Skip to content

Instantly share code, notes, and snippets.

View igorhrq's full-sized avatar

Igor Andrade igorhrq

View GitHub Profile
#!/usr/bin/env bash
# The new rotation ip suite
# The development of this script was started on 20/06/2019 with the manual option
#
#
# INFO
#
# Author : Igor A.
# E-Mail : igor.a@hostdime.com.br
# Personal E-Mail: igor@igorlnx.com
#!/bin/bash
load=`echo $(cat /proc/loadavg | awk '{print $1}') \> 8 | bc -l`
Release() {
release=$(egrep "5|6" /etc/redhat-release | awk {'print $4'} | cut -d. -f1)
if [[ -z $release ]]; then
mailPath=/usr/bin/mail
else
mailPath=/bin/mail
fi
#!/bin/bash
#IgorA HDBR Team Abuse 03/10/2018
green="\033[01;32m"
azul="\033[01;34m"
red="\033[01;31m"
white="\033[01;37m"
ver=$(rpm -qa | grep ^python-2. | cut -d. -f2)
echo -e "$green>> $white Checking if the WebMalwareScanner is installed... please wait"
ls /root/WebMalwareScanner/wms.py >/dev/null 2>&1
sv=$?
#!/bin/bash
#IgorAndrade Eitest Finder
#Version 1.1
#Run in a Screen for a better investigation
rm -rf /home/eitest.txt
while true
do
#SpamHaus Honeypot, it will help us to find the account source
hpot=$(echo 192.42.116.41)
#it will get the info about the proccess, more details take a look on lsof manual
###################################################################
# ____ _ _ __ __ __ __ _ ______ __ #
#/ ___|| | | | \/ | \/ | / \ | _ \ \ / / #
#\___ \| | | | |\/| | |\/| | / _ \ | |_) \ V / #
# ___) | |_| | | | | | | |/ ___ \| _ < | | #
#|____/ \___/|_| |_|_| |_/_/ \_\_| \_\|_| #
# #
# _ ____ ____ _____ #
# / \ / ___/ ___|_ _| #
# / _ \| | | | | | #
#!/bin/bash
NL="\e[1m";
PI="\e[0;00m";
VM2="\e[31m";
VM="\E[1;31m";
AM="\e[1;33m";
VR2="\e[1;32m" ;
VR="\e[90m";
AZ="\e[1m \e[34m";
use Getopt::Std;
getopts("u:p:",\%options);
$user = $options{'u'};
$password = $options{'p'};
$data = crypt($password,'$1$'.crypt($password,rand(100)).'$');
print $user . ":" . $data . ":::::::\n";
@igorhrq
igorhrq / pass
Created September 15, 2016 11:49
pass() {
cat /etc/trueuserdomains | grep -q "^.*:\s$1$"
[ $? -ne '0' ] && { echo "Usuario nao existe" ; return 1 ; }
if [ "$2" == "" ];then
pass=`cat /dev/urandom| tr -dc 'a-zA-Z0-9' | head -c 12`;
export ALLOW_PASSWORD_CHANGE=1
/scripts/chpass "$1" "$pass";
mysql mysql -e "UPDATE user SET Password=password('$pass') WHERE User='$1'" && retval=0 || retval=1
mysql mysql -e "flush privileges"
if [ $retval -eq '0' ] ; then
unalias restrict_http 2> /dev/null
restrict_http(){
args=$@
analista=$(echo $args | sed 's/\s.*//')
motivo=$(echo $args | sed 's/^[a-zA-Z0-9]\+\s//')
# analista=$1
if [[ -z "$analista" ]]; then
echo "Erro - Nome do analista nao foi informado corretamente ex: igora"
return 1