This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
//cd /opt/rapid7/panasonic_avionics_log_processor/venv | |
//. bin/activate | |
//cd /opt/rapid7/panasonic_avionics_log_processor/latest/bin/ | |
//python3.6 main.py |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env bash | |
# check a list of gsuite emails | |
if [[ $# -eq 0 ]]; then | |
echo 'Give me a list of emails!' | |
exit 1 | |
fi | |
email_list="$1" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
SELECT DISTINCT Md5(title) AS "Unique ID", | |
title AS "Vulnerability Title", | |
Proofastext(description) AS "Description" | |
FROM dim_vulnerability | |
WHERE description NOT LIKE '%Deprecated%' | |
ORDER BY title ASC |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
{ | |
"Version": "2012-10-17", | |
"Statement": { | |
"Effect": "Allow", | |
"Action": "sts:AssumeRole", | |
"Resource": "arn:aws:iam::ACCOUNT-ID-WITHOUT-HYPHENS:role/Test*" | |
} | |
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
cask_args appdir: '/Applications' | |
tap 'homebrew/bundle' | |
tap 'caskroom/cask' | |
tap 'homebrew/services' | |
tap 'atlassian/tap' | |
brew 'vim' | |
brew 'git' | |
brew 'go' |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
{ | |
"Version": "2012-10-17", | |
"Statement": [{ | |
"Effect": "Allow", | |
"Action": [ | |
"cloudtrail:LookupEvents", | |
"cloudtrail:DescribeTrails" | |
], | |
"Resource": "*" | |
}, |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
$url = "https://s3.amazonaws.com/com.rapid7.razor.public/endpoint/agent/latest/windows/x86_64/PyForensicsAgent-x64.msi" | |
$output = "$PSScriptRoot\agentInstaller-x86_64.msi" | |
Invoke-WebRequest -Uri $url -OutFile $output | |
msiexec /i $output CUSTOM_TOKEN=<REPLACE ME> /qn | |
rm $output, cafile.pem, client.crt, client.key, client.pem, config.json |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
curl -o agent_installer.sh https://s3.amazonaws.com/com.rapid7.razor.public/endpoint/agent/latest/linux/x86_64/agent_control_latest.sh | |
chmod u+x agent_installer.sh | |
./agent_installer.sh install_start --token <REPLACE ME> | |
rm agent_installer.sh |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash -e | |
####################################################################### | |
# | |
# Metasploit Segmentation and Firewall Testing Target | |
# | |
# The Segmentation and Firewall Testing MetaModule uses a server hosted | |
# by Rapid7 to determine what ports allow egress traffic out of a | |
# network. In some scenarios, you may want to set up your own egress | |
# testing server. This is useful when you want to test egress between |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
{ | |
"Version": "2012-10-17", | |
"Statement": [{ | |
"Effect": "Allow", | |
"Action": [ | |
"cloudtrail:LookupEvents", | |
"cloudtrail:DescribeTrails" | |
], | |
"Resource": "*" | |
}, |