Skip to content

Instantly share code, notes, and snippets.

@mikemadden42
mikemadden42 / update_rust.sh
Created January 6, 2021 01:03
Update rust toolchain
#!/bin/sh
rustup self update
rustup update
rustup component add clippy --toolchain stable-x86_64-apple-darwin
rustup component add rls rust-analysis rust-src --toolchain stable-x86_64-apple-darwin
rustup component add rustfmt --toolchain stable-x86_64-apple-darwin
@mikemadden42
mikemadden42 / brew.txt
Created November 23, 2020 02:17
Using brew
# install brew
/usr/bin/ruby -e "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/master/install)"
# list cache location
brew --cache
# list cellar location
brew --cellar
# list prefix location
@mikemadden42
mikemadden42 / numfmt.txt
Created November 17, 2020 02:06
Using numft
$ du -s
113901604 .
$ numfmt --to=si 113901604
114M
$ numfmt --to=iec 113901604
109M
$ numfmt --to=iec-i 113901604
@mikemadden42
mikemadden42 / dfir-books.txt
Created November 17, 2020 02:03
DFIR Books
Applied Incident Response 1st Edition
https://amzn.to/3iKc0Tw
Incident Response & Computer Forensics, Third Edition 3rd Edition
https://amzn.to/3myA7a6
Intelligence-Driven Incident Response: Outwitting the Adversary 1st Edition
https://amzn.to/3ksSJq7
Crafting the InfoSec Playbook: Security Monitoring and Incident Response Master Plan 1st Edition
@mikemadden42
mikemadden42 / ripgrep.txt
Created November 17, 2020 02:02
Using ripgrep
-n - Show line numbers.
-w - Only show matches surrounded by word boundaries.
-l - Only print the paths with at least one match.
-C - Show NUM lines before and after each match.
-i - When this flag is provided, the given patterns will be searched case insensitively.
-v - Invert matching.
@mikemadden42
mikemadden42 / robocopy.txt
Created November 17, 2020 02:02
Using robocopy
https://stackoverflow.com/questions/9981437/robocopy-xash-to-exclude-system-hidden-directories
https://adamtheautomator.com/robocopy-the-ultimate/
@mikemadden42
mikemadden42 / go-sre.txt
Created November 17, 2020 02:01
Go SRE
https://blog.osiris.cyber.nyu.edu/2019/12/19/go-deepdive/
https://blog.osiris.cyber.nyu.edu/2019/12/19/ugo-ghidra-plugin/
https://blog.malwarebytes.com/threat-analysis/2019/01/analyzing-new-stealer-written-golang/
https://www.intezer.com/blog/research/kaiji-new-chinese-linux-malware-turning-to-golang/
https://cyware.com/news/an-overview-of-the-recent-wave-of-malware-written-in-golang-fa80a815
https://gbhackers.com/snake-ransomware/
https://blogs.quickheal.com/jcry-ransomware-written-golang/
https://www.guardicore.com/2020/08/fritzfrog-p2p-botnet-infects-ssh-servers/
https://unit42.paloaltonetworks.com/the-gopher-in-the-room-analysis-of-golang-malware-in-the-wild/
https://medium.com/@tapendradev/golang-the-new-malware-language-94097baae223
@mikemadden42
mikemadden42 / amass.txt
Created November 17, 2020 02:00
Using amass
amass enum --passive -d example.com
amass enum --passive -d example.com -o elastic.co.txt
amass enum --passive -d example.com -json elastic.co.json
@mikemadden42
mikemadden42 / linpack-benchmarks.txt
Last active November 8, 2020 22:05
My linpack Benchmarks
#### 2019 MacBook Pro - 16-inch ####
linpack
Memory required: 315K.
LINPACK benchmark, Double precision.
Machine precision: 15 digits.
Array size 200 X 200.
Average rolled and unrolled performance:
brew
chflags
defaults
diskutil
ditto
dscl
hdiutil
hostinfo
launchctl
leaks