Skip to content

Instantly share code, notes, and snippets.

Avatar
🖥️
.

Marius mkorthof

🖥️
.
View GitHub Profile
@mkorthof
mkorthof / ldbdump.py
Last active Nov 26, 2020
ldbdump - dumps LevelDB keys/values
View ldbdump.py
#!/usr/bin/python3
# ldbdump - dumps LevelDB keys/values
#
# a LevelDB is a dir with files such a these:
# 000050.ldb 000100.log CURRENT LOCK LOG MANIFEST-000099
#
# sources: https://github.com/tos-kamiya/levelobjdb dump()
import os
@mkorthof
mkorthof / sshpk.py
Last active Mar 24, 2017
sshpubkeys - shows ssh pubkey details
View sshpk.py
#!/usr/bin/env python3
# https://github.com/ojarva/python-sshpubkeys
import sys
from sshpubkeys import SSHKey
# example (error: <1024 bits)
#ssh = SSHKey("ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAYQCxO38tKAJXIs9ivPxt7AY"
# "dfybgtAR1ow3Qkb9GPQ6wkFHQqcFDe6faKCxH6iDRteo4D8L8B"
@mkorthof
mkorthof / ipv6test.sh
Last active Jan 19, 2018
ipv6test - test/show your ipv6 addr
View ipv6test.sh
#!/bin/sh
ARGS=""
if [ "$interface" ]; then ARGS="$ARGS --interface $interface"; fi
echo
for i in ipv6.test-ipv6.com/ip/\?callback=\?\&asn=1 whatismyv6.com ipv6-test.com ipv6now.com.au ipv6-speedtest.net testmyipv6.com; do
echo "Testing $i:"
#lynx -connect_timeout=5 -read_timeout=5 -dump http://$i | grep -A 2 "\(Your\? are\|Your IP\|Welcome\)" | grep -v "\(\[.*\]\|FAQ\)" | sed -e '/^$/d' -e 's/ //g'
curl -6 --connect-timeout 5 -s http://$i $ARGS | sed -e 's/<[^>]*>/ /g' | grep -A 1 "\(Your\? are\|Your IP\|Welcome\|callback\)" | grep -v "\(\[.*\]\|FAQ\|[yY]our\ browser\)"
echo
done | sed -e 's/\( *\|[(){}]\|\"[:,]\"\|"\"\)/ /g' -e '/^\( \|\r\|--\)$/d'
@mkorthof
mkorthof / sshfp.py
Created Mar 25, 2017
ssh fingerprints
View sshfp.py
#!/usr/bin/env python3
# http://stackoverflow.com/questions/6682816/deriving-an-ssh-fingerprint-from-a-public-key-in-python
import base64
import hashlib
def debug(line, field):
# try: print ("DEBUG: line.strip(): %s\n" % line.strip())
# except Exception as e: print ("ERROR: line.strip(): %s \n" % e)
@mkorthof
mkorthof / clamav-freshclam
Created Jun 14, 2017
limit freshclam memory usage (cron)
View clamav-freshclam
29 */1 * * * clamav [ -x /usr/bin/freshclam ] && { ulimit -Sm 512000; ulimit -Sv 512000; ulimit -Hm 1024000; ulimit -Hv 1024000; /usr/bin/freshclam --quiet; } > /dev/null
@mkorthof
mkorthof / pslog.sh
Last active Jan 18, 2018
logger for apache for use with openvpn + port sharing
View pslog.sh
#!/bin/sh
# pslog.sh - logger for apache for use with openvpn + port sharing
# replaces remote ip in logs with real client ip
# usage: ErrorLog "|/usr/local/bin/pslog.sh ${APACHE_LOG_DIR}/error.log"
# CustomLog "|/usr/local/bin/pslog.sh ${APACHE_LOG_DIR}/access.log" combined
# needs: openvpn server config "port-share 127.0.0.1 10443 portshare"
# this will set journal dir for tmp files (eg. /run/openvpn/portshare if chrooted)
{ test ! -z "$1" && test -w "$1"; } && logfile="$1" || exit 1
View uptime.cmd
@PowerShell -ExecutionPolicy RemoteSigned -Command Invoke-Expression $('$args=@(^&{$args} %*);'+[String]::Join(';',(Get-Content -LiteralPath '%~f0') -notmatch '^^@PowerShell.*EOF$')) & goto :EOF
$d = Get-Date
$upTime = (($d) - ([wmi]'').ConvertToDateTime((Get-WmiObject win32_operatingsystem).LastBootUpTime)).ToString("d' days, 'h\:mm")
$ActiveUsers = @()
foreach($User in (Get-WmiObject Win32_LoggedOnUser).Antecedent) { $ActiveUsers += $User.Substring($User.LastIndexOf('=') + 2, $User.Length - $User.LastIndexOf('=') -3) }
$UserText = "$($ActiveUsers.Count) user"
if ( $ActiveUsers.Count -gt 1 ) { $UserText += "s" }
$TotalProcTime = (Get-Counter "\Processor(_total)\% Processor Time") | foreach {$_.CounterSamples[0].CookedValue}
@mkorthof
mkorthof / vboxsave.bat
Created Aug 24, 2017
VirtualBox savestate all running VM's (Windows)
View vboxsave.bat
@echo off
:: https://superuser.com/questions/959567/virtualbox-windows-graceful-shutdown-of-guests-on-host-shutdown
SET "LOG=0"
SET "LOGFILE=%~dp0%vboxsave.log"
SET VBoxManage="%ProgramFiles%\Oracle\VirtualBox\VBoxManage.exe"
IF "%~1"=="LOG" ( SET "LOG=1" )
IF EXIST "%LOGFILE%.tmp" ( del %LOGFILE%.tmp )
IF %LOG% EQU 1 ( CALL :msg logging is enabled )
@mkorthof
mkorthof / ipset-logpat.sh
Last active Jan 18, 2018
creates ipset sets matching certain patterns in httpd logs
View ipset-logpat.sh
#!/bin/bash
# ipset-logpat
# searches httpd access logs for pattern, whoises matching ip's and uses
# ip blocks to create ipset set. also adds iptables rules to log and reject
# requires: iptables, ipset, aggregate (optional)
# other useful ipset commands: ipset list [-terse], ipset destroy
# more info: