// Configurar para alta carga de trabajo
cass_cluster_set_protocol_version(cluster, CASS_PROTOCOL_VERSION_V4);
cass_cluster_set_num_threads_io(cluster, 4);
cass_cluster_set_queue_size_io(cluster, 8192);
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
// JennyLab Research! ( https://www.jennylab.net ) | |
// ========================================================================================= // | |
// == SEASTAR HIGH-THROUGHPUT PATTERN GENERATION & DETECTION ENGINE == // | |
// == (No Device Interaction, Focus on Core Logic) == // | |
// ========================================================================================= // | |
// NOTE: Focus on data generation/detection. No SDR/USB. Detection logic is a placeholder. // | |
// Requires Seastar, Boost.Program_Options, Nlohmann JSON. // | |
// ========================================================================================= // | |
#include <iostream> |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# by h0ffy//JennyLab VX! | |
function print_status() { | |
if [[ "${1}" == "1" ]]; then | |
echo -e "[\033[0;32mOK\033[0m]" | |
else | |
echo -e "[\033[0;31mERROR\033[0m]" | |
exit | |
fi |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
#set -x | |
set -e | |
PASSWORD="jenny$((RANDOM))" | |
echo "[+] Cleaning ~/.mitmproxy" | |
rm -rf ~/.mitmproxy | |
mkdir -p ~/.mitmproxy | |
cd ~/.mitmproxy |
10kΩ
+12V/24V ───/\/\/───┬── Drenaje (D)
│
(JFET)
│
10kΩ ┴── Fuente (S) ─── GND
A0 ───/\/\/───┬
47kΩ │
│ │
sudo iptables -t nat -F
sudo iptables -A FORWARD -i tun0 -o tun1 -j ACCEPT
sudo iptables -A FORWARD -i tun1 -o tun0 -j ACCEPT
sudo iptables -t nat -A POSTROUTING -s 10.8.0.0/24 -o tun1 -j MASQUERADE
sudo iptables -t nat -A POSTROUTING -s 10.9.0.0/24 -o tun0 -j MASQUERADE
sudo iptables-save > /etc/iptables/rules.v4
Check all files and directories for access control lists (ACLs) and display the results in a human-readable format
accesschk.exe -accepteula -wus "Users" c:\*.* > C:\WINDOWS\TEMP\listÇ_paths_writeable_by_users.txt