Skip to content

Instantly share code, notes, and snippets.

@johnalvero
johnalvero / vpcstart.sh
Last active December 24, 2015 19:59
Auto start/install Amavon VPC IPSec.
#!/bin/bash
#
# Setup a VPC IPSEC connectivity
# Oct 5, 2013
exec 2>&1
error() {
echo "$@" >&2
exit 1
#!/usr/bin/env perl
# Ubuntu: apt-get install libanyevent-aggressiveidle-perl liblinux-inotify2-perl libnet-amazon-s3-perl
use strict;
use warnings;
use utf8;
use AnyEvent;
use Linux::Inotify2;
use File::Find;
@johnalvero
johnalvero / jumpshell
Created November 16, 2014 09:10
jumpshell
#!/bin/bash
# SSH Menu for bastion servers
# John Alvero
# 2014 Nov 16
#
# To use, just set the user's shell to this script like so
# jump:x:100:100::/home/jump:/opt/bin/jumpshell
function valid_host()
{
#!/usr/bin/perl
# John Homer Alvero
# May 2016
# SESsender.pl
#
# Usage: cat input.csv | ./SESsender.ph
use MIME::Entity;
use Net::AWS::SES;
@johnalvero
johnalvero / log4j_rce_detection.md
Created December 13, 2021 09:03 — forked from Neo23x0/log4j_rce_detection.md
Log4j RCE CVE-2021-44228 Exploitation Detection

log4j RCE Exploitation Detection

You can use these commands and rules to search for exploitation attempts against log4j RCE vulnerability CVE-2021-44228

Grep / Zgrep

This command searches for exploitation attempts in uncompressed files in folder /var/log and all sub folders

sudo egrep -I -i -r '\$(\{|%7B)jndi:(ldap[s]?|rmi|dns|nis|iiop|corba|nds|http):/[^\n]+' /var/log