A handy reference for ssh
, ssh-keygen
, and ssh-agent
commands.
Git is hard: screwing up is easy, and figuring out how to fix your mistakes is fucking impossible. Git documentation has this chicken and egg problem where you can't search for how to get yourself out of a mess, unless you already know the name of the thing you need to know about in order to fix your problem.
So here are some bad situations I've gotten myself into, and how I eventually got myself out of them in plain english*.
Surf to github issues and explore issues, delete all filters and set some new ones
Surf to link, look at labels
Hacking and “being a hacker” have fascinated me for over seven years now, and since then, I have started a career in Red Teaming. This job is particularly interesting, because you have to know many things about (offensive) cybersecurity. Basically, you get to hack entire companies. You do this to test their defenses and uncover vulnerabilities.
During my work in this field, I’ve acquired many skills and learned quite a few hacks which I want to share in this blog post.
As a fair warning: If you are already working in cybersecurity for a long time, you might not get a whole lot of new knowledge from this post, but you might want to check out some of my other blog posts. Additionally, this could be the blog post you share with your friends and family to get them interested in the amazing job you are doing.
I will also sort the skills from useful for almost everyone to interesting for techies. And since learning how to hack computers is a whole other topic, we wi
It is basically a search string that uses advanced search query to find information that are not easily available on the websites. It is also regarded as illegal google hacking activity which hackers often uses for purposes such as cyber terrorism and cyber theft.
Dork
They are like search criteria in which a search engine returns results related to your dork.
People often take Google as just a search engine used to find text, images, videos, and news. However, in the infosec world, it has a very vast role. Google can also be used as a very useful hacking tool.
# Delete local tags. | |
git tag -d $(git tag -l) | |
# Fetch remote tags. | |
git fetch | |
# Delete remote tags. | |
git push origin --delete $(git tag -l) # Pushing once should be faster than multiple times | |
# Delete local tags. | |
git tag -d $(git tag -l) |
# --------------------------------------------------------------------------- | |
# | |
# Description: This file holds all my BASH configurations and aliases | |
# | |
# Sections: | |
# 1. Environment Configuration | |
# 2. Make Terminal Better (remapping defaults and adding functionality) | |
# 3. File and Folder Management | |
# 4. Searching | |
# 5. Process Management |