Skip to content

Instantly share code, notes, and snippets.

View joseb0rges's full-sized avatar
:electron:
Focusing

José Borges joseb0rges

:electron:
Focusing
View GitHub Profile
@joseb0rges
joseb0rges / vhost_traffic_status - NGINX.md
Last active May 25, 2018 03:07
vhost_traffic_status - NGINX.md

Module installation procedure - vhost_traffic_status - NGINX

# - Dependencies

yum -y install gcc gcc-c++ make zlib-devel pcre-devel openssl-devel geoip-devel

# - Download Packages

# - nginx-module-vts

@joseb0rges
joseb0rges / Creating Nginx RPM Package with Status Modules.md
Last active November 2, 2023 09:15
Creating Nginx RPM Package with Status Modules.md

Creating Nginx RPM Package with Status Modules

# - Dependencies

yum -y install gcc gcc-c++ make zlib-devel pcre-devel openssl-devel geoip-devel rpm-build

# - Creating user to perform this process, as the same is not recommended with root user:

useradd -m rpmbuilder
@joseb0rges
joseb0rges / PlayBook_Wildfly
Created December 28, 2018 21:08
PlayBook_Wildfly
---
- hosts: tux
tasks:
- name: Install Java 1.8
yum: name={{item}} state=present
with_items:
- java-1.8.0-openjdk
- name: "Instala o wget e unzip"
@joseb0rges
joseb0rges / Change_Account - Zimbra .py
Created January 12, 2019 22:38
Change_Account - Zimbra .py
#!/usr/bin/env python
##
# Script Em pyhon
# Autor -> José Borges
##
import os
import csv
#!/bin/bash
echo "Inform the user:"
read user
for cmds in `cat comands.txt`
do
setfacl -m u:$user:r-- `which $cmds`
@joseb0rges
joseb0rges / multibranch_jenkins.groovy
Last active May 15, 2021 14:51
Script_Groovy_Multibranch
node {
stage('checkout') {
checkout scm
}
stage('deploy') {
echo 'branch name ' + env.BRANCH_NAME
if (env.BRANCH_NAME.startsWith("Feature_")) {
sh "mvn sonar:sonar"
from pyArchery import api
from optparse import OptionParser, OptionGroup
import json
import time
parser = OptionParser()
group = OptionGroup(parser, "",
"")
parser.add_option_group(group)
@joseb0rges
joseb0rges / Scanner_Full_Owasp.py
Last active June 20, 2021 21:57
Script scanner with attack spider and active.
#!/usr/bin/env python
import time
import urllib.parse
from zapv2 import ZAPv2
from pprint import pprint
apikey = ''
context_name = 'Scan_Full'
target_url = 'http://demo.testfire.net'
include_url = ['http://demo.testfire.net.*']
login_url = 'http://demo.testfire.net/login.jsp'