pip install -r requirements.txt
Add your podcast URLs to download_podcasts.py
Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-2021-44228)
Log Review Cheatsheet Critical Log Review Checklist for Security Incidents
Hardening GPO Reference UT Windows Hardening Checklist
Samsung's otherwise excellent 2016 range of UHD TVs received an update that added advertisements to the UI. This has been complained about at great length on Samsung's forums and repeatedly, Samsung have refused to add an option to remove them.
The ads interrupt the clean UI of the TV and are invasive. Here's an example of how they look:
This guide was originally posted on Samsung's TV forums but unfortunately, that site is a super-slow and barely accessible unusable mess.
www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
is up the virus exits instead of infecting the host. (source: malwarebytes). This domain has been sinkholed, stopping the spread of the worm. Will not work if proxied (source).update: A minor variant of the viru
#!/usr/bin/env python | |
# -*- coding: utf-8 -*- | |
from __future__ import unicode_literals | |
""" | |
reachable.py - Run reachability tests on Devices. | |
The following tests are run: | |
- DNS ok |
#!/usr/bin/env python | |
''' | |
Format string exploitation utility | |
by: Ole Aass (www.oleaass.com) | |
This script has one job, which is to overwrite one address with another | |
This script takes three inputs. |
The purpose of this document is to make recommendations on how to browse in a privacy and security conscious manner. This information is compiled from a number of sources, which are referenced throughout the document, as well as my own experiences with the described technologies.
I welcome contributions and comments on the information contained. Please see the How to Contribute section for information on contributing your own knowledge.
#!/bin/bash | |
echo "" | |
echo "==========================================================================" | |
echo "= Pentest Attack Machine Setup =" | |
echo "= Based on the setup from The Hacker Playbook =" | |
echo "==========================================================================" | |
echo "" | |
# Prepare tools folder |
#!/usr/bin/env python | |
import zipfile | |
import argparse | |
import re | |
import os | |
from time import strftime | |
""" | |
Attempt to extract zip archive with password | |
""" |