Skip to content

Instantly share code, notes, and snippets.

View Obsecurus's full-sized avatar

Matt Lehman Obsecurus

View GitHub Profile
name: "instructor-embeddings"
license: "Apache 2.0"
urls:
- https://huggingface.co/hkunlp/instructor-large
description: |
Base model for instructor embeddings
config_file: |
parameters:
model: instructor-embeddings
embeddings: true
### Keybase proof
I hereby claim:
* I am obsecurus on github.
* I am obsecurus (https://keybase.io/obsecurus) on keybase.
* I have a public key ASBEiJWR6YR0IXj5bHKnzOlm6i9yjxd_vcq0dkeoYEBuuwo
To claim this, I am signing this object:
@Obsecurus
Obsecurus / gn_newline_multi.sh
Last active August 8, 2019 17:26
GreyNoise Intelligence quick check of newline delimited IPs and output to CSV
#! /bin/bash
display_usage() {
echo "Greynoise Multiline IP Processor"
echo -e "\nUsage: \n\t./gn_newline_multi.sh <gn_key> <input_file> <output_csv_file>"
}
if [ $# -le 2 ]
then
display_usage
exit 1
@Obsecurus
Obsecurus / exim-rce.rules
Last active May 28, 2020 15:48
Modified Exim RCE rule to capture both the < and + use cases. Previously the rule was only capturing when "verify = recipient" had been removed. See: https://www.qualys.com/2019/06/05/cve-2019-10149/return-wizard-rce-exim.txt
alert smtp any any -> $SMTP_SERVERS any (msg:"ET EXPLOIT Possible Exim 4.87-4.91 RCE Attempt Inbound (CVE-2019-10149)"; flow:established,to_server; content:"RCPT|20|TO"; content:"|24 7b|run|7b|"; distance:0; fast_pattern; content:"|7d 7d 40|"; distance:0; content:"RCPT|20|TO|3a|"; pcre:"/^\s*\x24\x7brun\x7b[^\r\n]+\x7d{2}\x40/R"; metadata: former_category EXPLOIT; reference:url,www.qualys.com/2019/06/05/cve-2019-10149/return-wizard-rce-exim.txt; classtype:attempted-admin; sid:2027442; rev:1; metadata:attack_target SMTP_Server, deployment Perimeter, cve 2019_10149, signature_severity Major, created_at 2019_06_07, performance_impact Low, updated_at 2019_06_07;)