I hereby claim:
- I am al3xxx on github.
- I am al3xxx (https://keybase.io/al3xxx) on keybase.
- I have a public key whose fingerprint is 2777 3E1C ACC8 DB37 F880 44A9 8D02 6CDD 1A50 2B16
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
AWS provides a mechanism for temporarily assuming another role within their API system. While it is not a technically hard process it can be convoluted and hard to understand. This document aims to both make it easier to follow along with as well as give an in depth explanation of some of the underpinnings of the Bourne Again Shell (aka BASH) which can make this easier to utilize on a day to day basis.
Below is an overexplained version of the following process:
~/.aws/credentials
as a "profile" which are then understood by the AWS command line tools# Author: Eric Pruitt (http://www.codevat.com) | |
# License: 2-Clause BSD (http://opensource.org/licenses/BSD-2-Clause) | |
# Description: This Makefile is designed to create a statically linked nginx | |
# binary without any dependencies on the host system's version of glibc. | |
NGINX_VERSION=1.15.0 | |
OPENSSL_VERSION=1.0.2o | |
PCRE_VERSION=8.42 | |
ZLIB_VERSION=1.2.11 |
#!/bin/bash | |
## | |
# Name: GeoIP Firewall script | |
# Author: Pandry | |
# Version: 0.1.1 | |
# Description: This is a simple script that will set up a GeoIP firewall blocking all the zones excecpt the specified ones | |
# it is possible to add the whitelisted zones @ line 47 | |
# Additional notes: Usage of [iprange](https://github.com/firehol/iprange) is suggested | |
# for best performances |
// ==UserScript== | |
// @name Recaptcha Solver (Automatically solves Recaptcha in browser) | |
// @namespace Recaptcha Solver | |
// @version 2.1 | |
// @description Recaptcha Solver in Browser | Automatically solves Recaptcha in browser | |
// @author engageub | |
// @match *://*/recaptcha/* | |
// @connect engageub.pythonanywhere.com | |
// @connect engageub1.pythonanywhere.com | |
// @grant GM_xmlhttpRequest |
#!/bin/sh | |
clear | |
if [ -z "${mysql_roundcube_password}" ]; then | |
tmp=$(</dev/urandom tr -dc A-Za-z0-9 | head -c12) | |
read -p "MySQL roundcube user password [${tmp}]:" mysql_roundcube_password | |
mysql_roundcube_password=${mysql_roundcube_password:-${tmp}} | |
echo "MySQL roundcube: ${mysql_roundcube_password}" >> .passwords | |
fi |
# feb/11/2022 11:00:55 by RouterOS 7.2rc3 | |
# software id = 9QK9-C798 | |
# | |
# model = RB5009UG+S+ | |
# serial number = XXXXXXXXXX | |
/ip settings set allow-fast-path=no | |
/interface bridge add admin-mac=FF:FF:FF:FF:FF:FF auto-mac=no name=bridge |
#!/bin/sh | |
clear | |
if [ -z "${mysql_roundcube_password}" ]; then | |
tmp=$(</dev/urandom tr -dc A-Za-z0-9 | head -c12) | |
read -p "MySQL roundcube user password [${tmp}]:" mysql_roundcube_password | |
mysql_roundcube_password=${mysql_roundcube_password:-${tmp}} | |
echo "MySQL roundcube: ${mysql_roundcube_password}" >> .passwords | |
fi |