This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/python | |
| # Quick and dirty demonstration of CVE-2014-0160 by Jared Stafford (jspenguin@jspenguin.org) | |
| # The author disclaims copyright to this source code. | |
| # Based off of https://gist.github.com/sh1n0b1/10100394 | |
| import sys | |
| import struct | |
| import socket | |
| import time |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/expect -f | |
| # This script creates an interactive session on a remote server | |
| # Example usage: logmein 192.168.1.11 | |
| # Arguments: | |
| # ip_address = IP Address to connect to | |
| # Process CL arguments - password must use lindex because lrange messes with password when special characters are escaped | |
| set target [lindex $argv 0] |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/expect -f | |
| # This script creates an interactive session on a remote server | |
| # Example usage: logmein 192.168.1.11 | |
| # Arguments: | |
| # ip_address = IP Address to connect to | |
| # Process CL arguments - password must use lindex because lrange messes with password when special characters are escaped | |
| set target [lindex $argv 0] |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/env bash | |
| # http://superuser.com/questions/109213/is-there-a-tool-that-can-test-what-ssl-tls-cipher-suites-a-particular-website-of | |
| # OpenSSL requires the port number. | |
| SERVER=$1 | |
| DELAY=0 | |
| ciphers=$(openssl ciphers 'ALL:eNULL' | sed -e 's/:/ /g') | |
| echo Obtaining cipher list from $(openssl version). |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| printf '%q ' $(cat temp) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| From https://discussions.apple.com/thread/6619535 | |
| by tywebb13 | |
| If you prefer to make a bootable dvd, you can do it this way: | |
| After downloading the full Yosemite installer app from the Mac App Store, run these 14 commands in Terminal to create a Yosemite.iso file and then burn it to a dual layer DVD with Disk Utility. You may then boot up from it by holding the option key down and then install Yosemite. | |
| hdiutil attach /Applications/Install\ OS\ X\ Yosemite.app/Contents/SharedSupport/InstallESD.dmg -noverify -nobrowse -mountpoint /Volumes/install_app | |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| --- | |
| name: "null" | |
| director_uuid: 12345 | |
| releases: [] | |
| networks: | |
| - name: default | |
| type: dynamic |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| function aws_who_am_i_usage() { | |
| printf " | |
| aws_who_am_i | |
| - with no args: who is the user that the ENV currently refers to (AWS_ACCESS_KEY_ID / AWS_SECRET_ACCESS_KEY / AWS_DEFAULT_REGION) | |
| - with 1 arg: provide a filename that can be sourced that has the above environment variables | |
| - with 2 args: aws_who_am_i AWS_ACCESS_KEY_ID AWS_SECRET_ACCESS_KEY | |
| " | |
| } | |
| function aws_who_am_i() { |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/env ruby | |
| # Usage: ./download_scripts_and_templates <repo> <ref> | |
| # Output: Directory of download | |
| require 'bundler/setup' | |
| require 'logger' | |
| require 'octokit' | |
| require 'base64' | |
| def prereqs |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/bin/bash | |
| JOB_NAME=app | |
| RUN_DIR=/var/vcap/sys/run/$JOB_NAME | |
| LOG_DIR=/var/vcap/sys/log/$JOB_NAME | |
| CONFIG_DIR=/var/vcap/jobs/$JOB_NAME/config | |
| EPHEMERAL=/var/vcap/data/$JOB_NAME | |
| PERSISTENT=/var/vcap/store/$JOB_NAME | |
| PIDFILE=$RUN_DIR/$JOB_NAME.pid | |
| RUNAS=vcap |