http://blog.didierstevens.com/programs/translate/ Translate.py is a Python script to perform bitwise operations on files (like XOR, ROL/ROR, …). You specify the bitwise operation to perform as a Python expression, and pass it as a command-line argument. translate.py malware malware.decoded ‘byte ^ 0x10’ Direct download: https://didierstevens.com/files/software/translate_v2_0_0.zip
Taken from here: https://ubuntugenius.wordpress.com/2011/01/08/ubuntu-cleanup-how-to-remove-all-unused-linux-kernel-headers-images-and-modules/ When I’m cleaning up disk space on Ubuntu, I like to start here. This command will clean up old Linux kernels/headers:
Do you find the default colors within PuTTY to be often too dark to read? image source: http://www.darkrune.org/blog/?p=213 With a couple snippets of PowerShell you can update all your existing saved PuTTY sessions to use a more readable shade of blue. And now it’s much easier to read: If you prefer the very nice ZenBurn theme, […]
Linking to this SO answer and re-posting it here, as I seem to search for it every few weeks or so: For Windows installations: While running setup.py for package installations, Python 2.7 searches for an installed Visual Studio 2008. You can trick Python to use a newer Visual Studio by setting the correct path in VS90COMNTOOLSenvironment […]
If you are interested in learning about ActiveX exploitation, security researcher/consultant/professor Brad Antoniewicz has created FSExploitMe for just that purpose. You’ll want a copy of Internet Explorer 8 to get the most out of it, but fortunately you can get a VM running IE8 for *free* from Microsoft. And if you are interested in getting […]
Visual guide to understanding garbage collection algorithms!
Design Patterns: Elements of Reusable Object-Oriented Software is a software engineering book describing recurring solutions to common problems in software design. The book’s authors are Erich Gamma, Richard Helm, Ralph Johnson and John Vlissides with a foreword by Grady Booch. The book is divided into two parts, with the first two chapters exploring the capabilities […]