Skip to content

Instantly share code, notes, and snippets.


Phil Taylor PhilETaylor

Block or report user

Report or block PhilETaylor

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
PhilETaylor /
Created Dec 30, 2017 — forked from palpalani/
Installing Redis, Hiredis on Ubuntu 14.04
echo "--------------------------------------------------------------------------------------------"
echo "Installing Predis on Ubuntu 16.04"
echo "Read more:"
echo "Author: Ralf Rottmann | @ralf |"
echo "--------------------------------------------------------------------------------------------"
echo "Checking prerequisites..."
echo "Git available?"
[ ! -s /usr/bin/git ] && sudo apt-get -q -y install git || echo "Git already installed."
$ ssh <user>@<mac-without-screen>
$ sudo defaults write /var/db/launchd.db/ -dict Disabled -bool false
$ sudo launchctl load /System/Library/LaunchDaemons/
/System/Library/LaunchDaemons/ Service is disabled
$ sudo launchctl load -w /System/Library/LaunchDaemons/
PhilETaylor /
Last active Dec 18, 2017 — forked from pitpit/
Install Mailcatcher on OSX

Install MailCatcher (

brew install ruby
sudo gem install mailcatcher

Then set it a daemon:

 curl >>~/Library/LaunchAgents/me.mailcatcher.plist

then run

PhilETaylor / listupdates.php
Created Sep 16, 2017 — forked from renekreijveld/listupdates.php
List extension updates
View listupdates.php
* @package Joomla.Cli
* @copyright Copyright (C) 2016 Rene Kreijveld, All rights reserved.
* @license GNU General Public License version 2 or later; see LICENSE.txt
* This is a script which should be called from the command-line, not the web.
PhilETaylor / .htaccess
Created May 13, 2017 — forked from allysonsouza/.htaccess
Enabling PHP 7 on Hostgator trough htaccess
View .htaccess
# Habilitar o PHP 7.0
AddHandler application/x-httpd-php70 .php
<IfModule mod_suphp.c>
suPHP_ConfigPath /opt/php70/lib
View reverse-engineering-wordpress-0day-exploit.txt
This past weekend, I noticed an interesting alert from my mod_security logs for a request being made to my Wordpress site. Although the request was un-successful, I decided to dig deeper to understand what this was request was actually trying to do. After time, I've concluded that this is possibly a new 0day exploit attempt against Wordpress or a related Wordpress plugin (iThemes Security??). I'm still trying to uncover the exact flaw being exploited here so if anyone has any further details, feel free to contact me at or twitter @CrowdShield.
==> /var/log/apache2/error.log <==
[Sat Aug 15 19:00:10 2015] [error] [client] ModSecurity: Warning.
PhilETaylor / masterplugin.php
Last active Mar 28, 2019 — forked from jneubauer/masterplugin.php
Joomla! plugin that fires all possible plugin events
View masterplugin.php
// no direct access
defined( '_JEXEC' ) or die( 'Restricted access' );
class PlgSystemMasterplug extends JPlugin
function onExtensionBeforeInstall(){
JLog::add(JText::_('onExtensionBeforeInstall'), JLog::WARNING);
View importer.php
define('_JEXEC', 1);
define('JPATH_BASE', realpath(__DIR__ . '/../'));
require_once '../includes/defines.php';
require_once '../includes/framework.php';
You can’t perform that action at this time.