CELO_VALIDATOR_GROUP_ADDRESS=41bc59382529aa1f128e1b52b7170e284260c47f CELO_VALIDATOR_ADDRESS=f5e4574972b165c499debee15926205398bc2cd7
View group-metadata.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
{"claims":[{"timestamp":1578964683,"type":"ACCOUNT","address":"0xf5E4574972b165C499debEe15926205398Bc2Cd7"}],"meta":{"address":"0x41bC59382529AA1f128E1b52b7170E284260C47F","signature":"0x54017bd82dc0a9eee8b82472baa3bcfdf38edb309193afed30bfc4c7ac1f04614c2054a6302707d916d331200e3a0b0fe94160c1cca2fdd4e0d0cf306fb1f6421c"}} |
View metadata.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
{"claims":[{"url":"http://165.227.241.2","timestamp":1578964510,"type":"ATTESTATION_SERVICE_URL"},{"timestamp":1578964518,"type":"ACCOUNT","address":"0x41bC59382529AA1f128E1b52b7170E284260C47F"}],"meta":{"address":"0xf5E4574972b165C499debEe15926205398Bc2Cd7","signature":"0x6ae86b713c67f69cb1c77bffd768c31d4e0015728350e0dc532540c600c42c9d5f6b16bd3f4a9be444ea0cce493323d82c9084502b9e6c64c7adc772526dab421c"}} |
View metadata.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
{"claims":[{"url":"http://165.227.241.2/","timestamp":1578963716,"type":"ATTESTATION_SERVICE_URL"},{"timestamp":1578963735,"type":"ACCOUNT","address":"0x41bC59382529AA1f128E1b52b7170E284260C47F"}],"meta":{"address":"0xf5E4574972b165C499debEe15926205398Bc2Cd7","signature":"0xdf8a2c0671979119fbc47d5bc6f28b9831ecb916e7d1ed799a3c7154eb79559971579d2e516150ebe77ebd58147ff953062ed524f93f53dedd829809c08cf3aa1b"}} |
View metadata.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
{"claims":[{"url":"http://138.197.212.86","timestamp":1578956745,"type":"ATTESTATION_SERVICE_URL"},{"timestamp":1578956766,"type":"ACCOUNT","address":"0x41bC59382529AA1f128E1b52b7170E284260C47F"}],"meta":{"address":"0xf5E4574972b165C499debEe15926205398Bc2Cd7","signature":"0x7dd557bddddc3a6fff803fb7f4d0826d87cabcaa401591ad72d2117ec052b2ee570fc5e551add0720bf5bb62966540960e892f61c62d196be499f8c70e67e9d91c"}} |
View gist:c6fc308b03cb9a3b719242789c52c161
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
root@vultr:/var/lib/docker/swarm/certificates# openssl x509 -in swarm-node.crt -text | |
Certificate: | |
Data: | |
Version: 3 (0x2) | |
Serial Number: | |
10:79:9c:09:dc:d2:c6:f3:c7:b7:40:bc:1e:c5:0c:d1:08:ae:63:90 | |
Signature Algorithm: ecdsa-with-SHA256 | |
Issuer: CN=swarm-ca | |
Validity | |
Not Before: Apr 28 15:56:00 2017 GMT |
View memory_bomb.c
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
int main() | |
{ | |
while(1) | |
{ | |
void *m = malloc(1024*1024); | |
memset(m,0,1024*1024); | |
} | |
return 0; | |
} |
View demotamper
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#! /bin/bash | |
hash="$(cat `grep -rl '"name": "demo"' /var/lib/registry/docker/registry/v2/` | grep Sum | head -n1 | cut -d':' -f3 | cut -d'"' -f1)" | |
firstchars="$(echo $hash | head -c 2)" | |
data="/var/lib/registry/docker/registry/v2/blobs/sha256/$firstchars/$hash/" | |
echo $data |
View tamperdir.sh
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#! /bin/bash | |
hash="$(cat `grep -rl '"name": "dolly"' /var/lib/registry/docker/registry/v2/` | grep Sum | head -n1 | cut -d':' -f3 | cut -d'"' -f1)" | |
firstchars="$(echo $hash | head -c 2)" | |
data="/var/lib/registry/docker/registry/v2/blobs/sha256/$firstchars/$hash/" | |
echo $data |
View gist:e1bcd7ee98ca2bfe6995
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#! /bin/bash | |
echo -e "\e[0;31m# Hacking the Dolly application...\e[0m" | |
sleep 1 | |
echo -e "# finding location of files... FOUND." | |
sleep 1 | |
echo -e "\e[0;31m# HACKED, have fun.\e[0m" | |
rsync -a /var/lib/registry/docker/registry/v2/repositories/dolly_malicious/ /var/lib/registry/docker/registry/v2/repositories/dolly/ |
NewerOlder