Skip to content

Instantly share code, notes, and snippets.

@vpiserchia
vpiserchia / multijson.py
Created May 13, 2021 20:12 — forked from sampsyo/multijson.py
quick & dirty reading/writing of files containing multiple JSON objects
"""A couple of very simple utilities for reading and writing files
that contain multiple JSON values. Could be useful in situations where
you're generating a bunch of data for later processing and then, later,
you want to read it in an element at a time.
The json module doesn't really support streaming reads, though, so this
is limited by that. If you need real streaming, you probably want to use
something like ijson:
http://pypi.python.org/pypi/ijson/
"""
@vpiserchia
vpiserchia / kvm_minikube.md
Created September 28, 2020 08:48 — forked from alexellis/kvm_minikube.md
Run multiple minikube Kubernetes clusters on Ubuntu Linux with KVM

Ramp up your Kubernetes development, CI-tooling or testing workflow by running multiple Kubernetes clusters on Ubuntu Linux with KVM and minikube.

In this tutorial we will combine the popular minikube tool with Linux's Kernel-based Virtual Machine (KVM) support. It is a great way to re-purpose an old machine that you found on eBay or have gathering gust under your desk. An Intel NUC would also make a great host for this tutorial if you want to buy some new hardware. Another popular angle is to use a bare metal host in the cloud and I've provided some details on that below.

We'll set up all the tooling so that you can build one or many single-node Kubernetes clusters and then deploy applications to them such as OpenFaaS using familiar tooling like helm. I'll then show you how to access the Kubernetes clusters from a remote machine such as your laptop.

Pre-reqs

  • This tutorial uses Ubuntu 16.04 as a base installation, but other distributions are supported by KVM. You'll need to find out how to install
{"severity":2,"customFields":{},"description":"Case Created from a MISP event","tags":["misp","from-misp-event"],"name":"MISP-EVENT","tlp":2,"titlePrefix":"[MISP]","metrics":{},"pap":2,"tasks":[{"title":"Scratchpad","order":0,"group":"Scratchpad"},{"title":"Peers & Partners","order":1,"group":"Comms"},{"title":"Other","order":2,"group":"Comms"},{"title":"Detection && Identification","order":3,"group":"IR-Step2"},{"title":"Analysis && Digital Forensics","order":4,"group":"IR-Step2"},{"title":"Containment","order":5,"group":"IR-Step3"},{"title":"Eradication","order":6,"group":"IR-Step4"},{"title":"Recovery","order":7,"group":"IR-Step5"},{"title":"Lessons Learned","order":8,"group":"IR-Step6"}],"status":"Ok"}
@vpiserchia
vpiserchia / vm_nmap
Created February 8, 2020 09:28 — forked from micheleb/vm_nmap
A script to list all existing NAT forwarding rules in VirtualBox
#!/bin/bash
#
# vm_nmap
# Created on 2013/07/16 MB
#
# Lists all configured port forwarding rules for all VirtualBox VMs found
# in the caller user's home.
#
# If called from user root, lists all port forwarding rules for all VMs
# in all homes.

Keybase proof

I hereby claim:

  • I am vpiserchia on github.
  • I am vpiserchia (https://keybase.io/vpiserchia) on keybase.
  • I have a public key whose fingerprint is 439D C640 C3EC D4A1 B23B 1DCB 60B2 481E E831 29A5

To claim this, I am signing this object:

### Keybase proof
I hereby claim:
* I am vpiserchia on github.
* I am vpiserchia (https://keybase.io/vpiserchia) on keybase.
* I have a public key whose fingerprint is BD5E F171 ED50 BEF9 BE04 3827 1A90 C44A DD4B 85EF
To claim this, I am signing this object: