Skip to content

Instantly share code, notes, and snippets.

@0ccupi3R
0ccupi3R / ansible-summary.md
Created October 27, 2022 05:14 — forked from DarkPanth3r/ansible-summary.md
This is an ANSIBLE Cheat Sheet from Jon Warbrick

Ansible Summary

Jon Warbrick, July 2014, V3.2 (for Ansible 1.7)

Configuration file

intro_configuration.html

First one found from of

@andripwn
andripwn / poc.js
Created January 23, 2020 16:29
PDF Bypass - Cross-site Scripting (XSS)
app.alert("XSS")
@MSAdministrator
MSAdministrator / iranian_apit_groups_possible_commands.md
Last active April 10, 2024 14:30
Iranian APT Groups & Possible Commands Used By These Groups

Overview

The following content is generated using a preview release of Swimlane's pyattck.

This snippet of data is scoped to the following actor groups:

  • APT33
  • APT34
  • APT39
  • Charming Kitten
@DarkPanth3r
DarkPanth3r / ansible-summary.md
Last active May 6, 2023 06:17 — forked from andreicristianpetcu/ansible-summary.md
This is an ANSIBLE Cheat Sheet from Jon Warbrick

Ansible Summary

Jon Warbrick, July 2014, V3.2 (for Ansible 1.7)

Configuration file

intro_configuration.html

First one found from of

@0ccupi3R
0ccupi3R / README.md
Created September 27, 2019 07:22 — forked from tuxmartin/README.md
Python NMAP scanner - vystup v HTML tabulce

apt-get install python-nmap

@MHaggis
MHaggis / criticalprocess.json
Last active October 27, 2020 16:06
Tune as you see fit for your environment
{
"Powershell": {
"process_name": ["powershell.exe"]
},
"PSExec": {
"process_name": ["psexec*.exe",
"psexesvc.exe"]
},
"at": {
"process_name": ["at.exe"]
@drumadrian
drumadrian / install_logstash_on_amazon_linux.bash
Last active March 15, 2024 17:22
Sample logstash.conf file for S3 Input plugin
# References:
# https://www.elastic.co/guide/en/logstash/current/plugins-inputs-s3.html
# https://www.elastic.co/blog/logstash-lines-inproved-resilience-in-S3-input
# https://www.elastic.co/guide/en/logstash/6.3/installing-logstash.html
# https://www.elastic.co/guide/en/logstash/current/working-with-plugins.html
# https://www.garron.me/en/bits/curl-delete-request.html
sudo yum update -y
sudo yum install -y java-1.8.0-openjdk
java -version
import os
import binascii
from array import array
from unicorn import *
from unicorn.x86_const import *
import string
import itertools
import pexpect
@7MinSec
7MinSec / mostly_painless_cuckoo_sandbox_install.md
Last active June 29, 2024 04:56
Mostly painless Cuckoo Sandbox install

How to Build a Cuckoo Sandbox Malware Analysis System

I had a heck of a time getting a Cuckoo sandbox running, and below I hope to help you get one up and running relatively quickly by detailing out the steps and gotchas I stumbled across along the way. I mention this in the references at the end of this gist, but what you see here is heavily influenced by this article from Nviso

Build your Linux Cuckoo VM

  1. Setup a Ubuntu 16.04 64-bit desktop VM (download here) in VMWare with the following properties:
  • 100GB hard drive
  • 2 procs
  • 8 gigs of RAM
@ruanbekker
ruanbekker / aws_ssm_get_parameter.md
Created January 31, 2018 14:41
Getting Secrets from SSM using GetParameter Example with Python and Boto3

Bash Environment Example with SSM to get Parameter Values using GetParameter:

IAM Policy:

{
    "Version": "2012-10-17",
    "Statement": [
        {
            "Sid": "Stmt1517398919242",