Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 05/04/19 in all areas

  1. Nu prea cred ca te ajuta nimeni. Daca tu nu esti in stare sa citesti un readme sau sa scrii un <script src="/path/to/js.cookie.js"></script> ce kk de proiect vrei sa faci tu acolo? Dai copy paste la tot ce prinzi de pe stackoverflow si dupa te plangi ca nu merge si sa-ti rezolvam noi? Nu asa se face treaba. Pune mana si invata lucruri mai simple intai, si dupa faci "scripturi" deastea. Bafta! https://www.w3schools.com/html/ https://www.w3schools.com/js/default.asp
    2 points
  2. I have written a short bash function for measuring website metrics such as DNS lookup, redirects, redirect time, the first byte (TTFB), connect time and the total time. Short version (Only TTFB) function ttfb() { if [ $# -eq 0 ] then echo "Usage: ttfb url" else curl -o /dev/null \ -H 'Cache-Control: no-cache' \ -s \ -w "Connect: %{time_connect} TTFB: %{time_starttransfer} Total time: %{time_total} \n" \ $1 fi } Usage example: aelius@macbook:~$ ttfb Usage: ttfb url aelius@macbook:~$ ttfb https://www.unixteacher.org/ Connect: 0.046315 TTFB: 0.157112 Total time: 0.157400 aelius@macbook:~$ Long version (DNS Lookup, Redirects, Redirect time, First byte, Connect time, Total time) function metrics { if [ $# -eq 0 ] then echo "Usage: metrics url" else curl -H 'Cache-Control: no-cache' -Lw "DNS Lookup: %{time_namelookup} seconds \nRedirects: %{time_redirect} seconds with %{num_redirects} redirects \nFirst Byte: %{time_starttransfer} seconds \nConnect Time: %{time_connect} seconds \nTotal Time: %{time_total} seconds\n" -so /dev/null $1 fi } Usage example aelius@macbook:~$ metrics Usage: metrics url aelius@macbook:~$ metrics https://www.unixteacher.org/ DNS Lookup: 0.009266 seconds Redirects: 0.000000 seconds with 0 redirects First Byte: 0.173887 seconds Connect Time: 0.051254 seconds Total Time: 0.174168 seconds aelius@macbook:~$ References: – https://en.wikipedia.org/wiki/Time_to_first_byte – https://curl.haxx.se/docs/manual.html Published on UnixTeacher: https://www.unixteacher.org/blog/measuring-website-metrics-with-curl/
    2 points
  3. Daca tu nu intelegi asta: Create a cookie, valid across the entire site: Cookies.set('name', 'value'); Create a cookie that expires 7 days from now, valid across the entire site: Cookies.set('name', 'value', { expires: 7 }); Create an expiring cookie, valid to the path of the current page: Cookies.set('name', 'value', { expires: 7, path: '' }); Atunci e o problema f mare, nu vreau sa fiu heitar, dar pune in plm mana si ruleaza alea sa vezi ce se intampla.
    1 point
  4. Sa citesti readme?
    1 point
  5. If you're interested in learning to reverse engineer Android applications (both DEX and native code), check out the workshop at https://maddiestone.github.io/AndroidAppRE Source: https://github.com/maddiestone/AndroidAppRE
    1 point
  6. Ca bine zici! https://securityonline.info/android-arsenal-reverse-engineering-tools/ Update 7.05.2019: http://ftp.icm.edu.pl/packages/Hacked Team/rcs-dev\share/HOME/MarcoL/books/ Sunt mai vechi, dar merita.
    1 point
  7. This is the proof of concept source code for CVE-2019-3719, a vulnerability in most of all Dell machines that allowed for remote code execution. See the blog post here. Usage: python3 main.py [Interface Name] [Victim IP] [Gateway IP] [Payload Filename] Demo Source: https://github.com/D4stiny/Dell-Support-Assist-RCE-PoC
    1 point
×
×
  • Create New...