Software Engineer, Cyber Security Enthusiast
Just a command worth saving. grep -rl ‘findmatch’ filename | xargs sed -i ‘s/original/replacement/g’
Detailsnmap –sT -p- -Pn 192.168.18.132 nmap –sS -p- -Pn 192.168.0.100 nmap –sUV 192.168.0.100 nmap –sX -p- -Pn 192.168.0.100 ...
DetailsPS1=’\[\033[0;32m\]\[\033[0m\033[0;32m\]\u\[\033[0;36m\] @ \w\[\033[0;32m\]\n$(git branch 2>/dev/null | grep “^*” | colrm 1 2)\[\033[0;32m\]??\[\033[0m\033[0;32m\] \$\[\033[0m\033[0;32m\]\[\033[0m\] ‘ Credit: https://gist.github.com/justintv/168835
DetailsThis post is mainly for my own benefit since I lost track of the steps I followed to ...
DetailsHere is a starter problem for everyone. Since you will be using computer to break my secret code, ...
DetailsOK, in this Steganography challenge today, I have used one of my favorite dishes – chicken curry. This ...
DetailsI found this youtube video very useful to learn some of the most common WireShark filters. tcp,port == ...
DetailsCTF lovers, I have hidden a secret message with the image of a “tree turtle” I took almost ...
DetailsA reference table when you review /etc/shadow file: $1$ md5 $2a$ Blowfish $2y$ Blowfish, with correct handling of ...
Details