Results 7 issues of YangHaoi

Failures - grouper2.fireeye (exited 404) - Error while running 'C:\ProgramData\chocolatey\lib\Grouper2.fireeye\Tools\chocolateyInstall.ps1'. See log for details. GROUPER2 IS DEPRECATED, GOTO https://github.com/Group3r/Group3r INSTEAD This place is not a place of honor... no highly...

1、I hava a error when I use `hexo clean`: ![image](https://user-images.githubusercontent.com/21354684/89741355-36bc2800-dac3-11ea-8894-e9e5b410e6bb.png) err: Error: `prism_plugin` options should be added to _config.yml file at **\hexo-prism-plugin\src\index.js:70:9 at **\hexo\lib\hexo\index.js:315:14 at tryCatcher (**\bluebird\js\release\util.js:16:23) at Promise._settlePromiseFromHandler (**\bluebird\js\release\promise.js:547:31)...

Hi, Your bof is very nice! But i fond a litter bug in zh-cn local windows, it's look like(DispName words Full display): wrong: ![image](https://user-images.githubusercontent.com/21354684/181919295-a6884a5e-c4ac-4454-a834-08195e6a991b.png) True: ![image](https://user-images.githubusercontent.com/21354684/181919333-47ccc11f-50d5-4e0e-91b5-18d191ae94d7.png)

1.Line number 124 In mimispool.c ![image](https://user-images.githubusercontent.com/21354684/152754061-635fd9a1-d313-4e5d-bef5-25b341e9574d.png) if more than 2 RDP users active, mimispool will be run CreateProcessAsUser more.Like this image: ![image](https://user-images.githubusercontent.com/21354684/152755112-ad6c80b0-663e-4b6c-b437-93ab0ab716b2.png) 2. Fix,Use API ProcessIdToSessionId() Get SessionId : ```...

Hello, I hava one question is not about this project that when i try to calculate Program run time i get error "floating point support not loaded". I see file...

``` ## py -3 bin2mac.py https-443_x64.xprocess.bin > shellcode.h , by yanghaoi import sys def MAC(strings): alist = [] for i in range(0, len(strings), 2): alist.append(strings[i:i+2]) return '-'.join(alist) if len(sys.argv) <...

### Issue: Potential OS Command Injection Vulnerability in `pyenv-win` **Description** I discovered a potential OS command injection vulnerability in `pyenv-win`. This vulnerability can be easily triggered in the command line...