Skip to content

Instantly share code, notes, and snippets.

@craig-m-unsw
craig-m-unsw / automation.md
Created March 8, 2020 22:38 — forked from cube-drone/automation.md
Automation For The People

Automation for the People

Long ago, the first time I read "The Pragmatic Programmer", I read some advice that really stuck with me.

"Don't Use Manual Procedures".

This in the chapter on Ubiquitous Automation. To summarize, they want you to automate all the things.

The trouble was that I hadn't much of an idea how to actually go

@craig-m-unsw
craig-m-unsw / 0-startup-overview.md
Created October 5, 2021 21:20 — forked from dideler/0-startup-overview.md
Startup Engineering notes
@craig-m-unsw
craig-m-unsw / github_bugbountyhunting.md
Created October 5, 2021 21:20 — forked from EdOverflow/github_bugbountyhunting.md
My tips for finding security issues in GitHub projects.

GitHub for Bug Bounty Hunters

GitHub repositories can disclose all sorts of potentially valuable information for bug bounty hunters. The targets do not always have to be open source for there to be issues. Organization members and their open source projects can sometimes accidentally expose information that could be used against the target company. in this article I will give you a brief overview that should help you get started targeting GitHub repositories for vulnerabilities and for general recon.

Mass Cloning

You can just do your research on github.com, but I would suggest cloning all the target's repositories so that you can run your tests locally. I would highly recommend @mazen160's GitHubCloner. Just run the script and you should be good to go.

$ python githubcloner.py --org organization -o /tmp/output
@craig-m-unsw
craig-m-unsw / docker-help.md
Created October 9, 2021 13:29 — forked from bradtraversy/docker-help.md
Docker Commands, Help & Tips

Docker Commands, Help & Tips

Show commands & management commands

$ docker

Docker version info

@craig-m-unsw
craig-m-unsw / cissp_notes.md
Last active January 22, 2024 05:09 — forked from penafieljlm/cissp_notes.md
Personal CISSP Study Notes

CISSP Notes

Certified Information Systems Security Professional notes.

CISSP is a certification from the "International Information System Security Certification Consortium", more frequently known as (ISC)² (see https://www.isc2.org/Certifications/CCSP).

Index:

@craig-m-unsw
craig-m-unsw / log4j_rce_detection.md
Created December 16, 2021 20:07 — forked from Neo23x0/log4j_rce_detection.md
Log4j RCE CVE-2021-44228 Exploitation Detection

log4j RCE Exploitation Detection

You can use these commands and rules to search for exploitation attempts against log4j RCE vulnerability CVE-2021-44228

Grep / Zgrep

This command searches for exploitation attempts in uncompressed files in folder /var/log and all sub folders

sudo egrep -I -i -r '\$(\{|%7B)jndi:(ldap[s]?|rmi|dns|nis|iiop|corba|nds|http):/[^\n]+' /var/log
@craig-m-unsw
craig-m-unsw / Example-of-Lookups-Plugin-ansible.md
Created February 2, 2022 23:12 — forked from devops-school/Example-of-Lookups-Plugin-ansible.md
Deep Dive into Lookup Plugins in Ansible with Example

Example 1: Lookups and variables

vars:
  motd_value: "{{ lookup('file', '/etc/motd') }}"
tasks:
  - debug:
      msg: "motd value is {{ motd_value }}"

Example 2: Lookups and loops items

@craig-m-unsw
craig-m-unsw / devsecops.md
Created February 8, 2022 11:37 — forked from apolloclark/devsecops_maturity_model.md
DevSecOps Overview

Overview

DevSecOps has finally become popular within the wider IT industry in 2019. I started as a web developer in 2001, learned about testing automation, system deployment automation, and "infrastructure as code" in 2012, when DevOps has becoming a popular term. DevOps became common after the release of The Phoenix Project in Jan 2013. It has taken 7 years for security to become integrated within the devops methodology. The following is a list of concepts I go through with project owners, project managers, operations, developers, and security teams, to help establish how mature their devops and security automation is, and to help them increase that maturity over time. This model is based on experience consulting with a variety of US Financial, Healthcare, and Department of Defense, organizations, and combines:

Learning Computer Security

About This Guide

This is an opinionated guide to learning about computer security (independently of a university or training program), starting with the absolute basics (suitable for someone without any exposure to or knowledge of computer security) and moving into progressively more difficult subject matter.

It seems that most people don't realize how much information is actually available on the internet. People love to share (especially geeks) and everything you need to become well versed in computer security is already available to you (and mostly for free). However, sometimes knowing where to start is the hardest part - which is the problem that this guide is intended to address. Therefore, this guide can accuratley be described as a 'guide to guides', with additional recommendations on effective learning and execises, based on my own experiences.

Many of the free resources are the best resources and this guide focuses on them. It is intended to provided a comprehensive

@craig-m-unsw
craig-m-unsw / boot-from-ram-debian.md
Created February 18, 2022 22:36 — forked from avinash-oza/boot-from-ram-debian.md
How to boot from RAM on debian