Skip to content

Instantly share code, notes, and snippets.

@zined
zined / aws_saml_request.xml
Created May 6, 2017 19:33 — forked from lantrix/aws_saml_request.xml
SOAP request for a SAML token for Amazon Web Services from an ADFS SOAP endpoint
<s:Envelope xmlns:s="http://www.w3.org/2003/05/soap-envelope"
xmlns:a="http://www.w3.org/2005/08/addressing"
xmlns:u="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd">
<s:Header>
<a:Action s:mustUnderstand="1">http://docs.oasis-open.org/ws-sx/ws-trust/200512/RST/Issue</a:Action>
<a:To s:mustUnderstand="1">https://youradfsserver.com.au/adfs/services/trust/13/usernamemixed</a:To>
<o:Security s:mustUnderstand="1" xmlns:o="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd">
<o:UsernameToken u:Id="uuid-6a13a244-dac6-42c1-84c5-cbb345b0c4c4-1">
<o:Username>user@domain.com.au</o:Username>
<o:Password>password</o:Password>
--- docker/daemon/graphdriver/btrfs/btrfs.go 2016-03-09 12:13:24.000000000 -0800
+++ docker/daemon/graphdriver/btrfs/btrfs.go 2016-04-17 04:34:27.188376720 -0700
@@ -7,6 +7,10 @@ package btrfs
#include <dirent.h>
#include <btrfs/ioctl.h>
#include <btrfs/ctree.h>
+
+static void set_name_btrfs_ioctl_vol_args_v2(struct btrfs_ioctl_vol_args_v2* btrfs_struct, const char* value) {
+ snprintf(btrfs_struct->name, BTRFS_SUBVOL_NAME_MAX, "%s", value);
+}

Keybase proof

I hereby claim:

  • I am zined on github.
  • I am zined (https://keybase.io/zined) on keybase.
  • I have a public key whose fingerprint is 54F3 3D56 ED68 B567 68CE C45F 0452 F202 4D6B E444

To claim this, I am signing this object:

[hekad]
base_dir = "/tmp"
[TestTcpInput]
type = "TcpInput"
address = ":12345"
parser_type = "token"
delimiter = "\n"
decoder = "TestDecoder"
@zined
zined / gist:4baed1ca60bc5375f01a
Created September 17, 2014 15:26
testing heka
[WebPoolJupiterElbLogsInput]
type = "LogstreamerInput"
log_directory = "/logs/jupiter"
file_match = '(?P<Year>\d+)/(?P<Month>\d+)/(?P<Day>\d+)[^_]+_[^_]+_[^_]+_[^_]+_\d+T(?P<Hour>\d{2})(?P<Minute>\d{2})Z_(?P<ElbIP>[^_]+)_[^\.]+\.log'
priority = ["Year", "Month", "Day", "Hour", "Minute"]
decoder = "ElbLogDecoder"
[ElbLogDecoder]
type = "PayloadRegexDecoder"
match_regex = '^(?P<TheWholeFuckingLine>.*)$'
~/s/h/b/h/s/g/m/h/c/hekad git:dev ❯❯❯ pwd && strace -f go build 2>&1 | grep 'liblua\.'
/home/zined/src/heka/build/heka/src/github.com/mozilla-services/heka/cmd/hekad
[pid 9298] open("/opt/local/lib/liblua.so", O_RDONLY) = -1 ENOENT (No such file or directory)
[pid 9298] open("/opt/local/lib/liblua.a", O_RDONLY) = -1 ENOENT (No such file or directory)
[pid 9298] open("/usr/local/lib/liblua.so", O_RDONLY) = -1 ENOENT (No such file or directory)
[pid 9298] open("/usr/local/lib/liblua.a", O_RDONLY) = -1 ENOENT (No such file or directory)
[pid 9298] open("/usr/lib/liblua.so", O_RDONLY) = 17
[pid 9298] open("/usr/lib/liblua.so", O_RDONLY) = 18
~/s/h/b/h/s/g/m/h/c/hekad git:dev ❯❯❯
case $i in
(0) set -- ;;
(1) set -- "$args0" ;;
(2) set -- "$args0" "$args1" ;;
(3) set -- "$args0" "$args1" "$args2" ;;
(4) set -- "$args0" "$args1" "$args2" "$args3" ;;
(5) set -- "$args0" "$args1" "$args2" "$args3" "$args4" ;;
(6) set -- "$args0" "$args1" "$args2" "$args3" "$args4" "$args5" ;;
(7) set -- "$args0" "$args1" "$args2" "$args3" "$args4" "$args5" "$args6" ;;
(8) set -- "$args0" "$args1" "$args2" "$args3" "$args4" "$args5" "$args6" "$args7" ;;
@zined
zined / gist:8162295
Last active January 1, 2016 15:09
from 2011: "PoC: Call of PROTECTED functions from unsecure LUA execution path"
-----------------------------------------------------------------------------------------
-- small proof of concept which hooks into MAIL_SUCCESS, and sends the total amount of
-- money on the char to some other char.
--
-- with a little social engineering in some big guilds and some "not so aggressive" style
-- of "how much money do we want to send" algorithm :) like "always send 1% of the
-- char's total money, with a cap of 100g or something like that" this could be heavily
-- abused...
--
-- functions used:
root@cashcow ~/src/bitcrack # jruby -S gem install bitcoin
JRuby limited openssl loaded. http://jruby.org/openssl
gem install jruby-openssl for full support.
System.java:-2:in `arraycopy': java.lang.ArrayIndexOutOfBoundsException
from DefaultResolver.java:111:in `makeTime'
from DefaultResolver.java:277:in `create'
from DefaultResolver.java:317:in `handleScalar'
from DefaultResolver.java:435:in `orgHandler'
from DefaultResolver.java:455:in `node_import'
from org/yecht/ruby/DefaultResolver$s_method_1_0$RUBYINVOKER$node_import.gen:65535:in `call'
@zined
zined / gist:7155664
Last active December 26, 2015 12:59
puppetmaster hiera lookup debug log
Oct 25 15:52:59 puppet01 puppet-master[11205]: Automatically imported nagios::cloudwatch::params from nagios/cloudwatch/params into production
Oct 25 15:52:59 puppet01 puppet-master[11205]: hiera(): Hiera YAML backend starting
Oct 25 15:52:59 puppet01 puppet-master[11205]: hiera(): Looking up nagios_cloudwatchplugin_aws_secret_access_key in YAML backend
Oct 25 15:52:59 puppet01 puppet-master[11205]: hiera(): Looking for data source common
Oct 25 15:52:59 puppet01 puppet-master[11205]: hiera(): Cannot find datafile /var/lib/hiera/common.yaml, skipping
Oct 25 15:52:59 puppet01 puppet-master[11205]: hiera(): Looking up nagios_cloudwatchplugin_aws_access_key_id in YAML backend
Oct 25 15:52:59 puppet01 puppet-master[11205]: hiera(): Looking for data source common
Oct 25 15:52:59 puppet01 puppet-master[11205]: hiera(): Cannot find datafile /var/lib/hiera/common.yaml, skipping