Skip to content

Instantly share code, notes, and snippets.

I'm really good at keeping secrets quarantined.

Joe Garcia infamousjoeg

I'm really good at keeping secrets quarantined.
Block or report user

Report or block infamousjoeg

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
JimmyJamCABD / Client_Cert Cred Type.yml
Last active Apr 1, 2020
Ansible Tower Playbooks for retrieving credentials from Cyberark Vault to authenticate to hosts
View Client_Cert Cred Type.yml
- label: CyberArk Client Certificate
secret: true
multiline: true
help_text: Paste the contents of the client certificate for CyberArk authentication
type: string
id: cyberark_client_cert
- cyberark_client_cert
whip113 / conjur_identity.json
Last active Oct 9, 2018
Custom Credential for Ansible Tower - Conjur Identity
View conjur_identity.json
"name": "Conjur API Key",
"description": "",
"kind": "cloud",
"managed_by_tower": false,
"inputs": {
"fields": [
"secret": true,
"type": "string",
"id": "api_key",
whip113 / cybr_client_cert.json
Last active Oct 9, 2018
Custom Credentials for Ansible Tower - CyberArk Client Certificate
View cybr_client_cert.json
"name": "Cyberark Client Certificate",
"description": "",
"kind": "cloud",
"managed_by_tower": false,
"inputs": {
"fields": [
"label": "Client Certificate",
"secret": true,
"multiline": true,
whip113 / cybr_priv_key.json
Last active Oct 9, 2018
Custom Credentials for Ansible Tower - CyberArk Private Key
View cybr_priv_key.json
"name": "CyberArk Private Key",
"description": "Uses client certificate authentication to CyberArk CCP",
"kind": "cloud",
"managed_by_tower": false,
"inputs": {
"fields": [
"label": "Private Key",
"secret": true,
"multiline": true,
jvanderhoof / sample_comjur_seccomp_profile.json
Created May 14, 2018
Sample Conjur seccomp profile (default profile with `keyctl` enabled, which provides access to underlying kernel keychain)
View sample_comjur_seccomp_profile.json
"description": "Default Docker seccomp profile, plus keyctl calls (required by Conjur)",
"comment": "Run with `docker run --security seccomp:path/to/seccomp.json` to use it.",
"defaultAction": "SCMP_ACT_ERRNO",
"architectures": [
"syscalls": [{
infamousjoeg / interfaces
Last active Apr 27, 2018 — forked from takipone/interfaces
Debian/Ubuntu /etc/network/interfaces
View interfaces
auto lo
iface lo inet loopback
auto ens160
iface ens160 inet static
address IP_ADDR
netmask NETMASK
dns-nameservers DNS
View MySql-5.5-installation

MySQL Download URL

Open the terminal and follow along:

  • Uninstall any existing version of MySQL
sudo rm /var/lib/mysql/ -R
mak /
Last active Oct 28, 2018
Extract everything from WannaCry
import re
import os,sys
import pefile
import struct
import zipfile
import hashlib
import StringIO
from Crypto import Random
from Crypto.PublicKey import RSA
from Crypto.Cipher import PKCS1_v1_5,AES

Generate ssl certificates with Subject Alt Names on OSX

Open ssl.conf in a text editor.

Edit the domain(s) listed under the [alt_names] section so that they match the local domain name you want to use for your project, e.g.

DNS.1   =

Additional FQDNs can be added if required:

mshkrebtan /
Last active May 28, 2020
Run Cisco Webex on 64-bit Ubuntu 16.04

Run Cisco Webex on 64-bit Ubuntu 16.04

With Audio and Screen Sharing Enabled

Enable support for 32-bit executables

Add the i386 architecture to the list of dpkg architectures :

sudo dpkg --add-architecture i386
You can’t perform that action at this time.