• 0 Posts
  • 22 Comments
Joined 1 year ago
cake
Cake day: July 28th, 2023

help-circle
  • Nato Boram@lemm.eetoProgramming@programming.dev*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    4
    arrow-down
    1
    ·
    6 months ago

    What’s even the point then?

    The point is that you can enable each separate extension you want running on your code editor or uninstall them if you’re unsatisfied. This makes it as light as you want it to be - or as heavy as you need it to.

    I was doing fine with just vim and tmux

    VSCode is like vim without vim controls and in a browser. Seen that way, it makes more sense. With Vim, you have to hunt for obscure Github repositories and follow arcane installation instructions for hidden extensions that you may or may not need and you have to learn a whole-ass keyboard-shortcut-based programming language just to use any of it.

    With VSCode, you click on Extensions, search what you want and it’ll probably be there unless it’s a toxic ecosystem like PHP/C# or some niche ecosystem that no one heard about.









  • Usage: ./malware [OPTIONS]
    
    Options:
      -h, --help            Display this help message and exit.
      -i, --infect          Infect target system with payload.
      -s, --spread          Spread malware to vulnerable hosts.
      -c, --configure       Configure malware settings interactively.
      -o, --output [FILE]   Save log output to a file.
      -q, --quiet           Quiet mode - suppress non-critical output.
    
    Advanced Options:
      -a, --activate [CODE] Activate advanced features with code.
      -b, --backdoor [PORT] Open backdoor on specified port.
      -m, --mutate          Evade detection by mutating code.
    
    Description:
      Malware toolkit for educational purposes only.
      Use responsibly on authorized systems.
    
    Examples:
      ./malware -i                  Infect local system with default payload.
      ./malware -i -s               Infect and spread to other systems.
      ./malware -a ACTCODE -b 1337  Activate advanced features and open backdoor.
      ./malware -q -o output.log    Run quietly, save logs to 'output.log'.
    










  • GitHub’s actions are so good once it clicks and you understand them. On GitLab, you start from a docker image, so it’s harder to setup some things but easier for others. If you are very good at docker and don’t mind making your own images just for CI purposes, then go ahead.

    Ideally, you should just try them both. You can mirror a project between the two and setup the CI at both places.