Skip to content

Instantly share code, notes, and snippets.

View jfrantz1-r7's full-sized avatar

Josh Frantz jfrantz1-r7

  • Rapid7
View GitHub Profile
//cd /opt/rapid7/panasonic_avionics_log_processor/venv
//. bin/activate
//cd /opt/rapid7/panasonic_avionics_log_processor/latest/bin/
//python3.6 main.py
#!/usr/bin/env bash
# check a list of gsuite emails
if [[ $# -eq 0 ]]; then
echo 'Give me a list of emails!'
exit 1
fi
email_list="$1"
SELECT DISTINCT Md5(title) AS "Unique ID",
title AS "Vulnerability Title",
Proofastext(description) AS "Description"
FROM dim_vulnerability
WHERE description NOT LIKE '%Deprecated%'
ORDER BY title ASC
{
"Version": "2012-10-17",
"Statement": {
"Effect": "Allow",
"Action": "sts:AssumeRole",
"Resource": "arn:aws:iam::ACCOUNT-ID-WITHOUT-HYPHENS:role/Test*"
}
}
cask_args appdir: '/Applications'
tap 'homebrew/bundle'
tap 'caskroom/cask'
tap 'homebrew/services'
tap 'atlassian/tap'
brew 'vim'
brew 'git'
brew 'go'
{
"Version": "2012-10-17",
"Statement": [{
"Effect": "Allow",
"Action": [
"cloudtrail:LookupEvents",
"cloudtrail:DescribeTrails"
],
"Resource": "*"
},
$url = "https://s3.amazonaws.com/com.rapid7.razor.public/endpoint/agent/latest/windows/x86_64/PyForensicsAgent-x64.msi"
$output = "$PSScriptRoot\agentInstaller-x86_64.msi"
Invoke-WebRequest -Uri $url -OutFile $output
msiexec /i $output CUSTOM_TOKEN=<REPLACE ME> /qn
rm $output, cafile.pem, client.crt, client.key, client.pem, config.json
curl -o agent_installer.sh https://s3.amazonaws.com/com.rapid7.razor.public/endpoint/agent/latest/linux/x86_64/agent_control_latest.sh
chmod u+x agent_installer.sh
./agent_installer.sh install_start --token <REPLACE ME>
rm agent_installer.sh
#!/bin/bash -e
#######################################################################
#
# Metasploit Segmentation and Firewall Testing Target
#
# The Segmentation and Firewall Testing MetaModule uses a server hosted
# by Rapid7 to determine what ports allow egress traffic out of a
# network. In some scenarios, you may want to set up your own egress
# testing server. This is useful when you want to test egress between
{
"Version": "2012-10-17",
"Statement": [{
"Effect": "Allow",
"Action": [
"cloudtrail:LookupEvents",
"cloudtrail:DescribeTrails"
],
"Resource": "*"
},