I hereby claim:
- I am aaronmelton on github.
- I am aaronmelton (https://keybase.io/aaronmelton) on keybase.
- I have a public key whose fingerprint is D4B7 A647 5215 4E27 F74F 2A7D FD5F EBFA 4D6F 7ED6
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
#!/usr/bin/sh | |
# | |
# downloadWHOIS.sh | |
# | |
# This script uses native whois command to return the WHOIS information | |
# of the IP Addresses provided. | |
# | |
# USAGE: | |
# $ ./downloadWHOIS.sh 1.2.3.4 | |
# $ ./downloadWHOIS.sh 1.2.3.4 1.2.3.5 1.2.3.6 etc. |
#!/usr/bin/sh | |
# | |
# downloadOTX.sh | |
# | |
# This script uses AlienVault's Open Threat Exchange (OTX) to download a PDF | |
# containing the IP reputation of the IP Addresses provided. | |
# | |
# USAGE: | |
# $ ./downloadOTX.sh 1.2.3.4 | |
# $ ./downloadOTX.sh 1.2.3.4 1.2.3.5 1.2.3.6 etc. |
############################################################################### | |
# Original file here: http://www.raspberrypi.org/phpBB3/viewtopic.php?t=23440 # | |
# # | |
# I have modified this .bash_profile to suit my own purposes. Feel free to # | |
# edit it to meet your own requirements. # | |
############################################################################### | |
# | |
let upSeconds="$(/usr/bin/cut -d. -f1 /proc/uptime)" | |
let secs=$((${upSeconds}%60)) | |
let mins=$((${upSeconds}/60%60)) |
#!/bin/sh | |
TARGETS="192.168.1.0/24" | |
OPTIONS="-v -sn -n" | |
DATE=`date +%F` | |
cd /var/log/nmap | |
nmap $OPTIONS $TARGETS -oA ping_$DATE > /dev/null | |
if [ -e ping-prev.xml ]; then | |
ndiff ping-prev.xml ping_$DATE.xml > pingdiff_$DATE.txt | |
if [ "$?" -eq "1" ]; then | |
echo "See attachment for NMAP differences." | mutt -s "NMAP Differences Discovered" -a pingdiff_$DATE.txt -- user@email.com |
#!/bin/sh | |
TARGETS="192.168.1.0/24" | |
FILENAME="nmap_192.168.1.0" | |
OPTIONS="-v -n --open -sS -sU -F --scan-delay 1s" | |
DATE=`date +%F` | |
cd /var/log/nmap | |
nmap $OPTIONS $TARGETS -oA $FILENAME\_$DATE > /dev/null | |
if [ -e $FILENAME\-prev.xml ]; then | |
ndiff $FILENAME\-prev.xml $FILENAME\_$DATE.xml > $FILENAME\-diff_$DATE.txt | |
if [ "$?" -eq "1" ]; then |
#!/bin/bash | |
# | |
(echo "DISK FREE:"; df -h; echo -e \\n; echo "DISK USAGE:"; du -h -d1 /var/ftp) | mail -s "Disk Usage Report" user@email.com |
#!/bin/bash | |
TARGET="192.168.1.1" | |
ping -c3 $TARGET > /dev/null | |
if [ "$?" -eq "1" ]; then | |
echo | mail -s "HOSTNAME Unreachable at $(date)" user@email.com | |
fi |
## Script: Router Update Script | |
## Author: aaron@aaronmelton.com | |
## Version: 1.2 | |
## Created: 2012-03-12 | |
## Updated: 2012-03-13 | |
## Description: This script provides the ability to securely copy a Cisco IOS | |
## file to a Cisco router and then instruct the router to copy | |
## the contents of the file into the running-config. | |
#!/usr/bin/expect |
#!/bin/bash | |
# | |
# Uses AWS CLI to query CloudTrail (last 7 days only!) logs for Security | |
# Group changes. | |
# | |
for eventName in ApplySecurityGroupsToLoadBalancer | |
AuthorizeCacheSecurityGroupIngress AuthorizeClusterSecurityGroupIngress | |
AuthorizeDBSecurityGroupIngress AuthorizeSecurityGroupEgress | |
AuthorizeSecurityGroupIngress CreateCacheSecurityGroup |