Skip to content

Instantly share code, notes, and snippets.

View wparad's full-sized avatar
🇨🇭
I solve security in SaaS.

Warren Parad wparad

🇨🇭
I solve security in SaaS.
View GitHub Profile
@wparad
wparad / gist:a6bdf4acba22f9531a58e3675bef3630
Created August 12, 2023 20:24 — forked from jatcwang/gist:ae3b7019f219b8cdc6798329108c9aee
List of all setxkbmap configuration options (including models/layout/etc)
! model
pc101 Generic 101-key PC
pc102 Generic 102-key (Intl) PC
pc104 Generic 104-key PC
pc105 Generic 105-key (Intl) PC
dell101 Dell 101-key PC
latitude Dell Latitude series laptop
dellm65 Dell Precision M65
everex Everex STEPnote
flexpro Keytronic FlexPro
@wparad
wparad / symantec-vip-access-totp.md
Created April 27, 2023 11:22 — forked from jarbro/symantec-vip-access-totp.md
Generate Symantec VIP Access Token as TOTP

Generate Symantec VIP Access Token as OTP

Recently I came across a web service that required two-factor authentication using the Symantec VIP Access App. I already manage all of my OTP tokens in a different app (If you are on iOS I highly recommend using OTP Auth by Roland Moers.) and did not want to have to use yet another app to generate the TOTP.

There is a way to generate a Symantec VIP Access compatible token very easily if you have access to an environment which can run Python PIP. I happen to have Ubuntu Windows Subsystem Linux running on my machine. (If you are running Windows 10 and don't have this you should really check it out.) Let's get started...

hello

Instructions

Here we install python3-pip and qrencode so we can generate our secret, I

@wparad
wparad / findDanglingElasticIpAddresses.js
Last active October 3, 2021 17:32
Find Route53 records pointing to unowned IP Addresses
// This is also a config rule: https://eu-west-2.console.aws.amazon.com/lambda/home?region=eu-west-2#/create/app?applicationId=arn:aws:serverlessrepo:eu-west-1:922723803004:applications/Elastic-IP-Config-Rule
const { Route53, EC2, config } = require('aws-sdk');
config.region = 'eu-west-1';
async function findDanglingElasticIpAddresses(dryRun = true) {
const route53 = new Route53();
let hostedZoneIds;
try {
console.log('Looking up hosted zones:');
@wparad
wparad / AWS IAM Policy - ForceMFA.json
Created May 1, 2018 08:29 — forked from incyclum/AWS IAM Policy - ForceMFA.json
AWS IAM Policy - Force MFA - This policy allows users to manage their own passwords and MFA devices but nothing else unless they authenticate with MFA -- *EDIT*: I forgot where I found it in the 1st place. In fact this policy is explained statement by statement in AWS docs: https://docs.aws.amazon.com/IAM/latest/UserGuide/tutorial_users-self-man…
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "AllowAllUsersToListAccounts",
"Effect": "Allow",
"Action": [
"iam:ListAccountAliases",
"iam:ListUsers",
"iam:GetAccountPasswordPolicy",
@wparad
wparad / bamboo_build.ps1
Created March 9, 2016 22:14 — forked from crejb/bamboo_build.ps1
Remotely trigger/queue a Bamboo build from command line via the Rest API
# Disable progress bars created by Invoke-RestMethod which internally uses Write-Progress)
$progressPreference = 'silentlyContinue'
$url = 'http://bamboohost:8085/'
$apiUrl = $url + "rest/api/latest/"
$project = 'ZZ-ZZZ'
$queueUrl = ("{0}queue/{1}" -f $apiUrl, $project)
$username='username'
$password='password'