I was able to successfully run the script with versions:
Bash: GNU bash, version 4.4.19(1)-release
Wget: GNU Wget 1.19.4
Curl: curl 7.58.0 Working on it when I can
| ## Installation script for OpenVAS/Greenbone 20.08 on Ubuntu 20.08 | |
| ## Tested for PatrowlEngines | |
| ## See https://patrowl.io | |
| ## Based on: | |
| # https://kifarunix.com/install-and-setup-gvm-11-on-ubuntu-20-04/#create-gvm-service-unit-file | |
| # https://github.com/yu210148/gvm_install/blob/master/install_gvm.sh | |
| apt-get update && apt-get upgrade | |
| useradd -r -d /opt/gvm -c "GVM User" -s /bin/bash gvm | |
| mkdir /opt/gvm |
| # Test Internet Connection | |
| ping -c 1 google.com > /dev/null | |
| if [ "$?" != 0 ] | |
| then | |
| echo [*] [Internet Connection]: FAILED...; | |
| echo [x] [warning]:This Script Needs An Active Internet Connection; | |
| sleep 3 |
| #!/usr/bin/env bash | |
| ## | |
| ## generate mnemonic passphrases beginning with the given letters | |
| ## | |
| ## Author: Kevin Ernst | |
| ## Date: 27 May 2021 | |
| ## License: MIT | |
| ## Source: https://gist.github.com/ernstki/589bfb4adfb3869834c97bd106d58b7e | |
| ## | |
| ## Usage: pphrases a b c [...] |
During many penetration tests (or red versus blue team exercises), I have found myself with the need to investigate users, groups, computers and policies of a Windows domain. To do that, I have developed a series of PowerShell scripts that dump all that information from Active Directory into XML files.
| ########## | |
| # Tweaked Win10 Initial Setup Script | |
| # Primary Author: Disassembler <[email protected]> | |
| # Modified by: alirobe <[email protected]> based on my personal preferences. | |
| # Version: 2.20.2, 2018-09-14 | |
| # Primary Author Source: https://github.com/Disassembler0/Win10-Initial-Setup-Script | |
| # Tweaked Source: https://gist.github.com/alirobe/7f3b34ad89a159e6daa1/ | |
| # Tweak difference: | |
| # | |
| # @alirobe's version is a subset focused on safely disabling telemetry, some 'smart' features and 3rd party bloat ... |
| ============================================= | |
| - Discovered by: Dawid Golunski | |
| - http://legalhackers.com | |
| - dawid (at) legalhackers.com | |
| - CVE-2016-6662 | |
| - Release date: 12.09.2016 | |
| - Severity: Critical | |
| ============================================= |
| # -*- mode: ruby -*- | |
| # vi: set ft=ruby : | |
| # All Vagrant configuration is done below. The "2" in Vagrant.configure | |
| # configures the configuration version (we support older styles for | |
| # backwards compatibility). Please don't change it unless you know what | |
| # you're doing. | |
| Vagrant.configure("2") do |config| | |
| # The most common configuration options are documented and commented below. | |
| # For a complete reference, please see the online documentation at |
| #! /usr/bin/env bash | |
| ### | |
| # | |
| # install_mysql.sh | |
| # | |
| # This script assumes your Vagrantfile has been configured to map the root of | |
| # your application to /vagrant and that your web root is the "public" folder | |
| # (Laravel standard). Standard and error output is sent to | |
| # /vagrant/vm_build.log during provisioning. |