Skip to content

Instantly share code, notes, and snippets.

View mrowell's full-sized avatar

Marcus Rowell mrowell

View GitHub Profile
# Setup code-server on macos 10.15.x
https://github.com/cdr/code-server
Download a release binary for macOS
wget https://github.com/cdr/code-server/releases/download/v3.4.1/code-server-3.4.1-macos-amd64.tar.gz
# Unzip and put it someplace
tar -zxf ~/Downloads/code-server-3.4.1-macos-amd64.tar.gz -C ~/
@BasvanH
BasvanH / prtg-advanced-sensor-veeam-backup-office365-monitor.ps1
Last active February 15, 2024 15:45
PRTG Advanced sensor for Veeam Backup for Microsoft 365
<#
.SYNOPSIS
PRTG Veeam Backup for Microsoft 365 Advanced Sensor.
.DESCRIPTION
Advanced Sensor will Report Job status, job nested status, repository statistics and proxy status.
- If not already done, enable the the API in VBO https://helpcenter.veeam.com/docs/vbo365/rest/enable_restful_api.html?ver=20
- On your probe, add script to 'Custom Sensors\EXEXML' folder
- In PRTG, on your probe add EXE/Script Advanced sensor
@calum-github
calum-github / ad_check.sh
Created May 9, 2018 07:08
checks to see if its bound to AD or not.
#!/bin/bash
#################################################################################
# #
# Author: Calum Hunter #
# Date: 22-08-2016 #
# Version: 1.0 #
# Purpose: Install check script for the AD Bind Package. #
# This script checks to see if we are bound to AD and if our binding #
# is working. If we are not bound, or our binding is broken. #
@ygini
ygini / Reversing 10.13 RootGate, hands notes.md
Last active February 20, 2021 20:26
Work in progress, notes for the current state

Reversing 10.13 RootGate, hands notes

Inital discovery process

Original state of the root.plist

Dict {
    smb_sid = Array {
        S-1-5-18
@pudquick
pudquick / mount_shares_better.py
Last active January 19, 2023 22:07
Mounting shares in OS X using python and pyobjc - works with OS X 10.8+
import objc, CoreFoundation, Foundation
class attrdict(dict):
__getattr__ = dict.__getitem__
__setattr__ = dict.__setitem__
NetFS = attrdict()
# Can cheat and provide 'None' for the identifier, it'll just use frameworkPath instead
# scan_classes=False means only add the contents of this Framework
NetFS_bundle = objc.initFrameworkWrapper('NetFS', frameworkIdentifier=None, frameworkPath=objc.pathForFramework('NetFS.framework'), globals=NetFS, scan_classes=False)
@arubdesu
arubdesu / killUnauthorizedAdminUsers.py
Last active October 3, 2017 03:19
dscl+python for common tasks
#!/usr/bin/python
import subprocess
import sys
from SystemConfiguration import *
# grab who our logging in user is
cur_console_user = SCDynamicStoreCopyConsoleUser(None, None, None)[0]
# check admin group
cmd = '/usr/bin/dscl', '.', 'list', '/Groups/admin'
out = subprocess.check_output(cmd)
# split output into list of strings for the usernames
@bryanzak
bryanzak / ARDFixer.command
Last active March 3, 2017 05:36
ARD Admin 3.7.1 Fixer - a script to cause ARD Admin to effectively "forget" all cached IP and DNS information for known computers. This deals with a problem in ARD Admin 3.7.1 where it seems to be too aggressive in caching this information
#!/bin/bash
SCRIPT_VERSION="1.0"
# some background info here: https://discussions.apple.com/message/24596710#24596710
# verify ARD Admin version
# quit ARD Admin - if running, wait 10 seconds
# kill cfprefsd
# rename plist
# sed
@ccstone
ccstone / BBEdit-TextWrangler_RegEx_Cheat_Sheet.txt
Last active May 10, 2024 15:41
BBEdit-TextWrangler Regular Expression Cheat-Sheet
————————————————————————————————————————————————————————————————————————————————————————————————————
BBEdit / BBEdit-Lite / TextWrangler Regular Expression Guide Modified: 2018/08/10 01:19
————————————————————————————————————————————————————————————————————————————————————————————————————
NOTES:
The PCRE engine (Perl Compatible Regular Expressions) is what BBEdit and TextWrangler use.
Items I'm unsure of are marked '# PCRE?'. The list while fairly comprehensive is not complete.
@titanous
titanous / splunk.rb
Created November 7, 2011 20:52
Splunk search API client
require 'httparty'
class Splunk
include HTTParty
base_uri 'https://YOUR_SPLUNK_SERVER:8089/services'
def initialize(username, password)
@auth = { :username => username, :password => password }
end