Skip to content

Instantly share code, notes, and snippets.

View annibuliful's full-sized avatar
😥
stressful

jarupong pajakgo annibuliful

😥
stressful
View GitHub Profile
#!/bin/bash
# Variables
MYSQL_PLUGIN_DIR="/usr/lib64/mysql/plugin"
AUDIT_LOG_PLUGIN="audit_log.so"
AUDIT_LOG_URL="https://github.com/zhaopinglu/mysql-audit/archive/refs/heads/master.zip"
MYSQL_CONF="/etc/my.cnf"
MYSQL_AUDIT_DIR="/var/lib/mysql"
MYSQL_USER="root"
MYSQL_PASS="your_password"
# Load the SYSTEM hive
reg load HKLM\TEMP_SYSTEM C:\Backup\system
# Load the SAM hive
reg load HKLM\TEMP_SAM C:\Backup\sam
# Get the Boot Key from the SYSTEM hive
$BootKey = ""
$SystemKey = "HKLM:\TEMP_SYSTEM\ControlSet001\Control\Lsa"
$SelectKey = Get-ItemProperty -Path $SystemKey
# Ensure the script is run with administrative privileges
if (-not ([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] "Administrator")) {
Write-Host "You need to run this script as an Administrator."
exit
}
# Validate file paths
$samFilePath = "C:\sam"
$systemFilePath = "C:\system"
param (
[string]$exportPath = "C:\Hashes",
[string]$outputFile = "C:\Hashes\exported_hashes.txt"
)
# Ensure running as administrator
if (-not ([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] "Administrator"))
{
Write-Warning "You need to run this script as an Administrator."
exit
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAICBP8UjSwbrrFfR8428yGjTzo8muZlDRa2Y3tD8Rnfrh lagmanmc@gmail.com
@annibuliful
annibuliful / th-address.json
Created June 11, 2024 13:33 — forked from mennwebs/th-address.json
Thai Address from Postal Code - JSON
This file has been truncated, but you can view the full file.
[
{
"zipCode": "10100",
"subDistrictList": [
{
"subDistrictId": "100801",
"districtId": "1008",
"provinceId": "10",
"subDistrictName": "ป้อมปราบ"
|=-----------------------------------------------------------------------=|
|=-------------=[ 3 Years of Attacking JavaScript Engines ]=-------------=|
|=-----------------------------------------------------------------------=|
|=------------------------------=[ saelo ]=------------------------------=|
|=-----------------------------------------------------------------------=|
The following are some brief notes about the changes that have taken place
since the release of the "Attacking JavaScript Engines" paper [1]. In
general, no big conceptional changes have happened since. Mitigations have
been added to break some of the presented techniques and, as expected, a
@annibuliful
annibuliful / postgres-cluster.yaml
Created March 13, 2023 05:19 — forked from kofemann/postgres-cluster.yaml
Running postgres in kubernetes
#
# postgres cluster in kubernetes with max 8 replicas
#
# the master is always on ${host}-0
#
#
# postgres master/slave configuration
#
@annibuliful
annibuliful / WebGL-WebGPU-frameworks-libraries.md
Created December 13, 2021 15:58 — forked from dmnsgn/WebGL-WebGPU-frameworks-libraries.md
A collection of WebGL and WebGPU frameworks and libraries

A non-exhaustive list of WebGL and WebGPU frameworks and libraries. It is mostly for learning purposes as some of the libraries listed are wip/outdated/not maintained anymore.

Engines and libraries

  • three.js: JavaScript 3D library
  • stack.gl: an open software ecosystem for WebGL, built on top of browserify and npm.
  • PixiJS: Super fast HTML 5 2D rendering engine that uses webGL with canvas fallback
  • Pex: Pex is a javascript 3d library / engine allowing for seamless development between Plask and WebGL in the browser.
  • Babylon.js: a complete JavaScript framework for building 3D games with HTML 5 and WebGL
  • Filament: Filament is a real-time physically based rendering engine for Android, iOS, Windows, Linux, macOS and WASM/WebGL
  • ClayGL: A WebGL graphic library
{
"fields": [
{
"name": "country",
"format": "",
"type": "string"
},
{
"name": "state",
"format": "",