- Set iDrac settings using System Boot Menu
- Set Static IP:
F2
>iDrac settings
>Network
- Set Username / Password:
F2
>iDrac settings
>Access
- Set Static IP:
- Flash iDRAC7_LocalLicense_Installation_Tool_A00_1.0.iso using
dd
to USB - 30 day evaluation license and enabled dedicated iDrac NIC
// ==UserScript== | |
// @name Remove Sponsored Facebook Elements | |
// @description Remove sponsored items from feed. | |
// @author Turing Eret | |
// @namespace us.lambdacalcul | |
// @version 0.1 | |
// @copyright Copyright © 2020 Turing Eret | |
// @license MIT | |
// @match https://*.facebook.com/* | |
// @grant none |
// ==UserScript== | |
// @name Video Downloader for Tampermonkey | |
// @version 0.4 | |
// @description Will add a download button to Reddit, Facebook and Youtube videos | |
// @author Github/Mordo95 | |
// @match *://*/* | |
// @grant GM_xmlhttpRequest | |
// @run-at document-start | |
// ==/UserScript== |
Retrieves all of the trust relationships for this domain - Does not Grab Forest Trusts | |
([System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain()).GetAllTrustRelationships() | |
Grab Forest Trusts. | |
([System.DirectoryServices.ActiveDirectory.Forest]::GetCurrentForest()).GetAllTrustRelationships() | |
#!/bin/bash | |
# Raspberry Pi stress CPU temperature measurement script. | |
# | |
# Download this script (e.g. with wget) and give it execute permissions (chmod +x). | |
# Then run it with ./pi-cpu-stress.sh | |
# | |
# NOTE: In recent years, I've switched to using s-tui. See: | |
# https://github.com/amanusk/s-tui?tab=readme-ov-file#options | |
# Variables. |
GitHub repositories can disclose all sorts of potentially valuable information for bug bounty hunters. The targets do not always have to be open source for there to be issues. Organization members and their open source projects can sometimes accidentally expose information that could be used against the target company. in this article I will give you a brief overview that should help you get started targeting GitHub repositories for vulnerabilities and for general recon.
You can just do your research on github.com, but I would suggest cloning all the target's repositories so that you can run your tests locally. I would highly recommend @mazen160's GitHubCloner. Just run the script and you should be good to go.
$ python githubcloner.py --org organization -o /tmp/output
I often get asked which tools are good to use for securing your AWS infrastructure so I figured I'd write a short listof some useful Security Tools for the AWS Cloud Infrastructure.
This list is not intended be something completely exhaustive, more so provide a good launching pad for someone as they dig into AWS and want to make it secure from the start.
This section focuses on tools and services provided by the community and released as open-source.
on getFrontAppPath() | |
set frontAppPath to (path to frontmost application) as text | |
set myPath to (path to me) as text | |
if frontAppPath is myPath then | |
try | |
tell application "Finder" to set bundleID to id of file myPath | |
tell application "System Events" to set visible of (first process whose bundle identifier is bundleID) to false | |
-- we need to delay because it takes time for the process to hide |
# THIS FILE IS NO LONGER BEING MAINTAINED. FOR A MAINTAINED VERSION, PLEASE USE THE VERSION IN THE NEW REPOSITORY. | |
# Repository: https://github.com/hkamran80/blocklists | |
# New link for this file: https://raw.githubusercontent.com/hkamran80/blocklists/main/smart-tv | |
# ------ | |
# This is a blocklist to block Smart TVs sending data home. | |
# Please help to collect domains! | |
# It could be that the TV does not receive any more updates or other services no longer work. Please report such an incident. |