ref: http://jimhoskins.com/2013/07/27/remove-untagged-docker-images.html
-
Stopped Containers
docker rm $(docker ps -a -q) -
Untagged Images
docker rmi $(docker images | grep "^" | awk "{print $3}")
| import secrets | |
| from typing import Callable | |
| from pwn import * | |
| context.binary = binary = ELF("distfiles/ctf") | |
| L_LIST_BASE_ADDRESS = 0x56bfc0 | |
| FIXED_GAP_TO_RETURN_ADDRESS = 0x190 | |
| DRIVER_INDEX = 1 |
| /* | |
| Code Execution PoC of CVE-2019-9791 for practice of exploiting SpiderMonkey. | |
| - Bug Finder: @saelo | |
| - Target: 67fc2c30797036217de91cdb4b6d77a876bed7db^ | |
| - Reference: https://doar-e.github.io/blog/2018/11/19/introduction-to-spidermonkey-exploitation/ | |
| % build-release/bin/js67 --version | |
| JavaScript-C67.0a1 | |
| % build-release/bin/js67 work/exploit-js67.js | |
| [+] Successfully got the primitives! |
| function peco-history-selection() { | |
| BUFFER=$(history 1 | sort -k1,1nr | perl -ne 'BEGIN { my @lines = (); } s/^\s*\d+\*?\s*//; $in=$_; if (!(grep {$in eq $_} @lines)) { push(@lines, $in); print $in; }' | peco --query "$LBUFFER") | |
| CURSOR=${#BUFFER} | |
| zle reset-prompt | |
| } | |
| zle -N peco-history-selection | |
| bindkey -M vicmd "^R" peco-history-selection | |
| function select_pid() { |
| #!/usr/bin/env python | |
| from pathlib import PurePath, Path | |
| from tempfile import NamedTemporaryFile | |
| from itertools import islice, cycle | |
| from hexdump import hexdump as hd | |
| import binascii | |
| import hashlib | |
| import re | |
| import os |
| ah! |
ref: http://jimhoskins.com/2013/07/27/remove-untagged-docker-images.html
Stopped Containers
docker rm $(docker ps -a -q)
Untagged Images
docker rmi $(docker images | grep "^" | awk "{print $3}")
"Packaging" has been no longer available so manual installation is needed. pypa/setuptools#937
| #!/usr/bin/env python2 | |
| import binascii | |
| import collections | |
| import hashlib | |
| import itertools | |
| import re | |
| import os | |
| import random | |
| import shlex |
| mini: file format elf64-x86-64 | |
| Disassembly of section .init: | |
| 00000000004003c8 <_init>: | |
| 4003c8: 48 83 ec 08 sub $0x8,%rsp | |
| 4003cc: 48 8b 05 25 0c 20 00 mov 0x200c25(%rip),%rax # 600ff8 <_DYNAMIC+0x1d8> | |
| 4003d3: 48 85 c0 test %rax,%rax |
| class Cell: | |
| def __init__(self, *args): | |
| self.stock = [*args] | |
| def __lshift__(self, value): | |
| self.stock.append(value) | |
| return self | |
| if __name__ == '__main__': |