Skip to content

Instantly share code, notes, and snippets.

Avatar

elreydetoda

View GitHub Profile
View enduser-install-vars.yml
pulp_default_admin_password: password
pulp_install_source: pip
pulp_settings:
secret_key: secret
content_origin: "https://{{ inventory_hostname }}"
x_pulp_api_host: 127.0.0.1
x_pulp_api_port: 24817
x_pulp_api_user: "admin"
x_pulp_api_password: "{{ pulp_default_admin_password }}"
x_pulp_api_prefix: "pulp_ansible/galaxy/automation-hub/api"
View ansible-navigator.yml
---
# https://events.ansiblefest.redhat.com/widget/redhat/ansible21/sessioncatalog/session/1627933227788001rep4
ansible-navigator:
# ansible:
# inventories:
# - hosts
execution-environment:
container-engine: podman
@elreydetoda
elreydetoda / ModifyAndBuildingBurpExtensions.md
Last active Aug 18, 2021 — forked from decidedlygray/ModifyAndBuildingBurpExtensions.md
Modifying and Building Burp Extensions Quick Reference
View ModifyAndBuildingBurpExtensions.md

Quick Reference

This section is a boiled down version of everything above. It should serve as an easy reference. These steps assume you've identified and installed the correct JDK.

Modify and Re-Jar Extension

  1. Locate the jar file: Extender > Extensions > Select extension > Details. bapps\ directory is located at C:\Users\yourusername\AppData\Roaming\BurpSuite\bapps
  2. Backup the original jar file to a different folder, outside of bapps.
  3. Change extension from .jar to .zip, extract contents, delete .zip file
  4. Make your modifications
  5. Re-jar: jar cvf yourJarName.jar -C extractedContentsDirectory/ .
View headers.py
#!/usr/bin/env python3
# inspired by Julia Evans' (https://twitter.com/b0rk) header script from
# https://changelog.fm/450 ( https://youtu.be/mFKrw_zTbpc )
import fileinput
# takes stdin from visual mode of vim and ! to execute this script
lines = [ x.strip().rstrip(' #').lstrip('# ') for x in fileinput.input() ]
# getting the longest line length from the input
@elreydetoda
elreydetoda / Disable mstsc NLA (client)
Created Jun 11, 2021 — forked from pingec/Disable mstsc NLA (client)
Disable NLA on remote desktop (mstsc) client (fixing password expired problem)
View Disable mstsc NLA (client)
Sometimes you try to open a remote desktop connection to a machine only to get an error message that "the password has expired".
If the remote machine does not enforce NLA (Network Level Authentication), it is still possible to start a remote desktop session by disabling NLA on the client (currenlty not possible from the menu on my remote desktop client v.6.3.96000 that came with windows 8.1).
Add the following setting to your .rdp file ("C:\Users\<User>\Documents\Default.rdp" if you aren't using a specific one).
enablecredsspsupport:i:0
Optionally you might need to specify
@elreydetoda
elreydetoda / WinKey.ps1
Last active May 15, 2021
Get the Product key from windows
View WinKey.ps1
# how to use this script
# iex (new-object system.net.webclient).DownloadString("https://git.io/JsnxS")
# if that fails, it is probably something with the tls level ( took from chocolatey install )
# [System.Net.ServicePointManager]::SecurityProtocol = [System.Net.ServicePointManager]::SecurityProtocol -bor 3072
# then run the iex command again
# src: https://nedimmehic.org/2017/02/17/how-to-find-windows-product-key-allversions-of-windows/
function Get-WindowsKey {
## function to retrieve the Windows Product Key from any PC
## by Nedim Mehic
param ($targets = ".")
View _shellcheck.md
  • SC1000 $ is not used specially and should therefore be escaped.
  • SC1001 This \o will be a regular 'o' in this context.
  • SC1003 Want to escape a single quote? echo 'This is how it'\''s done'.
  • SC1004 This backslash+linefeed is literal. Break outside single quotes if you just want to break the line.
  • SC1007 Remove space after = if trying to assign a value (or for empty string, use var='' ... ).
  • SC1008 This shebang was unrecognized. ShellCheck only supports sh/bash/dash/ksh. Add a 'shell' directive to specify.
  • SC1009 The mentioned parser error was in ...
  • SC1010 Use semicolo
@elreydetoda
elreydetoda / Enable-RDP.ps1
Created Nov 4, 2020
enabling rdp & allowing through firewall powershell script
View Enable-RDP.ps1
# thanks to https://vmarena.com/how-to-enable-remote-desktop-rdp-remotely-using-powershell/
Set-ItemProperty -Path 'HKLM:\System\CurrentControlSet\Control\Terminal Server'-name "fDenyTSConnections" -Value 0
Enable-NetFirewallRule -DisplayGroup "Remote Desktop"
View dynamic-env.sh
mapfile -t env_varz < <(env | grep -iE 'packet|tf_|vagrant_|circle|release' | cut -d '=' -f 1)
IFS=" " read -r -a env_vars_array <<< "$(printf ' -e %s' "${env_varz[@]}")"
docker container run --rm -it "${env_vars_array[@]}" -v "${PWD}/scripts":/scripts bash
View Pipfile
[[source]]
name = "pypi"
url = "https://pypi.org/simple"
verify_ssl = true
[dev-packages]
# for python dev
pylint = "*"
bandit = "*"
black = "==20.8b1"