Skip to content

Instantly share code, notes, and snippets.

View alexs77's full-sized avatar

Alexander alexs77

View GitHub Profile
@alexs77
alexs77 / mysqlchk
Last active August 29, 2015 14:02
Invoking Shell script with Upstart "start on socket"
# /etc/xinetd.d/mysqlchk
# description: mysqlchk
service mysqlchk
{
flags = REUSE
socket_type = stream
port = 33066
wait = no
user = nobody
server = /opt/tools/mysqlchk.sh
@alexs77
alexs77 / autoProcess.ini
Created September 15, 2014 13:56
sickbeard_mp4_automator autoProcess.ini
[MP4]
ffmpeg=/home/ask/Repos/sickbeard_mp4_automator/ff/ffmpeg
ffprobe=/home/ask/Repos/sickbeard_mp4_automator/ff/ffprobe
output_directory=/extern/Videos
copy_to=
move_to=/extern/Videos/Erledigt
output_extension=mp4
output_format=mp4
delete_original=False
relocate_moov=True
@alexs77
alexs77 / S01E07 - Neustart.log
Created September 15, 2014 13:58
S01E07 - Neustart.log
Processing file /extern/Backup/Disk/_volume1/video/Serien/House of Cards/S01E07 - Neustart.mkv
Matched TV episode
Failed to connect to TVDB, trying again in 20 seconds
Could not find episode 7
Failed to connect to TVDB, trying again in 20 seconds
Could not find episode 7
Failed to connect to TVDB, trying again in 20 seconds
Could not find episode 7
Processing TV episode
Video codec detected: h264
@alexs77
alexs77 / shellshock.php
Created September 26, 2014 06:05
Shellshock Exploitable (?) PHP Script
<?php header("Content-Type: text/plain");?>
system("/usr/bin/id") => <?php system("/usr/bin/id"); ?>
shell_exec("/bin/hostname") => <?php echo shell_exec("/bin/hostname"); ?>
done;
@alexs77
alexs77 / shellshock-2.php
Created September 26, 2014 08:07
Shellshock Exploitable (?) PHP script?
<?php header("Content-Type: text/plain");?>
system("/usr/bin/id") => <?php system("/usr/bin/id"); ?>
shell_exec("/bin/hostname") => <?php echo shell_exec("/bin/hostname"); ?>
shell_exec("/bin/bash -c /bin/date") => <?php echo shell_exec("/bin/bash -c /bin/date"); ?>
exec("/usr/bin/whoami") => <?php echo exec("/usr/bin/whoami"); ?>
@alexs77
alexs77 / shellshock-3.php
Created September 26, 2014 09:17
Nächster Versuch, ein exploitable PHP zu schreiben.
<?php header("Content-Type: text/plain");?>
system("/usr/bin/id") => <?php system("/usr/bin/id"); ?>
shell_exec("/bin/hostname") => <?php echo shell_exec("/bin/hostname"); ?>
shell_exec("/bin/bash -c /bin/date") => <?php echo shell_exec("/bin/bash -c /bin/date"); ?>
exec("/usr/bin/whoami") => <?php echo exec("/usr/bin/whoami"); ?>
@alexs77
alexs77 / shellshock-4.php
Created September 26, 2014 09:20
Und noch ein Versuch, etwas exploitbares hin zu bekommen…
<?php
phpinfo(INFO_VARIABLES);
system("bash -c env");
@alexs77
alexs77 / update-binary
Created February 15, 2015 11:24
xposed-arm-20150213b - update-binary
#!/sbin/sh
#
# Xposed framework installer zip.
#
# This script installs the Xposed framework files to the system partition.
# The Xposed Installer app is needed as well to manage the installed modules.
#
# Thanks to Chainfire for some of the functions and logic!
#
@alexs77
alexs77 / update-ses-truststore.sh
Created March 19, 2015 15:34
SES Truststore updaten
#!/bin/sh
name=quovadis-ica-g2
echo '-----BEGIN CERTIFICATE-----
MIIFTDCCAzSgAwIBAgIUSJgt4qkssznhyPkzNYJ10+T4glUwDQYJKoZIhvcNAQEL
BQAwRTELMAkGA1UEBhMCQk0xGTAXBgNVBAoTEFF1b1ZhZGlzIExpbWl0ZWQxGzAZ
BgNVBAMTElF1b1ZhZGlzIFJvb3QgQ0EgMjAeFw0xMzA2MDExMzM1MDVaFw0yMzA2
MDExMzM1MDVaME0xCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1p
dGVkMSMwIQYDVQQDExpRdW9WYWRpcyBHbG9iYWwgU1NMIElDQSBHMjCCASIwDQYJ
@alexs77
alexs77 / zimbra-control.sh
Created June 9, 2016 15:07
Start/Stop/Status Zimbra
#!/bin/bash
start () {
echo "Starte Zimbra $1 Umgebung..."
for h in zcs-ds7-$1; do
if ping -c1 $h > /dev/null 2>&1; then
echo "$h"
ssh -l zimbra "$h" "zmcontrol start"
echo
else