helm search repo $REPO_NAME
helm search hub $CHART_NAME
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# | |
# Simple portable bash script to exploit insecure forwarded SSH agent | |
# When agent_forwarding is enabled, this allows every local user which | |
# has access to the ssh agent's dir (commonly /tmp) to hijack other ssh sessions | |
# | |
# See more about this technique on https://book.hacktricks.xyz/linux-hardening/privilege-escalation/ssh-forward-agent-exploitation | |
# Defaults values to watch (/tmp dir, every second, can be overrided by cmdline args) | |
AGENT_DIR="${1:-/tmp}" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<?php | |
$myfile = fopen("index.php", "r") or die("Unable to open file!"); | |
echo fread($myfile,filesize("index.php")); | |
fclose($myfile); | |
?> |