This gist shows how to create a GIF screencast using only free OS X tools: QuickTime, ffmpeg, and gifsicle.
To capture the video (filesize: 19MB), using the free "QuickTime Player" application:
| These two files should help you to import passwords from mac OS X keychains to 1password. | |
| Assumptions: | |
| 1) You have some experience with scripting/are a power-user. These scripts worked for me | |
| but they haven't been extensively tested and if they don't work, you're on your own! | |
| Please read this whole document before starting this process. If any of it seems | |
| incomprehensible/frightening/over your head please do not use these scripts. You will | |
| probably do something Very Bad and I wouldn't want that. | |
| 2) You have ruby 1.9.2 installed on your machine. This comes as standard with Lion, previous | |
| versions of OS X may have earlier versions of ruby, which *may* work, but then again, they |
| namespace NAMESPACE | |
| { | |
| public enum WindowsMessage | |
| { | |
| WM_NULL = 0x0000, | |
| WM_CREATE = 0x0001, | |
| WM_DESTROY = 0x0002, | |
| WM_MOVE = 0x0003, | |
| WM_SIZE = 0x0005, | |
| WM_ACTIVATE = 0x0006, |
| <script\x20type="text/javascript">javascript:alert(1);</script> | |
| <script\x3Etype="text/javascript">javascript:alert(1);</script> | |
| <script\x0Dtype="text/javascript">javascript:alert(1);</script> | |
| <script\x09type="text/javascript">javascript:alert(1);</script> | |
| <script\x0Ctype="text/javascript">javascript:alert(1);</script> | |
| <script\x2Ftype="text/javascript">javascript:alert(1);</script> | |
| <script\x0Atype="text/javascript">javascript:alert(1);</script> | |
| '`"><\x3Cscript>javascript:alert(1)</script> | |
| '`"><\x00script>javascript:alert(1)</script> | |
| <img src=1 href=1 onerror="javascript:alert(1)"></img> |
| import java.util.Iterator; | |
| import java.util.Map; | |
| import java.util.TreeMap; | |
| import javax.net.ssl.SSLServerSocketFactory; | |
| /* | |
| * Source from Christopher Schultz | |
| * @see http://markmail.org/message/zn4namfhypyxum23 | |
| */ | |
| public class SSLInfo |
| Default Cipher | |
| SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA | |
| * SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA | |
| SSL_DHE_DSS_WITH_DES_CBC_SHA | |
| SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA | |
| * SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA | |
| SSL_DHE_RSA_WITH_DES_CBC_SHA | |
| SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA | |
| SSL_DH_anon_EXPORT_WITH_RC4_40_MD5 | |
| SSL_DH_anon_WITH_3DES_EDE_CBC_SHA |
| %SYSTEMDRIVE%\boot.ini | |
| %WINDIR%\win.ini This is another file that can be counted on to be readable by all users of a system. | |
| %SYSTEMROOT%\repair\SAM | |
| %SYSTEMROOT%\System32\config\RegBack\SAM Stores user passwords in either an LM hash and/or an NTLM hash format. The SAM file in \repair is locked, but can be retrieved using forensic or Volume Shadow copy methods. | |
| %SYSTEMROOT%\repair\system | |
| %SYSTEMROOT%\System32\config\RegBack\system This is the SYSTEM registry hive. This file is needed to extract the user account password hashes from a Windows system. The SYSTEM file in \repair is locked, but can be retrieved using forensic or Volume Shadow copy methods. | |
| %SYSTEMROOT%\repair\SAM | |
| %SYSTEMROOT%\System32\config\RegBack\SAM These files store the LM and NTLM hashes for local users. Using Volume Shadow Copy or Ninja Copy you can retrieve these files. | |
| %WINDIR%\repair\sam | |
| %WINDIR%\repair\system |
| %% PlotRTL1090 | |
| % 3D visualization of air traffic through RTL-SDR (dump1090) and MATLAB | |
| % Copyright (C) 2014 Jorge Garcia Tiscar | |
| % | |
| % This program is free software: you can redistribute it and/or modify | |
| % it under the terms of the GNU General Public License as published by | |
| % the Free Software Foundation; either version 3 of the License, or | |
| % (at your option) any later version (see LICENSE). | |
| %% Initialize |