Skip to content

Instantly share code, notes, and snippets.

View brycied00d's full-sized avatar
👍
"Hasn't fucked up recently" engineer.

Bryce Chidester brycied00d

👍
"Hasn't fucked up recently" engineer.
  • Tigard, OR
View GitHub Profile
@lteo
lteo / calyptix-log4j-active-exploitation.csv
Last active January 7, 2022 17:31
Calyptix Community Shield - Log4j Active Exploitation IPs
ip first_seen_utc last_seen_utc country asn
1.254.66.188 2021-12-23 03:26 2021-12-23 03:26 KR SK Broadband Co Ltd
100.27.42.242 2021-12-23 20:39 2021-12-23 20:39 US AMAZON-AES
100.27.42.243 2022-01-05 03:08 2022-01-05 03:08 US AMAZON-AES
102.130.113.9 2021-12-14 18:43 2021-12-14 18:43 ZA Host-Africa-AS
103.1.212.84 2021-12-26 17:21 2021-12-27 04:21 AU GSL Networks Pty LTD
103.1.212.85 2021-12-24 22:14 2021-12-26 07:34 AU GSL Networks Pty LTD
103.1.212.86 2021-12-27 05:32 2021-12-27 05:32 AU GSL Networks Pty LTD
103.106.243.120 2021-12-24 04:51 2021-12-24 04:51 BD Saddam Hossain ta Asian Network
103.107.196.149 2021-12-15 19:12 2021-12-15 19:12 AU GSL Networks Pty LTD
@gnremy
gnremy / CVE-2021-44228_IPs.csv
Last active April 26, 2023 07:01
CVE-2021-44228 Apache Log4j RCE Attempts Dec 20th 9:27PM ET
ip tag_name
162.155.56.106 Apache Log4j RCE Attempt
223.111.180.119 Apache Log4j RCE Attempt
213.142.150.93 Apache Log4j RCE Attempt
211.154.194.21 Apache Log4j RCE Attempt
210.6.176.90 Apache Log4j RCE Attempt
199.244.51.112 Apache Log4j RCE Attempt
199.101.171.39 Apache Log4j RCE Attempt
197.246.175.186 Apache Log4j RCE Attempt
196.196.150.38 Apache Log4j RCE Attempt
@ten0s
ten0s / gist:8f67551fe7c3ac32501c20f7b7a39c6f
Last active September 30, 2016 01:04
Dropbox protocol
dropbox stop
#
# Pretent Dropbox is running
# See 'is_dropbox_running' function
# Simulate 'dropbox' string in /proc/%d/cmdline
#
bash -c 'read dropbox' &
6103
@ellemenno
ellemenno / spinner.rb
Created March 11, 2014 16:41
ascii spinner
#!/usr/bin/env ruby
# encoding: UTF-8
@dot_cycle = ['⣾','⣽','⣻','⢿','⡿','⣟','⣯','⣷']
#braille random: 0x2800 - 0x28ff
@z_arrow = ['←','↖','↑','↗','→','↘','↓','↙']
@z_b = ['b','ᓂ','q','ᓄ']
@z_d = ['d','ᓇ','p','ᓀ']
@kisom
kisom / example.txt
Created July 31, 2012 18:57
Python command line utility to determine whether a site supports HSTS.
<monalisa: ~> $ has_hsts.py duckduckgo.com google.com search.google.com conformal.com yahoo.com lobste.rs news.ycombinator.com reddit.com
[+] checking whether duckduckgo.com supports HSTS... no
[+] checking whether google.com supports HSTS... no
[+] checking whether search.google.com supports HSTS... no
[+] checking whether conformal.com supports HSTS... yes
[+] checking whether yahoo.com supports HSTS... no
[+] checking whether lobste.rs supports HSTS... yes
[+] checking whether news.ycombinator.com supports HSTS... no
[+] checking whether reddit.com supports HSTS... doesn't have SSL working properly (hostname 'reddit.com' doesn't match either of 'a248.e.akamai.net', '*.akamaihd.net', '*.akamaihd-staging.net')
@robinsmidsrod
robinsmidsrod / _INSTALL.md
Last active March 21, 2024 23:00
Bootstrapping full iPXE native menu with customizable default option with timeout (also includes working Ubuntu 12.04 preseed install)

Add the following chunk to your existing ISC dhcpd.conf file.

if exists user-class and ( option user-class = "iPXE" ) {
    filename "http://boot.smidsrod.lan/boot.ipxe";
}
else {
    filename "undionly.kpxe";
}

(or see https://gist.github.com/4008017 for a more elaborate setup