Skip to content

Instantly share code, notes, and snippets.

Avatar

Chris Swan cpswan

View GitHub Profile
@cpswan
cpswan / gmail.py
Created Jan 22, 2017
Example Network UPS Tool (NUT) configs
View gmail.py
#!/usr/bin/python
import os
import sys
import smtplib
import mimetypes
from email.MIMEMultipart import MIMEMultipart
from email.MIMEBase import MIMEBase
from email.MIMEText import MIMEText
from email.MIMEAudio import MIMEAudio
from email.MIMEImage import MIMEImage
@cpswan
cpswan / named.conf
Last active Oct 20, 2020
Unbound/BIND config for DNS over TLS to 1.1.1.1
View named.conf
options {
directory "/tmp";
listen-on-v6 { none; };
forwarders {
127.0.0.1 port 2053;
};
auth-nxdomain no; # conform to RFC1035
@cpswan
cpswan / vpcdns.sh
Created Aug 4, 2015
Extract VPC DNS IP from AWS instance metadata
View vpcdns.sh
#!/bin/bash
MAC="$(curl -s http://169.254.169.254/latest/meta-data/network/interfaces/macs/)"
VPCCIDR="$(curl -s http://169.254.169.254/latest/meta-data/network/interfaces/macs/"$MAC"/vpc-ipv4-cidr-block)"
VPCNET="${VPCCIDR%%/*}"
VPCBASE="$(echo "$VPCNET" | cut -d"." -f1-3)"
VPCDNS="$VPCBASE"'.2'
echo "$VPCDNS"
@cpswan
cpswan / nginx.conf
Last active Jul 26, 2020
Using nginx to proxy to an AWS ELB
View nginx.conf
daemon off;
worker_processes 1;
events { worker_connections 1024; }
http{
sendfile on;
@cpswan
cpswan / autossh_screen.service
Created May 3, 2019
systemd service description for autossh tunnel within a screen
View autossh_screen.service
[Unit]
Description=AutoSSH tunnel in a screen
After=network-online.target
[Service]
User=changeme
Type=simple
Restart=on-failure
RestartSec=3
ExecStart=/usr/bin/screen -DmS tunnel1 /usr/lib/autossh/autossh -M 20020 -D 0.0.0.0:12345 me@mybox.there.com
@cpswan
cpswan / mssql.rules
Created Sep 7, 2015
Suricata rule set for MS SQL Server
View mssql.rules
# Emerging Threats
#
# This distribution may contain rules under two different licenses.
#
# Rules with sids 1 through 3464, and 100000000 through 100000908 are under the GPLv2.
# A copy of that license is available at http://www.gnu.org/licenses/gpl-2.0.html
#
# Rules with sids 2000000 through 2799999 are from Emerging Threats and are covered under the BSD License
# as follows:
#
@cpswan
cpswan / unifi.sh
Created Jan 21, 2018
Command line to launch UniFi controller in a Docker container
View unifi.sh
sudo docker run --rm --init -d -p 8080:8080 -p 8443:8443 -p 3478:3478/udp -p 10001:10001/udp -e TZ='Europe/London' -e RUNAS_UID0=false -e UNIFI_UID=1000 -e UNIFI_GID=1000 -v ~/unifi:/unifi --name unifi jacobalberty/unifi:stable
View GameOfLife_20171213.txt
Started by user Chris Swan
Building in workspace /var/jenkins_home/workspace/GameOfLife
Unpacking https://repo.maven.apache.org/maven2/org/apache/maven/apache-maven/3.3.9/apache-maven-3.3.9-bin.zip to /var/jenkins_home/tools/hudson.tasks.Maven_MavenInstallation/Maven3 on Jenkins
Cloning the remote Git repository
Cloning repository https://github.com/wakaleo/game-of-life.git
> git init /var/jenkins_home/workspace/GameOfLife # timeout=10
Fetching upstream changes from https://github.com/wakaleo/game-of-life.git
> git --version # timeout=10
> git fetch --tags --progress https://github.com/wakaleo/game-of-life.git +refs/heads/*:refs/remotes/origin/*
> git config remote.origin.url https://github.com/wakaleo/game-of-life.git # timeout=10
@cpswan
cpswan / overlay-docker-systemd.sh
Created Dec 24, 2015
Configure systemd to use overlay file system for Docker
View overlay-docker-systemd.sh
sudo mkdir /etc/systemd/system/docker.service.d
sudo bash -c 'cat <<EOF > /etc/systemd/system/docker.service.d/overlay.conf
[Service]
ExecStart=
ExecStart=/usr/bin/docker daemon -H fd:// --storage-driver=overlay
EOF'
sudo systemctl daemon-reload
sudo systemctl restart docker
@cpswan
cpswan / IPsec_example.sh
Created Jul 23, 2015
VNS3 IPsec tunnel example
View IPsec_example.sh
#!/bin/bash
# Set credentials and address for VNS3 manager
VNS3_PW=pa55Word
VNS3_IP=10.11.22.33
# Use IPsec connection 2
VNS3_EP=2
# Clear out any existing IPsec tunnels
while true; do
TUNNEL=$(curl -s -k -X GET -u api:"$VNS3_PW" \
https://"$VNS3_IP":8000/api/ipsec | python -mjson.tool \
You can’t perform that action at this time.