This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# If you selected the STIG config during install, some of these will be configured already. | |
# All of these are mentioned in the STIG, but some of them must be done manually. | |
# FIPS all the things. | |
yum install -y dracut-fips | |
# Regenerate ramdisk (current kernel) | |
dracut -f "/boot/initramfs-$(uname -r).img" "$(uname -r)" | |
# Append 'fips=1' to GRUB_CMDLINE_LINUX | |
grep 'fips=1' /proc/cmdline || |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<Directory "/files/"> | |
IndexOptions Charset=UTF-8 DescriptionWidth=* HTMLTable FancyIndexing FoldersFirst IconsAreLinks IconHeight=16 IconWidth=16 IgnoreCase NameWidth=* SuppressHTMLPreamble SuppressRules XHTML VersionSort | |
IndexStyleSheet "/assets/css/bootstrap-4.1.3.min.css" | |
IndexOrderDefault Ascending Name | |
IndexIgnore .??* *~ *# HEADER* README* RCS CVS *,v *,t | |
HeaderName "/assets/html/HEADER.html" | |
ReadmeName "/assets/html/README.html" | |
Options Indexes SymlinksIfOwnerMatch | |
AllowOverride None |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/sh -e | |
cat << EOF | |
if [ -f \${prefix}/user.cfg ]; then | |
source \${prefix}/user.cfg | |
if [ -n "\${GRUB2_PASSWORD}" ]; then | |
set superusers="root" | |
export superusers | |
password_pbkdf2 root \${GRUB2_PASSWORD} | |
fi | |
fi |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Dummy HSTS Priming Target | |
See https://crbug.com/626180 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# Pre- and post-hook for certbot dns-01 to use DDNS | |
# Where we put our TSIG for dynamic udpates | |
TSIG=/etc/letsencrypt/acme.key | |
# We need the authoritative nameserver | |
NS="dig +short $(host -v $CERTBOT_DOMAIN | awk '/SOA/ {print $5}' | head -1)" | |
# The actual challenge record to use |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
# Dumps pre-webextension Stylish styles to CSS files | |
import os | |
import json | |
def dump_styles(): | |
dump_dir = os.path.join(os.getcwd(), 'style_dump') | |
style_file = os.path.join(os.getcwd(), 'stylish-storage.js') | |
stylish = json.load(open(style_file, 'r')) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
// ==UserScript== | |
// @name Remove WSJ Paywall | |
// @namespace http://tampermonkey.net/ | |
// @version 0.1 | |
// @description Attempts to show the non-paywalled version of Wall Street Journal articles | |
// @author AfroThundr | |
// @include https://www.wsj.com/articles/* | |
// @grant none | |
// @run-at document-start | |
// ==/UserScript== |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python3 | |
import os | |
import sys | |
import json | |
def parse_proc(): | |
values = {} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python | |
# | |
################################################################################################### | |
# # # | |
# Vulnerability: ProFTPD IAC Remote Root Exploit # Telnet IAC Buffer Overflow (Linux) # | |
# # ProFTPD 1.3.2rc3 # | |
# Vulnerable Application: ProFTPD 1.3.3a # This is a part of the Metasploit Module, # | |
# Tested on Linux 2.6.32-5-686 # exploit/linux/ftp/proftp_telnet_iac # | |
# # # | |
# Author: Muhammad Haidari # Spawns a reverse shell to 10.11.0.95:443 # |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
/var/log/audit/audit.log { | |
weekly | |
missingok | |
notifempty | |
sharedscripts | |
rotate 5 | |
maxsize 50M | |
compress | |
copytruncate | |
nodateext |