Skip to content

Instantly share code, notes, and snippets.

View tlongren's full-sized avatar
🎯
Focusing

Tyler Longren tlongren

🎯
Focusing
View GitHub Profile
@schappim
schappim / just_f-ing_ping.md
Last active February 17, 2024 06:15
Just F-ing Ping - Because sometimes you just want to f-ing ping!

Just F-ing Ping

Because sometimes you just want to f-ing ping!

Modern browsers, believing they are being clever, hide the protocol in the URL bar.

image

However, even if you only select the hostname, when you paste that URL into your terminal, you will encounter the following:

image

@tylergets
tylergets / setup.sh
Created April 28, 2022 11:44
Ubuntu 21.04 Server Setup
#!/bin/bash
# Tailscale Setup
curl -fsSL https://pkgs.tailscale.com/stable/ubuntu/hirsute.noarmor.gpg | sudo tee /usr/share/keyrings/tailscale-archive-keyring.gpg >/dev/null
curl -fsSL https://pkgs.tailscale.com/stable/ubuntu/hirsute.tailscale-keyring.list | sudo tee /etc/apt/sources.list.d/tailscale.list
apt-get update
apt-get install tailscale
tailscale up
# Docker Install
@simonesestito
simonesestito / README.md
Last active February 28, 2024 15:54
Server setup script

Server initial setup script

Configuration

This script was made for personal purposes, but it can still be useful to many. You NEED to change variables inside the script, like the SSH public key.

Usage

On a new Ubuntu server, run the following command:

@ThEMarD
ThEMarD / flash-all.sh
Created January 13, 2021 09:08
flash all script for payton pie
#!/bin/sh
# Copyright 2012 The Android Open Source Project
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
@lewixlabs
lewixlabs / TL-WN722N_monitormode.sh
Last active March 29, 2024 10:43
How to enable monitor mode for TP-LINK TL-WN722N V2/V3/Vx
# Credits:
# - https://www.hackster.io/thatiotguy/enable-monitor-mode-in-tp-link-tl-wn722n-v2-v3-128fc6
# - https://github.com/aircrack-ng/rtl8188eus/issues/234
# Tested on Kali Linux 2022.3
# Commands used to Setup the Adapter from aircrack repository
sudo apt update
sudo apt install bc -y
sudo rmmod r8188eu.ko
git clone https://github.com/gglluukk/rtl8188eus
cd rtl8188eus
@tlongren
tlongren / output.txt
Created August 19, 2020 08:12
Payton Blankflash Success
tyler:blankflash/ $ sudo ./qboot blank-flash $* [3:09:51]
Motorola qboot utility version 3.86
[ 0.000] Opening device: /dev/ttyUSB0
[ 0.000] Detecting device
[ 0.003] ...cpu.id = 172 (0xac)
[ 0.003] ...cpu.sn = 1271461894 (0x4bc8f806)
[ 0.003] Opening singleimage
[ 0.199] Loading package
[ 0.210] ...filename = pkg.xml
[ 0.216] Loading programmer
@rudolfschmidt
rudolfschmidt / free-3-letter-domains.sh
Created June 2, 2020 21:04
Check Free 3 Letter Domains
#!/usr/bin/env bash
array=( a b c d e f g h i j k l m n o p q r s t u v w x y z )
for a in "${array[@]}"
do
for b in "${array[@]}"
do
for c in "${array[@]}"
do
sshuttle:
pkg.installed: []
group.present:
- gid: 2024
user.present:
- fullname: sshuttle
- uid: 2024
- gid: 2024
- allow_uid_change: True
@brasey
brasey / Configure systemd-resolved to use a specific DNS nameserver for a given domain.md
Created October 25, 2019 14:38
Configure systemd-resolved to use a specific DNS nameserver for a given domain

Configure systemd-resolved to use a specific DNS nameserver for a given domain

Use case

Given

  • I use a VPN to connect to my work network
  • I'm on a Linux computer that uses systemd-resolved
  • I have a work domain called example.com
  • example.com is hosted by both public and private DNS nameservers

Recon and Attack Vectors from My Logs

This document contains excerpts from my web server logs collected over a period of 7 years that shows various kinds of recon and attack vectors.

There were a total of 37.2 million lines of logs out of which 1.1 million unique HTTP requests (Method + URI) were found.

$ sed 's/^.* - - \[.*\] "\(.*\) HTTP\/.*" .*/\1/' access.log > requests.txt