I hereby claim:
- I am jlamendo on github.
- I am ljon (https://keybase.io/ljon) on keybase.
- I have a public key whose fingerprint is 2BFF 6E0E 13E4 D2A0 5532 3161 63A5 7AA5 A585 E664
To claim this, I am signing this object:
defaults { | |
verbosity 2 | |
polling_interval 10 | |
uid_attribute "ID_SERIAL" | |
checker_timeout 90 | |
} | |
devices { | |
device { | |
vendor "DELL" | |
product "Shared PERC8" |
FROM ubuntu:18.04 | |
RUN apt-get update\ | |
&& apt-get install -y wget xz-utils build-essential curl git subversion make g++ python chrpath libicu-dev lsb-release \ | |
&& apt-get clean\ | |
&& rm -rf /var/lib/apt/lists/* \ | |
&& curl -SL http://releases.llvm.org/7.0.1/clang+llvm-7.0.1-x86_64-linux-gnu-ubuntu-18.04.tar.xz | tar -xJC . \ | |
&& mv clang+llvm-7.0.1-x86_64-linux-gnu-ubuntu-18.04 /usr/share/clang_7.0.1 \ | |
&& echo 'export PATH="/usr/share/clang_7.0.1/bin:$PATH"' >> ~/.bashrc \ | |
&& echo 'export LD_LIBRARY_PATH="/usr/share/clang_7.0.1/lib:LD_LIBRARY_PATH"' >> ~/.bashrc\ |
#cloud-config | |
chpasswd: | |
list: | | |
root:stackops | |
cloud-user:stackops | |
expire: False | |
ssh_pwauth: True |
// yes this is vulnerable to command injection, | |
// because if you want to paste bash code to download a linux wannacry port into the llvm_version arg, that's your prerogative. | |
llvm_version=process.argv[2]; | |
exec=require("child_process").exec; | |
var install_script = ` | |
sudo apt-get update -y && apt-get install -y clang-${llvm_version} libclang${llvm_version}-dev libclang-common-${llvm_version}-dev clang-format-${llvm_version} &&\ | |
sudo update-alternatives --install \ | |
/usr/bin/llvm-config llvm-config /usr/bin/llvm-config-${llvm_version} 200 \ | |
--slave /usr/bin/llvm-ar llvm-ar /usr/bin/llvm-ar-${llvm_version} \ | |
--slave /usr/bin/llvm-as llvm-as /usr/bin/llvm-as-${llvm_version} \ |
#!/usr/bin/perl -w | |
use strict; | |
# unchroot.pl Dec 2007 | |
# http://pentestmonkey.net/blog/chroot-breakout-perl | |
# This script may be used for legal purposes only. | |
# Go to the root of the jail | |
chdir "/"; |
#!/usr/bin/env bash | |
SW_HOME="$HOME/.bash_it" | |
sudo apt-get install git \ | |
&& git clone --depth=1 "https://github.com/Bash-it/bash-it.git" "${SW_HOME}" \ | |
&& chmod +x "${SW_HOME}/install.sh" \ | |
&& "${SW_HOME}/install.sh" --interactive | |
mkdir -p "${SW_HOME}/aliases" && touch "${SW_HOME}/aliases/custom.aliases.bash" | |
mkdir -p "${SW_HOME}/completion" && touch "${SW_HOME}/completion/custom.completion.bash" |
function parseArgs(){ | |
var opts_a=process.argv.slice(1,process.argv.length) | |
var opts={}; | |
var prevArg=false; | |
opts_a.forEach(function(val,i){ | |
var isFlag = ((val[0] === "-" && val[1] === "-" ) || ( val.length=2 && val[0] === "-")) | |
if(isFlag){ | |
opts[val]="true"; | |
prevArg=val; | |
} else if(prevArg !== false) { |
javascript:!function(){x=document.getElementsByClassName("PMsgContainer");var e,d=Object.keys(x);d.forEach(function(d){-1!==d.indexOf("__w2")&&(e=x[d])});var n=e.parentElement.childNodes[1].childNodes[0].childNodes[0],o=n.childNodes[0];n.removeChild(o)}(); |
window.uriFuzz = function() { | |
var getUriDirective = function() { | |
return ['mp-app', | |
'mp-app-forward', | |
'mp-app-show-original', | |
'mp-app-open-draft', | |
'mp-app-signature', | |
'mp-app-file', | |
'mp-app-file-remove', | |
'mp-delete-draft', |
I hereby claim:
To claim this, I am signing this object: