Skip to content

Instantly share code, notes, and snippets.

View zmallen's full-sized avatar

Zack Allen zmallen

View GitHub Profile
#!/bin/bash
echo "foo"
echo "bar"
ls
```$ ansible --version
ansible 2.4.1.0
config file = None
configured module search path = [u'/Users/zallen/.ansible/plugins/modules', u'/usr/share/ansible/plugins/modules']
ansible python module location = /usr/local/lib/python2.7/site-packages/ansible
executable location = /usr/local/bin/ansible
python version = 2.7.13 (default, Dec 18 2016, 07:03:39) [GCC 4.2.1 Compatible Apple LLVM 8.0.0 (clang-800.0.42.1)]
```
# If you come from bash you might have to change your $PATH.
# export PATH=$HOME/bin:/usr/local/bin:$PATH
# Path to your oh-my-zsh installation.
export ZSH=~/.oh-my-zsh
# Set name of the theme to load. Optionally, if you set this to "random"
# it'll load a random theme each time that oh-my-zsh is loaded.
# See https://github.com/robbyrussell/oh-my-zsh/wiki/Themes
ZSH_THEME="mh"
import random
arr = []
def check_arr(num):
for elem in arr:
if elem == num:
return True
return False
{"ranking": [[{"circl": 2}]], "last-modified": "2017-03-29T21:59:01.940-04:00", "Modified": "2017-03-10T21:59:00.183-05:00", "cvss": "10.0", "capec": [{"name": "Embedding Scripts in Non-Script Elements", "prerequisites": ["Target client software must be a client that allows script execution based on scripts generated by remote hosts."], "summary": ["This attack is a form of Cross-Site Scripting (XSS) where malicious scripts are embedded in elements that are not expected to host scripts such as image tags (<img>), comments in XML documents (< !-CDATA->), etc. These tags may not be subject to the same input validation, output validation, and other content filtering and checking routines, so this can create an opportunity for an attacker to tunnel through the application's elements and launch a XSS attack through other elements.", "As with all remote attacks, it is important to differentiate the ability to launch an attack (such as probing an internal network for unpatched servers) and the ability of the remote
### Keybase proof
I hereby claim:
* I am zmallen on github.
* I am techy (https://keybase.io/techy) on keybase.
* I have a public key whose fingerprint is C512 0650 5340 4D9C 2B33 D2F9 BCFD 8DCA AEF5 AF14
To claim this, I am signing this object:
# -*- mode: ruby -*-
# vi: set ft=ruby :
Vagrant.configure("2") do |config|
config.vm.define "ansible", primary: true do |ansible|
ansible.vm.network "private_network", ip: "192.168.50.3"
ansible.vm.box = "hashicorp/precise64"
ansible.vm.provision :shell, path: "scripts/bootstrap_ans.sh"
ansible.vm.provider "virtualbox" do |vbox|
vbox.memory = 512
execute pathogen#infect()
execute pathogen#helptags()
autocmd vimenter * NERDTree
filetype plugin on
filetype plugin indent on
syntax on
au FileType yaml setlocal tabstop=2 expandtab shiftwidth=2 softtabstop=2
set relativenumber
set number
execute pathogen#infect()
filetype plugin on
autocmd vimenter * NERDTree
elasticsearch_configure 'elasticsearch' do
configuration ({
'cluster.name' => node['elasticsearch']['configuration']['cluster_name'],
'network.host' => node['elasticsearch']['configuration']['network_host'] || node['ipaddress'],
'discovery.zen.ping.multicast.enabled' => false,
'discovery.zen.ping.unicast.hosts' => node['fst_elasticsearch']['unicast_hosts'],
'discovery.zen.minimum_master_nodes' => node['elasticsearch']['configuration']['discovery_zen_minimum_master_nodes'] || 1,
'path.data' => node['elasticsearch']['configuration']['path.data']
})
end