Skip to content

Instantly share code, notes, and snippets.

2019/08/05 11:07:44 [INFO] Terraform version: 0.12.6
2019/08/05 11:07:44 [INFO] Go runtime version: go1.12.4
2019/08/05 11:07:44 [INFO] CLI args: []string{"/usr/local/bin/terraform", "init"}
2019/08/05 11:07:44 [DEBUG] Attempting to open CLI config file: /Users/robison/.terraformrc
2019/08/05 11:07:44 Loading CLI configuration from /Users/robison/.terraformrc
2019/08/05 11:07:44 [INFO] CLI command args: []string{"init"}
panic: inconsistent list element types (cty.Object(map[string]cty.Type{"name":cty.String, "records":cty.List(cty.String), "ttl":cty.Number, "type":cty.String}) then cty.Object(map[string]cty.Type{"name":cty.String, "records":cty.List(cty.String), "ttl":cty.DynamicPseudoType, "type":cty.String}))
goroutine 1 [running]:
github.com/zclconf/go-cty/cty.ListVal(0xc00009f7a0, 0x3, 0x3, 0xc0004d1ef0, 0xc0004a59f0, 0x1, 0x1)
#!/bin/sh
OLDIFS=$IFS
IFS=$'\n\t'
for commit in $( git fsck --unreachable HEAD | awk '$2 == "commit" {print substr($3,1,7)}' )
do
printf "\nGit orphan: ${commit}\n"
printf "%s\n" $( TZ=UTC git log -1 --date=iso-local --pretty=format:"parents: %<(24)%porphan: %<(10)%h%<(30)%an%<(26)%ad%s" ${commit} )
parents=()
IFS=$' \n\t'
for parent in $( git log -1 --pretty=format:"%p" ${commit} )

Keybase proof

I hereby claim:

  • I am robison on github.
  • I am robison (https://keybase.io/robison) on keybase.
  • I have a public key ASAJhP_LLHPMKiumdfuuYOY0ePxqi77mnIQk6Unc4G-oHAo

To claim this, I am signing this object:

@robison
robison / modsec_audit.lua
Last active November 6, 2015 19:01
Lua/LPEG grammar for parsing modsec_audit.log files, generated by mod_security
-- This Source Code Form is subject to the terms of the Mozilla Public
-- License, v. 2.0. If a copy of the MPL was not distributed with this
-- file, You can obtain one at http://mozilla.org/MPL/2.0/.
--[[
Parses modsec_audit.log formatted message into Heka message Fields.
Config:
- hostname_keep (boolean, defaults to false)
@robison
robison / cardiac.py
Last active August 29, 2015 13:58
Dump payloads containing SSL private keys, "login", or arbitrary strings.
#!/usr/bin/python
# Update of http://www.exploit-db.com/exploits/32745/ to search for arbitrary data
# Original: Quick and dirty demonstration of CVE-2014-0160 by Jared Stafford (jspenguin@jspenguin.org)
# Updated: robison@packetized.io
# The author disclaims copyright to this source code.
import sys
import struct
import socket
@robison
robison / hbtest.py
Last active August 29, 2015 13:58
quick update of http://www.exploit-db.com/exploits/32745/ to support an inputfile consisting of line-separated hostnames/IPs to check
import gevent.monkey
gevent.monkey.patch_socket()
gevent.monkey.patch_select()
import gevent
import select
import socket
import struct
import sys
import time
from optparse import OptionParser

Keybase proof

I hereby claim:

  • I am robison on github.
  • I am robison (https://keybase.io/robison) on keybase.
  • I have a public key whose fingerprint is 7B3D 9F8D 8D12 6EF8 115C 9B25 F227 43EE 9193 74D4

To claim this, I am signing this object: