Skip to content

Instantly share code, notes, and snippets.

View Stichoza's full-sized avatar
💻
Coding...

Levan Velijanashvili Stichoza

💻
Coding...
View GitHub Profile
@Neo23x0
Neo23x0 / log4j_rce_detection.md
Last active January 28, 2024 08:19
Log4j RCE CVE-2021-44228 Exploitation Detection

log4j RCE Exploitation Detection

You can use these commands and rules to search for exploitation attempts against log4j RCE vulnerability CVE-2021-44228

Grep / Zgrep

This command searches for exploitation attempts in uncompressed files in folder /var/log and all sub folders

sudo egrep -I -i -r '\$(\{|%7B)jndi:(ldap[s]?|rmi|dns|nis|iiop|corba|nds|http):/[^\n]+' /var/log
@PhillippOhlandt
PhillippOhlandt / nothingToDoHereFunction
Created May 20, 2015 10:00
Nothing to do here ASCII function
function nothingToDoHere($newLine = '<br>'){
return '
──────█▀▄─▄▀▄─▀█▀─█─█─▀─█▀▄─▄▀▀▀─────'.$newLine.'
──────█─█─█─█──█──█▀█─█─█─█─█─▀█─────'.$newLine.'
──────▀─▀──▀───▀──▀─▀─▀─▀─▀──▀▀──────'.$newLine.'
─────────────────────────────────────'.$newLine.'
───────────────▀█▀─▄▀▄───────────────'.$newLine.'
────────────────█──█─█───────────────'.$newLine.'
────────────────▀───▀────────────────'.$newLine.'
─────────────────────────────────────'.$newLine.'
@eyecatchup
eyecatchup / apple-meta-insanity.html
Created February 8, 2015 12:28
Insanity of Apple-specific meta tags..
<!DOCTYPE html>
<html>
<head>
<meta charset="utf-8">
<title>Apple Meta Insanity</title>
<!--
APPLE WEB APP META TAGS
-->
@safareli
safareli / gicrostaticAI.md
Last active August 29, 2015 14:10
გიკროსტატიკური ხელოვნური ინტელექტი

ამ ბოლო დროს მეგობრებს ღამეები აღარ გვძინავს და ვმუშაობდით ხელოვნური ინტელექტის ერთ გიკროსტიკურტ პროეტზე რომლის ფარგლებშიც შევქმენით ეს bookmarklet * ის დაგეხმარებათ ნებისმიერ კითხვაზე იპოვოთ პასუხი :3

javascript:var _a = document.location.href = "https://www.google.ge/#q="+encodeURIComponent(prompt("what you want?"))

ps. თუ არ იცით რაარის bookmarklet და გაინტერესებთ დააწექით F12 შემდეგ გადადით კონსოლში და ჩაწერეთ ეს :

document.location.href = "https://www.google.ge/#q="+encodeURIComponent(prompt("what you want?"))
@staltz
staltz / introrx.md
Last active May 7, 2024 09:38
The introduction to Reactive Programming you've been missing
@gosukiwi
gosukiwi / .vimrc
Last active February 24, 2020 06:01
.vimrc
" ---------------------- USABILITY CONFIGURATION ----------------------
" Basic and pretty much needed settings to provide a solid base for
" source code editting
" don't make vim compatible with vi
set nocompatible
" turn on syntax highlighting
syntax on
" and show line numbers
@tatocaster
tatocaster / magtifun_sms_terminal.py
Last active April 22, 2016 12:36
magtifun sender from terminal (python)
import urllib,urllib2,cookielib
cookie_jar = cookielib.CookieJar()
opener = urllib2.build_opener(urllib2.HTTPCookieProcessor(cookie_jar))
urllib2.install_opener(opener)
url_1 = 'http://www.magtifun.ge/index.php?page=11&lang=ge'
values = dict(password='Password', user='User', act='1')
data = urllib.urlencode(values)
req = urllib2.Request(url_1, data)
@TemporaryJam
TemporaryJam / Howto convert a PFX to a seperate .key & .crt file
Last active April 4, 2024 10:52
How to convert a .pfx SSL certificate to .crt/key (pem) formats. Useful for NGINX
source: http://www.markbrilman.nl/2011/08/howto-convert-a-pfx-to-a-seperate-key-crt-file/
`openssl pkcs12 -in [yourfile.pfx] -nocerts -out [keyfile-encrypted.key]`
What this command does is extract the private key from the .pfx file. Once entered you need to type in the importpassword of the .pfx file. This is the password that you used to protect your keypair when you created your .pfx file. If you cannot remember it anymore you can just throw your .pfx file away, cause you won’t be able to import it again, anywhere!. Once you entered the import password OpenSSL requests you to type in another password, twice!. This new password will protect your .key file.
Now let’s extract the certificate:
`openssl pkcs12 -in [yourfile.pfx] -clcerts -nokeys -out [certificate.crt]`
@max
max / gist:5708466
Created June 4, 2013 18:54
Flat UI Colors as Sass variables
// I needed flatuicolors.com as Sass variables...
// In your console, run:
$('.color').get().map(function(el) { return "$" + el.classList[1] + ": " + el.getAttribute('data-clipboard-text') + ';' }).join('\r\n');
// Output:
// $turquoise: #1abc9c;
// $emerland: #2ecc71;
// $peter-river: #3498db;
// $amethyst: #9b59b6;
// $wet-asphalt: #34495e;