password

This information concerns the security of your account (SCAM)

NUNCA HAY QUE HACER CASO A ESTE TIPO DE CORREOS SON UN TIMO. Esto ha llegado hoy a mi correo: Hi! I am a hacker who has access to your operating system. I also have full access to your account: At the time of hacking your account(@gmail.com) had this password: You can say: this is my, but old password! Or: I can change my password at any time! Of course! You will be right, but the fact is that when you change the password, my malicious code every time saved a new one! I’ve been watching you for a few […]

Crear, compilar y ejecutar una DLL con Microsoft Visual C# que crear un usuario desde PowerShell

Crear un proyecto en Visual C# Biblioteca de Clase (.NET Framework) Importar desde Microsoft Visual C# la referencia al ensamblado System.Management.Automation (C:\Windows\assembly\GAC_MSIL\System.Management.Automation\1.0.0.0__31bf3856ad364e35\System.Management.Automation.dll) Añadir el siguiente código en PowerShell a Visual Studio C# y compilar la solución

La dll compilada se encuentra en la carpeta bin Llamar a la dll creada desde PowerShell

 

pspy – unprivileged linux process snooping

pspy is a command line tool designed to snoop on processes without need for root permissions. It allows you to see commands run by other users, cron jobs, etc. as they execute. Great for enumeration of Linux systems in CTFs. Also great to demonstrate your colleagues why passing secrets as arguments on the command line is a bad idea. The tool gathers it’s info from procfs scans. Inotify watchers placed on selected parts of the file system trigger these scans to catch short-lived processes. Getting started Get the tool onto the Linux machine you want to inspect. First get the […]

Crear código QR para la conexión wifi

Simular una fuerza bruta mediante peticiones HTTP desde PowerShell utilizando el método GET

Enviar señales de radio desde Raspberry Pi mediante una conexión SSH desde PowerShell (parte 3)

Dejavu: audio fingerprinting and recognition in Python

Audio fingerprinting and recognition algorithm implemented in Python, see the explanation here: How it works Dejavu can memorize audio by listening to it once and fingerprinting it. Then by playing a song and recording microphone input, Dejavu attempts to match the audio against the fingerprints held in the database, returning the song being played. Note that for voice recognition, Dejavu is not the right tool! Dejavu excels at recognition of exact signals with reasonable amounts of noise. Installation and Dependencies: Read INSTALLATION.md Setup First, install the above dependencies. Second, you’ll need to create a MySQL database where Dejavu can store fingerprints. […]

Imports certificates and private keys from a Personal Information Exchange (PFX) file to the destination store

Exports a certificate to a Personal Information Exchange (PFX) file

Ejecutar un ejemplo de reconocimiento de imágenes con TensorFlow realizando una conexión SSH a un contenedor Docker desde PowerShell en Windows

Crear contenedor Docker con TensorFlow desde un Terminal

Instalar desde el contenedor Docker que se está ejecutando con TensorFlow el servidor SSH para poder acceder desde PowerShell

Ejecutar un ejemplo de reconocimiento de imágenes con TensorFlow (más información en https://www.tensorflow.org/tutorials/image_recognition) realizando una conexión SSH a un contenedor Docker desde PowerShell en Windows La imagen que se va a reconocer es la de un oso panda Ejecutar los siguientes cmdlets desde PowerShell