Skip to content

Instantly share code, notes, and snippets.

View anthonygtellez's full-sized avatar

Anthony Tellez anthonygtellez

View GitHub Profile

Fix for Splunk TA Bro to index gzipped data and have the sourcetype match current log

  • disable input once historical data onboarding is completed.
  • required on UF, HF, IDX, SH

Inputs.conf

[monitor:///usr/local/bro/logs/*/*.log.gz]
sourcetype = brogz
index = bro
Geographic Area Census 2010 2011 2012 2013 2014 2015 2016
United States 308745538 309348193 311663358 313998379 316204908 318563456 320896618 323127513
Northeast 55317240 55388056 55632766 55829059 55988771 56116791 56184737 56209510
Midwest 66927001 66978602 67153331 67332320 67543948 67726368 67838387 67941429
South 114555744 114863114 116061801 117299171 118424320 119696311 121039206 122319574
West 71945553 72118421 72815460 73537829 74247869 75023986 75834288 76657000
.Alabama 4779736 4785492 4799918 4815960 4829479 4843214 4853875 4863300
.Alaska 710231 714031 722713 731089 736879 736705 737709 741894
.Arizona 6392017 6408312 6467163 6549634 6624617 6719993 6817565 6931071
.Arkansas 2915918 2921995 2939493 2950685 2958663 2966912 2977853 2988248

Keybase proof

I hereby claim:

  • I am anthonygtellez on github.
  • I am anthonygtellez (https://keybase.io/anthonygtellez) on keybase.
  • I have a public key ASCBPDuJGWCUjLpIFk2a5Rxi1_wJmTJrS3QYZMfnfmLaLQo

To claim this, I am signing this object:

@anthonygtellez
anthonygtellez / dump.csv
Created April 9, 2017 18:19 — forked from anonymous/dump.csv
Parsed out compromised hosts from #ShadowBrokers
ID Host IP Address Year Month Day Implant Version OS
PITCHIMPAIR ns1.youngdong.ac.kr 202.30.58.5 1969 12 31 INCISION 1.1.2.1 hppa2.0w-hp-hpux11.00
INTONATION tx.micro.net.pk 203.135.2.194 2000 8 17 JACKLADDER 2.0 sparc-sun-solaris2.7
INTONATION hakuba.janis.or.jp 210.232.42.3 2000 8 22 JACKLADDER 2.0 sparc-sun-solaris2.6
INTONATION mail.interq.or.jp 210.157.0.87 2000 8 24 JACKLADDER 2.0 sparc-sun-solaris2.6
INTONATION mx1.freemail.ne.jp 210.235.164.21 2000 8 28 JACKLADDER ? i386-pc-solaris2.7
INTONATION webnetra.entelnet.bo 166.114.10.28 2000 8 30 JACKLADDER 2.0 sparc-sun-solaris2.6
INTONATION opcwdns.opcw.nl 195.193.177.150 2000 9 6 JACKLADDER 2.0 sparc-sun-solaris2.6
INTONATION rayo.pereira.multi.net.co 206.49.164.2 2000 9 20 JACKLADDER 2.0 sparc-sun-solaris2.6
INTONATION most.cob.net.ba 195.222.48.5 2000 9 21 JACKLADDER 2.0 sparc-sun-solaris2.6
@anthonygtellez
anthonygtellez / domains.sh
Created February 26, 2017 06:02 — forked from waako/domains.sh
Lookup A-record and Nameservers for a list of domains in a txt file, output into a csv file
#!/bin/bash
# Put all the domain names in domains.txt, one per line
# then run in the terminal: bash domains.sh
# this will print each domain in the terminal as it looks it up
# The result csv will contains the domain, IP & Nameservers in each column
# Give each column the relevant header titles
echo "Domain Name,IP Address,Nameserver,Nameserver,Nameserver,Nameserver,Nameserver" > domains.csv
while read domain
@anthonygtellez
anthonygtellez / domains.sh
Last active October 14, 2022 09:27 — forked from waako/domains.sh
Lookup A-record and Nameservers for a list of domains in a txt file, output into a csv file
#!/bin/bash
# Put all the domain names in domains.txt, one per line
# then run in the terminal: bash domains.sh
# this will print each domain in the terminal as it looks it up
# The result csv will contains the domain, IP & Nameservers in each column
# Give each column the relevant header titles
echo "Domain Name,IP Address" > dig_cloud-bleed_domains.csv
while read domain
#!/bin/bash
#
# ===========================================================
# Purpose: This script will install splunk and complete some initial setup steps
# Parameters: None
# Example usage: $ bash rhel_yum_install_syslog-ng.sh
#
# Privileges: Must be run as root
# Author: Anthony Tellez
#
# found on the internet, not my creation
# - jsie
import re
total_logical_cpus = 0
total_physical_cpus = 0
total_cores = 0
logical_cpus = {}
@anthonygtellez
anthonygtellez / gist:4a309f277d8c162addaa184ab4853bd0
Created May 23, 2016 21:31 — forked from bortzmeyer/gist:1284249
The only simple way to do SSH in Python today is to use subprocess + OpenSSH...
#!/usr/bin/python
# All SSH libraries for Python are junk (2011-10-13).
# Too low-level (libssh2), too buggy (paramiko), too complicated
# (both), too poor in features (no use of the agent, for instance)
# Here is the right solution today:
import subprocess
import sys
@anthonygtellez
anthonygtellez / cidr2regex.py
Created December 7, 2015 23:21 — forked from waffle2k/cidr2regex.py
Convert CIDR notation to regex
#!/usr/bin/python
''' Not my script, found on the Internet, and rediscovered on my hard drive
'''
import sys
def cidr_to_regex(cidr):
ip, prefix = cidr.split('/')
base = 0
for val in map(int, ip.split('.')):