Skip to content

Instantly share code, notes, and snippets.

View diegoparrilla's full-sized avatar
😀

Diego Parrilla diegoparrilla

😀
  • @threatjammer
  • Madrid, Spain
  • 04:17 (UTC +02:00)
  • X @soyparrilla
View GitHub Profile
#!/bin/bash
cat /cgroup/blkio/libvirt/qemu/blkio.throttle.read_bps_device
cat /cgroup/blkio/libvirt/qemu/blkio.throttle.write_bps_device
cat /cgroup/blkio/libvirt/qemu/*/blkio.throttle.read_bps_device
cat /cgroup/blkio/libvirt/qemu/*/blkio.throttle.write_bps_device
# 10MBps
#BPSLIMIT=10485760
import time
import uuid
import jwt
import requests
import re
# config
SHARED = 'YOUR SHARED KEY'
SUB = 'YOURSUBDOMAIN'
@diegoparrilla
diegoparrilla / migrate_vm.sh
Created May 22, 2014 15:43
Migrate Openstack VM from Private to Public Cloud
# Migrate a VM to another StackOps Cloud
# This is the kind of rubbish written by a CEO. Don't be cruel
# ENTER THE USERNAME, PASSWORD AND TENANT OF THE SOURCE AND DESTINATION TENANTS
# ALSO CHECK THE KEYSTONE ENDPOINT
#
#!/usr/bin/env bash
#set -x
SOURCE_KEYSTONE_HOST=<<CHANGE_ME>>
SOURCE_OS_USERNAME=<<CHANGE_ME>>
SOURCE_OS_PASSWORD=<<CHANGE_ME>>
MacBook-Air-de-Diego:bosh-bootstrap diego$ ./bin/bosh-bootstrap deploy
1. AWS
2. OpenStack
3. vSphere
Choose your infrastructure: 2
Using provider OpenStack
Username: XXXXXXXXXXX
Password: XXXXXXXXXXX
Tenant: XXXXXXXXX
MacBook-Air-de-Diego:bosh-bootstrap diego$ ./bin/bosh-bootstrap deploy
Using provider OpenStack
Confirming: Using OpenStack (user: XXXXXXXX)
Confirming: Using address 10.0.61.66
Reusing security group ssh
-> no additional ports opened
MacBook-Air-de-Diego:bosh-bootstrap diego$ ruby -v
ruby 2.0.0p451 (2014-02-24 revision 45167) [universal.x86_64-darwin13]
MacBook-Air-de-Diego:bosh-bootstrap diego$ gem list bosh
*** LOCAL GEMS ***
bosh-director-core (1.2685.0, 1.2681.0, 1.2671.0)
bosh-registry (1.2685.0, 1.2681.0, 1.2671.0)
bosh-stemcell (1.2685.0, 1.2681.0, 1.2671.0)
@diegoparrilla
diegoparrilla / disposable-email-provider-domains
Last active August 12, 2021 05:46
List of disposable email provider domains
0815.ru
0clickemail.com
0experts.com
0wnd.net
0wnd.org
10minutemail.co.za
10minutemail.com
123-m.com
1blackmoon.com
1fsdfdsfsdf.tk
riseup.net
e.sino.tw
e.ycn.ro
g.tiv.cc
o.civx.org
mx.dnses.ro
dr.vankin.de
mx.dnses.ro
mx1.dnses.ro
mx2.dnses.ro
@diegoparrilla
diegoparrilla / cloudflare-workers-apilityio.js
Last active April 19, 2023 12:20
Using Cloudflare Workers and https://Apility.io API add to the request headers information of the blacklists of abusers that contains the IP address of the client.
addEventListener('fetch', event => {
event.respondWith(fetchAndCheckOrigin(event.request))
})
async function fetchAndCheckOrigin(req) {
try {
startTime = new Date();
const body = await req.body;
const ip = req.headers.get('cf-connecting-ip');
const es = req.headers.get('cf-ipcountry');
@diegoparrilla
diegoparrilla / cloudflare-workers-block-blacklisted.js
Created May 11, 2018 15:16
Using Cloudflare Workers and https://Apility.io API to block access to the pages filtered if the IP belongs to a blacklisted IP address of the service
addEventListener('fetch', event => {
event.respondWith(fetchAndCheckOrigin(event.request))
})
async function fetchAndCheckOrigin(req) {
try {
const body = await req.body;
const ip = req.headers.get('cf-connecting-ip');
const apilityio = await fetch('https://api.apility.net/badip/' + ip + '?token=APILITY_IO_API_KEY');