Skip to content

Instantly share code, notes, and snippets.

View austinsonger's full-sized avatar
🙃
Localhost

Austin Songer,MIS,CEH,ESCA,Project+ (Navy Veteran) austinsonger

🙃
Localhost
View GitHub Profile
@austinsonger
austinsonger / oss.md
Created July 18, 2024 16:19
Evaluating Open Source Software as Dependencies

Avoid New Dependencies

  • Use existing (possibly indirect) dependencies.
  • Minimize attack surface.

Evaluate Intended Version

  • Verify software version (not personal/attacker-controlled fork).
  • Check project name and website link.
  • Verify fork relation on GitHub/GitLab.
@austinsonger
austinsonger / 0. Proof of Concept - Elastic Detection: VIP - Executive impersonation in subject (untrusted).md
Last active July 2, 2024 18:38
Proof of Concept - Elastic Detection: VIP / Executive impersonation in subject (untrusted)

This detection rule is designed to identify emails where the sender's subject contains the display name of a VIP or executive from a predefined list (org_vips), and the sender has never been seen before. This rule is particularly useful for detecting Business Email Compromise (BEC) or fraud attempts targeting high-profile individuals within an organization.

Pre-requisites

  • org_vips List: A list of display names of VIPs or executives that must be manually connected to a VIP group of your upstream provider (Google Workspace).
  • Email Provider: Google Workspace.

Explanation of the Query

  1. Basic Event Filtering:
@austinsonger
austinsonger / volatilitybased.py
Created June 22, 2024 18:20
Volatility-Based Trading Signal Algorithm: This algorithm leverages multiple technical indicators to evaluate market conditions and generate a consolidated trading signal ranging from -3 to +3. Each indicator contributes to the overall score based on its specific criteria, helping traders to identify optimal entry and exit points.
import pandas as pd
import numpy as np
import ta
from ta.volatility import BollingerBands
from ta.momentum import RSIIndicator, StochasticOscillator
from ta.trend import MACD, EMAIndicator
from ta.volume import OnBalanceVolumeIndicator
def calculate_signal(df):
# Calculate Bollinger Bands
AccessKeysRotated:
- Frameworks:
- PCI DSS:
- ''
- NIST 800-53:
- ''
- HIPAA Security:
- ''
- FedRAMP:
- ''
@austinsonger
austinsonger / hostXMRNode.md
Created June 11, 2024 09:39 — forked from tannerdsilva/hostXMRNode.md
How To Build And Host a Monero Node from Source

How to Build and Install a Monero Node on a Debian-based System

Hello. In this document, we will walk through the steps of building and hosting your own Monero node from source on a Debian-based Linux system. These systems include Raspbian, Debian (9 and above), and Ubuntu (18.04 and above). This tutorial assumes that you are capable of accessing the ROOT terminal of your Debian-based system, and are capable of getting your system online if necessary. You may plan on using an external storage device to store the blockchain, this tutorial will include the optional steps to support external storage. Alternatively, this setup procedure can also accomodate users looking to host a pruned blockchain with restricted storage space.

Here are some useful links for reaching this prerequisite if you do not currently have access to a Debian-based system that meets the recommended system requirements.

@austinsonger
austinsonger / block-webserver-scanners.sh
Last active May 26, 2024 15:14
Bash script that blocks web server scanner IP Addresses after they scan once.
#!/bin/bash
######################### Common Functions #########################
# Function to process log files
process_log() {
local log_file=$1
local output_file=$2
local temp_file=$3
local ip_column=$4
#!/bin/zsh
###################################################################################################
# Created by Noah Anderson | se@kandji.io | Kandji, Inc. | Systems Engineering
###################################################################################################
# Created on 07/22/2022
###################################################################################################
# Software Information
###################################################################################################
#
# Script downloads two .apps, one for Intel architecture, one for Apple silicon, and
Rank Type Prefix/Suffix Length
1 Prefix my+ 2
2 Suffix +online 6
3 Prefix the+ 3
4 Suffix +web 3
5 Suffix +media 5
6 Prefix web+ 3
7 Suffix +world 5
8 Suffix +net 3
9 Prefix go+ 2
@austinsonger
austinsonger / gradetf.py
Last active February 22, 2024 18:21
Grade Terraform Code Based on AWS Conformance Pack Criteria
import os
import yaml
import hcl2
# Constants
YAML_FILE_PATH = '<Path to YAML File>'
TERRAFORM_DIRECTORY_PATH = '<Path to Terraform Code>'
def parse_yaml(yaml_file_path):
"""Parse the YAML file containing the AWS Conformance Pack criteria."""
@austinsonger
austinsonger / README.MD
Last active February 9, 2024 19:32
Authenticated AWS RDS Vulnerability Scanning for NMAP (NOT DONE)

The Nmap NSE script "Authenticated AWS RDS Vulnerability Scanning" is a comprehensive security tool designed for conducting in-depth, authenticated vulnerability assessments on Amazon Web Services (AWS) Relational Database Service (RDS) instances. This script is an integral part of a security professional's toolkit, enabling the identification and evaluation of security vulnerabilities within AWS RDS databases, including popular engines like PostgreSQL and MySQL.

TO-DO

  • Ensure the openssl library or any other cryptographic library you plan to use is accessible within the NSE environment. NSE does not natively support openssl, so you might need to adapt or find alternatives.
  • External Script Integration: If NSE cannot directly execute the necessary cryptographic functions, consider implementing these in an external script (e.g., Python) and call it from the NSE script.
  • Complete Signature Implementation: The functions provided for AWS Signature Version 4 are conceptual. Ensure each step correctly imple