Keybase proof
I hereby claim:
- I am fahadysf on github.
- I am fahadysf (https://keybase.io/fahadysf) on keybase.
- I have a public key ASCnFJniqfma6cDAgj8ZZ09yKrVeLliB1oxEqiZkT5cazwo
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
$input_file = ".\sample.txt" | |
$output_file = ".\out.txt" | |
$text = Get-Content $input_file -Raw | |
$text | select-string '"[^\"]+"' -AllMatches | Foreach-Object {$_.Matches} | Foreach-Object { $text = $text.replace($_.Groups[0].Value, $_.Groups[0].Value.replace(' ', '_'))} | |
echo $text | |
echo $text > $output_file |
#!/bin/sh | |
dnsserver="freedns2.registrar-servers.com" | |
host="host" | |
domain_name="your.domain" | |
ddns_password="YOUR-DDNS-PASSWORD-HERE" | |
dnsrecord=$host.$domain_name | |
#!/bin/bash | |
CYCLE_COUNT=`system_profiler SPPowerDataType | grep "Cycle Count" | awk '{print $3}'` | |
MAX_CAPACYTY=`system_profiler SPPowerDataType | grep "Maximum Capacity" | awk '{print $3}'` | |
echo "Cycle Count: $CYCLE_COUNT" | |
echo "Maximum Capacity: $MAX_CAPACYTY" |
#!/bin/bash | |
# Parameters for the Root CA Certificate (Self-Signed) | |
# Please Modify this according to your needs | |
CA_KEY_SIZE="4096" | |
# CA Certificate Subject Parameters | |
# Please Modify these according to your needs | |
C="SA" | |
ST="Riyadh" | |
O="Acme.com" | |
OU="PA" |
#!/usr/bin/env python | |
""" | |
Copyright (C) 2018 | |
Author: Fahad Yousuf | |
This script extracts TCP Flows from a Packet Capture files and finds | |
common patterns (hex) of give length (default 7-bytes) | |
Usage: flowextractor.py [-h] [-d DPORT] inputfile |
#!/usr/bin/env python | |
""" | |
Script to create output of Physical Package CPU Temperature | |
using the sensors command. Handy for feeding to NetXMS with the below | |
Agent Config line | |
ExternalParameterShellExec=CPUTemperature(*): python /root/check-temp.py $1 | |
""" | |
import sys |
I hereby claim:
I am fahadysf on github.
I am fahadysf (https://keybase.io/fahadysf) on keybase.
I have a public key ASDkblr_kBLbw68SVDakAelHy2qLLpPcj6IYO7IpbdDg2Qo
#!/usr/local/bin/python2.7 | |
""" | |
Copyright (C) 2018 | |
Authors: Fahad Yousuf, Lorenzo Castelletti | |
This script parses a PCAP file and looks for common data patterns in TCP payloads. | |
These can then be used as signatures while building a custom App-ID. | |
It works for captures with multiple sessions of the same unknown-tcp traffic. |
package main | |
import ( | |
"crypto/md5" | |
"encoding/hex" | |
"flag" | |
"fmt" | |
"io" | |
"net/http" | |
"os" |