New repo: https://github.com/konradit/gopro-linux
############################################################################ | |
# | |
# collectd - data collection daemon for performance monitoring | |
# | |
############################################################################ | |
bundle agent collectd(mware) { | |
vars: |
## What you Get | |
- A working linux box | |
- Java JDK 1.6.0_xx | |
- JBoss 5.x.x | |
- Jenkins with Yale-Maven-Application-Installer | |
## The deets | |
- JBoss: | |
-- Installed JBOSS_HOME=/usr/local/jboss-eap-..... | |
-- Apps/Nodes = /usr/local/jboss-apps |
#!/bin/sh | |
# extend non-HiDPI external display on DP* above HiDPI internal display eDP* | |
# see also https://wiki.archlinux.org/index.php/HiDPI | |
# you may run into https://bugs.freedesktop.org/show_bug.cgi?id=39949 | |
# https://bugs.launchpad.net/ubuntu/+source/xorg-server/+bug/883319 | |
EXT=`xrandr --current | sed 's/^\(.*\) connected.*$/\1/p;d' | grep -v ^eDP | head -n 1` | |
INT=`xrandr --current | sed 's/^\(.*\) connected.*$/\1/p;d' | grep -v ^DP | head -n 1` | |
ext_w=`xrandr | sed 's/^'"${EXT}"' [^0-9]* \([0-9]\+\)x.*$/\1/p;d'` |
#!/usr/bin/env python | |
# Copyright 2015-present Palo Alto Networks, Inc | |
# | |
# Licensed under the Apache License, Version 2.0 (the "License"); | |
# you may not use this file except in compliance with the License. | |
# You may obtain a copy of the License at | |
# | |
# http://www.apache.org/licenses/LICENSE-2.0 | |
# |
A collection of links to useful cheat sheets.
Only what's properly printable can get a spot at the top of this list. It should also be small enough to fit on a few pages. almost all links in this document were designed by their creators so that YOU can print them in a good-looking format and store them however is best for you. Anything that isn't really something you could print in A4/UfS Letter format, but is still a well-made cheatsheet can get a spot at the end of the page.
Pleae contribute any you remember you've seen and liked. It would be wonderful if we can get these to be something more commonly made.
The following content is generated using a preview release of Swimlane's pyattck.
This snippet of data is scoped to the following actor groups:
- APT33
- APT34
- APT39
- Charming Kitten
You can use these commands and rules to search for exploitation attempts against log4j RCE vulnerability CVE-2021-44228
This command searches for exploitation attempts in uncompressed files in folder /var/log
and all sub folders
sudo egrep -I -i -r '\$(\{|%7B)jndi:(ldap[s]?|rmi|dns|nis|iiop|corba|nds|http):/[^\n]+' /var/log