Skip to content

Instantly share code, notes, and snippets.

View okoeroo's full-sized avatar

Oscar Koeroo okoeroo

View GitHub Profile
@okoeroo
okoeroo / log4j_rce_check.py
Created December 10, 2021 22:38 — forked from byt3bl33d3r/log4j_rce_check.py
Python script to detect if an HTTP server is potentially vulnerable to the log4j 0day RCE (https://www.lunasec.io/docs/blog/log4j-zero-day/)
#! /usr/bin/env python3
'''
Needs Requests (pip3 install requests)
Author: Marcello Salvati, Twitter: @byt3bl33d3r
License: DWTFUWANTWTL (Do What Ever the Fuck You Want With This License)
This should allow you to detect if something is potentially exploitable to the log4j 0day dropped on December 9th 2021.
@okoeroo
okoeroo / install_nginx_vim.sh
Created September 2, 2017 16:57 — forked from 2called-chaos/install_nginx_vim.sh
enable nginx vim syntax highlighting (on Ubuntu/Debian)
#!/bin/sh
mkdir -p ~/.vim/syntax/
cd ~/.vim/syntax/
wget http://www.vim.org/scripts/download_script.php?src_id=19394
mv download_script.php\?src_id\=19394 nginx.vim
cat > ~/.vim/filetype.vim <<EOF
au BufRead,BufNewFile /etc/nginx/*,/usr/local/nginx/conf/* if &ft == '' | setfiletype nginx | endif
EOF
### Keybase proof
I hereby claim:
* I am okoeroo on github.
* I am okoeroo (https://keybase.io/okoeroo) on keybase.
* I have a public key whose fingerprint is 4E79 73DE 1730 3F23 3D07 08B2 D5D9 0C2F 3AA6 D88C
To claim this, I am signing this object: