -o tun0 -j ACCEPT
sudo iptables -t nat -A POSTROUTING -s 10.8.0.0/24 -o tun1 -j MASQUERADE
sudo iptables -t nat -A POSTROUTING -s 10.9.0.0/24 -o tun0 -j MASQUERADE
sudo iptables-save > /etc/iptables/rules.v4
@h0ffy
h0ffy / security-regex.md
Last active December 2, 2024 19:26
JennyDoc

SECRETS

Secrets Regex
amzn.mws]{8}-[0-9a-f]{4}-10-9a-f1{4}-[0-9a,]{4}-[0-9a-f]{12}
(A3T[A-Z0-9]|AKIA|AGPA|AROA|AIPA|ANPA|ANVA|ASIA)[A-Z0-9]{16}
(A3T[A-Z0-9]|AKIA|AGPA|AIDA|AROA|AIPA|ANPA|ANVA|ASIA)[A-Z0-9]{16}
https:\/\/hooks.slack.com\/services\/T[a-zA-Z0-9_]{8}\/B[a-zA-Z0-9_]{8}\/[a-zA-Z0-9_]{24}

1. RedTeam Windows Post-Explotation Commands

1.1. SysInsternals Suite

1.1.1. Accesschk.exe

Check all files and directories for access control lists (ACLs) and display the results in a human-readable format

accesschk.exe -accepteula -wus "Users" c:\*.* &gt; C:\WINDOWS\TEMP\listÇ_paths_writeable_by_users.txt