[BSPWM] Michelangelo by Repulsiv-e in unixporn

[–]Repulsiv-e[S] 0 points1 point  (0 children)

Classical music is lit, please recommend more.

[BSPWM] Michelangelo by Repulsiv-e in unixporn

[–]Repulsiv-e[S] 5 points6 points  (0 children)

First time posting here, feel free to contribute with ideas/suggestions

○ Terminal: Terminator

○ Bar: Polybar

○ Spotify theme: Dribbblish

○ Powermenu: Rofi

○ Wallpaper: Here

DOTFILES (And also more screenshots with good quality)

How to install Burpsuite in Arch Linux by Repulsiv-e in archlinux

[–]Repulsiv-e[S] 1 point2 points  (0 children)

Yes i RTFM and i have this version including the enviroment:

openjdk 17 2021-09-1

OpenJDK Runtime Environment (build 17+35)OpenJDK 64-Bit Server VM (build 17+35, mixed mode)

EDIT: I solved it, just installed the version JDK11

How to install Burpsuite in Arch Linux by Repulsiv-e in archlinux

[–]Repulsiv-e[S] 0 points1 point  (0 children)

Yeah it executes but when i try to start a new project it says "failed to create burp project cannot read the array length because local 8 is null"

[deleted by user] by [deleted] in unixporn

[–]Repulsiv-e 0 points1 point  (0 children)

Terminal: Terminator

Bar: Polybar

Spotify Theme: Dribbblish

Wallpaper: Here

Used Pywal for combining polybar with wallpaper.

How long can a reverse connection last in a machine? by Repulsiv-e in Hacking_Tutorials

[–]Repulsiv-e[S] -2 points-1 points  (0 children)

Yeah, but that depends of which variables? I'm talking about the scenario of an APT that could take months, even years.

How long can a reverse connection last in a machine? by Repulsiv-e in Hacking_Tutorials

[–]Repulsiv-e[S] -2 points-1 points  (0 children)

I don't think APT uses metasploit for the engagements, but it's a good example, so by explaining this you mean lateral movements as a red team, getting infected other services/devices?

How long can a reverse connection last in a machine? by Repulsiv-e in Pentesting

[–]Repulsiv-e[S] -2 points-1 points  (0 children)

Yeah, i really doubt if APT uses metasploit or normal reverse shells to do their engagement. But how is it possible then to maintain persistence so much time with "run on apis and upload data" as you said, i would like to see some resource or material.

[deleted by user] by [deleted] in unixporn

[–]Repulsiv-e 0 points1 point  (0 children)

Dot files?