6 private links
Ip over dns for public wifi
tuto: http://vincesafe.fr/2012/08/26/contournez-restrictions-et-censure-avec-lip-over-dns/
Generate data to use with: http://links.izissise.net/?8IPScA
Most people use only a small portion of the power of the word processor, but it doesn't have to be that way. In fact, if average users knew the power they held at their fingertips, they'd be amazed at what they're missing.
If some piece of memory should be reused, turn them to variables (or const variables).
If some piece of operations should be reused, turn them to functions.
If they happened together, then turn them to classes.
Un P2V (Physical to Virtual) est une opération qui consiste à transférer le système d'exploitation d'un ordinateur physique vers une machine virtuelle. C'est très pratique lorsque le hardware est défaillant ou sous-dimensionné et que vous souhaitez redonner un peu de patate à un serveur ou un poste de travail.
rsync --partial -t -h -z -r --progress -e "ssh" "edgar:/home/deluge/*" .
Make a bridge through the gate
ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no -L 1234:opensuse:22 login_x@ssh.epitech.net -N -f
Use it like this:
scp -P 1234 login_x@127.0.0.1:/home/login_x/* ./
or to access any other server inside using opensuse as a gate:
ssh server -o "ProxyCommand ssh -q -p 1234 login_x@127.0.0.1 nc -q0 %h 22"
Direct tunnel to access a ressource inside epitech's network
ssh -4 -At login_x@ssh.epitech.eu -L 4242:localhost:4242 ssh -At -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no opensuse-3 -L 4242:10.10.254.252:4242
What the fuck
If you’re lucky enough to find a command execution vulnerability during a penetration test, pretty soon afterwards you’ll probably want an interactive shell.
How to define functions into your makefiles
How you should use tor for maximum anonymity
A quick and dirty php remote code execution