Skip to content

Instantly share code, notes, and snippets.

View jgamblin's full-sized avatar

Jerry Gamblin jgamblin

View GitHub Profile
@jgamblin
jgamblin / smalltalk.txt
Created July 18, 2017 11:34
Small Talk Quetions
What was your favorite toy growing up?
What accomplishment are you most proud of?
Which of your friends are you proudest of? Why?
What is the most beautiful place you’ve ever been?
What are your 3 favorite movies?
Who are the 3 greatest living musicians?
What is a great book you’ve read recently?
Do you feel like a leader at your compnay?
What is the most courageous thing you’ve ever done?
Who is the funniest person you know?
@jgamblin
jgamblin / godaddydns.sh
Created July 12, 2017 11:11
Shell Script To Automatically Create A DNS A Record in Godaddy.
#!/bin/bash
DOMAIN=jgamblin.com
RECORD_NAME=newproject
GODADDY_API_KEY=(Get from devloper.godaddy.com)
GODADDY_API_SECRET=(Get from devloper.godaddy.com)
# Get IP Address
IP=`dig +short myip.opendns.com @resolver1.opendns.com`
# Create DNS A Record
@jgamblin
jgamblin / vtslack.py
Last active November 15, 2021 05:02
Scan a Folder and Upload VT Findings to Slack.
#!/usr/bin/env python
import os
import sys
import json
import urllib
import urllib2
import hashlib
import argparse
from slacker import Slacker
@jgamblin
jgamblin / speed.py
Created June 23, 2017 19:11
Simple Script To Run A Speedtest And Write Results To CSV.
#!/usr/bin/python
import os
import sys
import csv
import datetime
import time
#run speedtest-cli
print 'running test'
speed = os.popen("speedtest-cli --simple").read()
@jgamblin
jgamblin / 500Error.txt
Created June 16, 2017 15:16
500 Error
500 Internal Server Error
Sorry, something went wrong.
A team of highly trained monkeys has been dispatched to deal with this situation.
If you see them, send them this information as text (screenshots frighten them):
APCGX7oKAttIehx6xAconpAyr-1lolSFG2NevUfn7t7cl6TO7pzzG0d nUMTi4eBix5BUm40U8GwAGSWvuK7Q5H1Wz7Cn7Z4W7HS0PJhweMP5fuv 1Up0UKysjmA-xA9ZcevUbzlxjW0ygcqDcHZxQK_3ZXYtqtLnhw50y4wo IZmize6FnWmeQ4Ktb9UzRcUVcYmCDa_R-ZFuen8lUCMNo1do4d0-pYYa eqjPN3Rr-5lmjOxi6jaEVA5XSp1_KN0Ul16pJ3Vs2w6uF67qHPc9FB59 562GOrZLqqwG0xEO3CduUx2gdYLtt7531MjTkHn1lWNrJ1x0gLIYRDST mIw-hh5II9OVdg4V9U0RNcuNNKLoZcsDGSv5TvTjOSI0fku9Z-nubDIT OmU76mOt_CG1wbx0yPV6zCBRuOrlOY65BYJDCzA8AOOvBtY1lW4Q_oQq fCSQkohUi0X9M34I8CUbiyaq1Ss90e5-p4ih-n0MyRd8o93IxzrP0-Eg uwIkL8uSSfyG9Q0tYqx-xsdbTMVivDbwa-GNxc8jbr32CFv2Q9LVXHcV kdxsG_NrdpxX4AzIYo4sXDT0hmfvKUs2GQL3yS7HuBai9qRTHSwccd_U xGYnNPdddNw_zXA01t1G6yf3edex3Wz24tvsC_VRFwXxmygj2I967YOH mq-AXKaZJGM2gJPyGk2KzGh4_hDwpqldjT2qlBGE7Eavcd6SeMtTk6q ImHvFRLi3-AmyZV7pUKHwiMwQ3_Xe2NIQcZuH6AkFjBbkWtrbBWXmDI9 ftz4CFyeV
@jgamblin
jgamblin / md5.sh
Last active May 31, 2019 18:03
MD5 CSV
sudo find ~/ -type f -print0 | xargs -0 md5 | sed 's/\MD5 (//g' | sed 's/) = /,/g' > ~/Desktop/md5.csv
@jgamblin
jgamblin / kimchi.sh
Last active June 12, 2017 12:53
Wok+Kimchi
#!/bin/bash
apt-get update && apt-get upgrade -y
apt-get -y install qemu qemu-kvm libvirt-bin ubuntu-vm-builder bridge-utils nginx python-cherrypy3 python-jsonschema python-m2crypto nginx python-ldap python-psutil fonts-font-awesome texlive-fonts-extra python-configobj python-parted sosreport python-imaging websockify novnc nfs-common python-ethtool open-iscsi python-guestfs libguestfs-tools spice-html5 python-paramiko
wget http://kimchi-project.github.io/kimchi/downloads/latest/kimchi.noarch.deb
wget http://kimchi-project.github.io/wok/downloads/latest/wok.noarch.deb
wget http://kimchi-project.github.io/gingerbase/downloads/latest/ginger-base.noarch.deb
dpkg -i wok.noarch.deb
apt-get install -f -y
dpkg -i ginger-base.noarch.deb
apt-get install -f -y
@jgamblin
jgamblin / cowrie.sh
Last active May 31, 2019 18:04
Cowrie
#!/bin/bash
# tested on AWS: Ubuntu 14.04.5 LTS
#
set -e
set -x
if [ $# -ne 2 ]
then
@jgamblin
jgamblin / MS17010.sh
Created May 15, 2017 14:12
A simple script to check your network for MS17-010 vulnerability using NMAP.
#!/bin/bash
ip=$1
cd ~/Desktop
mkdir MS17010
cd MS17010
wget https://raw.githubusercontent.com/cldrn/nmap-nse-scripts/master/scripts/smb-vuln-ms17-010.nse
nmap -oN MS17010.txt -p 445 --script "smb-vuln-ms17-010.nse" $ip
library(leaflet)
library(tidyverse)
library(httr)
library(rvest)
library(jsonlite)
library(ipapi)
#devtools::install_github("hrbrmstr/ipapi")
#Find geo Containing Key Word