Skip to content

Instantly share code, notes, and snippets.

View infoslack's full-sized avatar
🏠
Working from home

Daniel Romero infoslack

🏠
Working from home
View GitHub Profile
@infoslack
infoslack / nginx.conf
Created October 30, 2013 17:31
upstart nginx
description "nginx webserver"
start on startup
stop on shutdown
respawn
expect fork
exec /opt/local/sbin/nginx
@infoslack
infoslack / projeto.conf
Created October 31, 2013 18:49
puma upstart
description "projeto server config"
pre-start script
mkdir -p /var/log/puma
chown deploy. /var/log/puma
mkdir -p /var/run/puma
chown deploy. /var/run/puma
end script
@infoslack
infoslack / puma.conf
Created October 31, 2013 19:00
config do puma para um projeto
threads 2,2
# conexão do tipo unix socket
#bind "unix:///var/tmp/projeto.sock"
# conexão do tipo TCP socket
#bind "tcp://0.0.0.0:5000"
pidfile "/var/run/puma/projeto.pid"
@infoslack
infoslack / tomcat_mce_upload.rb
Created February 4, 2014 00:53
Apache Tomcat Manager Code Execution Exploit
##
# This module requires Metasploit: http//metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
Rank = ExcellentRanking
@infoslack
infoslack / socket.recvfrom_into.py
Created February 23, 2014 20:36
Exploit: python socket.recvfrom_into() remote buffer overflow
#!/usr/bin/env python
'''
# Exploit Title: python socket.recvfrom_into() remote buffer overflow
# Date: 21/02/2014
# Exploit Author: @sha0coder
# Vendor Homepage: python.org
# Version: python2.7 and python3
# Tested on: linux 32bit + python2.7
# CVE : CVE-2014-1912
@infoslack
infoslack / nginx_dos.py
Created February 26, 2014 16:02
Exploit: nginx v1.3.9-1.4.0 DOS POC (CVE-2013-2070)
# Exploit Title: nginx v1.3.9-1.4.0 DOS POC (CVE-2013-2070)
# Google Dork: CVE-2013-2070
# Date: 16.05.2013
# Exploit Author: Mert SARICA - mert [ . ] sarica [ @ ] gmail [ . ] com - http://www.mertsarica.com
# Vendor Homepage: http://nginx.org/
# Software Link: http://nginx.org/download/nginx-1.4.0.tar.gz
# Version: 1.3.9-1.4.0
# Tested on: Kali Linux & nginx v1.4.0
# CVE : CVE-2013-2070
# -*- mode: ruby -*-
# vi: set ft=ruby :
Vagrant.configure("2") do |config|
config.vm.box = "hellobits"
config.vm.box_url = "http://hellobits.com/vagrant/hellobits.box"
config.vm.synced_folder ".", "/Projects", id: "vagrant-root"
# config.vm.network :private_network, ip: "192.168.50.2"
forward_port = ->(guest, host = guest) do
@infoslack
infoslack / list of packages
Created February 27, 2014 17:42
Slackware minimal installation
aaa_base
aaa_elflibs
aaa_terminfo
bash
bin
bzip2
coreutils
devs
dhcpcd
dialog
@infoslack
infoslack / ssh-conf.sh
Last active August 29, 2015 13:57
Função para adicionar aliases em .ssh/config de forma fácil. Adicione a função ao seu .bashrc ou similar ;)
ssh-conf(){
if [ $# -lt 2 ]; then
echo "Faz assim: ssh-conf <Host> [<user>@]<hostname>]" >&2
return 1
fi
short=$1
arg=$2
if $(echo "$arg" | grep '@' >/dev/null); then
@infoslack
infoslack / block-bot.sh
Created March 20, 2014 19:52
Bloqueando Botnet da China
#!/bin/sh
ISO="cn"
IPT=/sbin/iptables
WGET=/usr/bin/wget
EGREP=/bin/egrep
SPAMLIST="countrydrop"
ZONEROOT="/root/iptables"