Skip to content

Instantly share code, notes, and snippets.


Block or report user

Report or block versionsix

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
inntran /
Last active Jul 23, 2019
To configure IPv6 NPTv6 on Linux to allow more hosts behind Verizon Wireless LTE IPv6 single /64 prefix


Verizon Wireless assigns you ONE IPv4 address and ONE /64 IPv6 prefix for their cellular service, and VZW would reset your datalink once they received 1 packet with an illegal source address.

We have NAT for IP but for IPv6 we would like to avoid address translation to get some kind of end-to-end communication.


NPTv6, defined in RFC6296, would help us to do stateless prefix translation for IPv6.

smoser / .gitignore
Last active Feb 14, 2020
cloud-init ubuntu nocloud example with network config
View .gitignore
danehans / jool.MD
Last active Sep 24, 2019
Jool NAT64
View jool.MD

Note: Dues to Jool's GRO offload limitation, it can not be used in cloud environments such as GCE.

Jool NAT64 (WIP)

NAT64 runs on an Ubuntu 16.04.2 host and is implemented using Jool v3.5.4. Start by installing the Jool dependencies:

sudo apt-get update && sudo apt-get install -y zip gcc make linux-headers-$(uname -r) dkms \
pkg-config libnl-genl-3-dev autoconf
nottrobin /
Last active Jan 15, 2020
To clean out a Juju model so you can use it from scratch, without deleting and recreating it
# Clear out a model, for Juju 2
# ==
# Destroy all machines and remove applications
# --
clean_model() {
juju status --model ${model_name} --format json | jq '.machines' | jq -r 'keys[]' | xargs -n 1 juju remove-machine --force # Force destroy all machines
juju status --model ${model_name} --format json | jq '.applications' | jq -r 'keys[]' | xargs -n 1 juju remove-application # Remove all applications
watch -c -n 10 juju status --model ${model_name} --color
showHelp() {
cat <<EOF
This script requires 2 or 3 arguments exactly.
"${0}" <redhat username> <redhat password> [<redhat release>]
"${0}" user1 passw0rd! 7Server
"${0}" user2 pAssw@rd
By default the omission of the release version will default to 7Server being set.

WannaCry|WannaDecrypt0r NSA-Cyberweapon-Powered Ransomware Worm

  • Virus Name: WannaCrypt, WannaCry, WanaCrypt0r, WCrypt, WCRY
  • Vector: All Windows versions before Windows 10 are vulnerable if not patched for MS-17-010. It uses EternalBlue MS17-010 to propagate.
  • Ransom: between $300 to $600. There is code to 'rm' (delete) files in the virus. Seems to reset if the virus crashes.
  • Backdooring: The worm loops through every RDP session on a system to run the ransomware as that user. It also installs the DOUBLEPULSAR backdoor. It corrupts shadow volumes to make recovery harder. (source: malwarebytes)
  • Kill switch: If the website is up the virus exits instead of infecting the host. (source: malwarebytes). This domain has been sinkholed, stopping the spread of the worm. Will not work if proxied (source).

update: A minor variant of the viru

davydany /
Last active Feb 16, 2020
IP Tables (iptables) Cheat Sheet

IP Tables (iptables) Cheat Sheet

IPTables is the Firewall service that is available in a lot of different Linux Distributions. While modifiying it might seem daunting at first, this Cheat Sheet should be able to show you just how easy it is to use and how quickly you can be on your way mucking around with your firewall.


The following list is a great set of documentation for iptables. I used them to compile this documentation.

george-hawkins /
Last active Jan 31, 2020
Running virtualized x86_64 and emulated arm64 Ubuntu cloud images using QEMU

QEMU arm64 cloud server emulation

This is basically a rehash of an original post on CNXSoft - all credit (particularly for the Virtio device arguments used below) belongs to the author of that piece.

Download the latest uefi1.img image. E.g. ubuntu-16.04-server-cloudimg-arm64-uefi1.img from

Download the UEFI firmware image QEMU_EFI.fd from

Determine your current username and get your current ssh public key:

htp /
Last active Feb 20, 2020
Test a WebSocket using curl.
curl --include \
--no-buffer \
--header "Connection: Upgrade" \
--header "Upgrade: websocket" \
--header "Host:" \
--header "Origin:" \
--header "Sec-WebSocket-Key: SGVsbG8sIHdvcmxkIQ==" \
--header "Sec-WebSocket-Version: 13" \
You can’t perform that action at this time.