Skip to content

Instantly share code, notes, and snippets.


David Baumann daBONDi

View GitHub Profile
View ip.txt
daBONDi / error.txt
Last active Apr 14, 2020
st2 output test
View error.txt
id: 5e95b45d9bdf2a01660647c2
status: failed
parameters: None
error: "u'{"values": [{"test1": "test1", "test2": 1, "datestr": "2020-04-14T13:02:21.824846"}]}' is not of type 'object'
Failed validating 'type' in schema:
{'additionalProperties': False,
'properties': {u'values': {u'items': {u'datestr': {u'type': u'string'},
u'test1': {u'type': u'string'},
daBONDi / win_lineinfile - Disable Default AJP Connector Port - cve20201938
Created Mar 2, 2020
Ansible - win_lineinfile - Comment line in XML - Disable File Tomcat AJP Port
View win_lineinfile - Disable Default AJP Connector Port - cve20201938
- name: "Ensure Tomcat AJP Connector on Port 8009 is Disabled"
path: "c:/temp/server.xml"
regex: '^(\s*)(<Connector port="8009" protocol="AJP\/1\.3" redirectPort="8443" \/>)'
backrefs: true
line: '$1<!-- $2 -->'
daBONDi /
Created Dec 14, 2018
Inventory Plugin Caching, missing Cache Property so self.cache getting not populated from BaseInventoryPlugin on _read_config_data
from __future__ import (absolute_import, division, print_function)
__metaclass__ = type
import logging
import json
from ansible.plugins.inventory import BaseInventoryPlugin, Constructable, Cacheable
class InventoryModule(BaseInventoryPlugin, Constructable, Cacheable):
daBONDi / StartAppWithEventLogCapturing.ps1
Created Sep 20, 2018
Start an Application with a Powershell Script an Restart it Automatic on non Return Code 0, also capture Eventlog crash entry into the log
View StartAppWithEventLogCapturing.ps1
# Start the Terminal Application on Logon
# Automatic Restart Terminal Application on Crash
Param([String]$Path, [String]$ProcessName="MenuePlan.Terminal.UI", [String]$LogFile="generateme")
$defaultLogRootPath = "c:/temp"; # Define the Default Directory for Log Files
$InstantCrashCounter = 5; # Ammount of Instant Crashes before we stop restarting Application
$secondForDetectingInstantCrash = 60; # Define when a Instant Crash happen in Seconds
if($Path -eq "")
daBONDi / connect.ps1
Created Sep 4, 2018
Powershell Class for Serial Communication with Network Switches
View connect.ps1
$comPort = "COM5"
class SerialCommunicator
hidden [int] $WaitTimeForResponse=1 # Wait Time for Response in Seconds
hidden [int] $ComPortBaudRate=9600;
hidden [System.IO.Ports.Parity] $ComPortParity = [System.IO.Ports.Parity]::None;
hidden [int] $ComPortDataBits=8;
hidden [int] $ComPortStopBits=1;
daBONDi / CleanUpDockerImagesExample.ps1
Created Apr 27, 2018
Cleanup Docker Images Powershell
View CleanUpDockerImagesExample.ps1
# Epic Akward Powershell Cleanup for Docker images
# Get Docker Images with <None> in Line and return the a List of Image Ids
docker images --no-trunc | ?{ $_ -match "<none>" } | % { ($_ -split '\s+|\t+')[2]} | %{ ($_ -split ':')[1]}
# Do the Same with Cleanup
docker rmi $(docker images --no-trunc | ?{ $_ -match "<none>" } | % { ($_ -split '\s+|\t+')[2]} | %{ ($_ -split ':')[1]})
daBONDi / Get-NetAdapterDriverVersion.ps1
Created Feb 1, 2018
Get Network Adapter Driver Version
View Get-NetAdapterDriverVersion.ps1
function Get-NetAdapterDriver(){
$NetworkAdapters = Get-WmiObject -Query "Select * from Win32_NetworkAdapter" -ComputerName $Computer
$Drivers = Get-WmiObject -Query "Select * from Win32_PnPSignedDriver where DeviceClass = 'net'" -ComputerName $Computer
$output = New-Object System.Collections.ArrayList
foreach($NetworkAdapter in $NetworkAdapters)
foreach($Driver in $Drivers){
if($Driver.FriendlyName -eq $NetworkAdapter.Name)
daBONDi / ftg-capture.ps1
Last active Jan 25, 2018
Fortigate Powershell Package Capture Script with Conversion
View ftg-capture.ps1
$putty_executable = "C:\Program Files (x86)\PuTTY\putty.exe"
# Download From:
$fgt2eth_executable = "c:\tools\fgt2eth.exe"
$CaptureFilter="host and not host"
$FortigateHost = ""
daBONDi / ansible-win-meltdown-spectre.yml
Last active Jan 16, 2018
Ansible Runbook to manage Windows Server Systems for Meltdown/Spectre
View ansible-win-meltdown-spectre.yml
# Install an Check result of Security Cheks
- name: "Check security posture agains CVE 2017-573,5715,5754"
hosts: windows
gather_facts: true
restart_allowed: false
enable_meltdown: true
enable_spectre: false