I was able to successfully run the script with versions:
Bash: GNU bash, version 4.4.19(1)-release
Wget: GNU Wget 1.19.4
Curl: curl 7.58.0 Working on it when I can
## Installation script for OpenVAS/Greenbone 20.08 on Ubuntu 20.08 | |
## Tested for PatrowlEngines | |
## See https://patrowl.io | |
## Based on: | |
# https://kifarunix.com/install-and-setup-gvm-11-on-ubuntu-20-04/#create-gvm-service-unit-file | |
# https://github.com/yu210148/gvm_install/blob/master/install_gvm.sh | |
apt-get update && apt-get upgrade | |
useradd -r -d /opt/gvm -c "GVM User" -s /bin/bash gvm | |
mkdir /opt/gvm |
# Test Internet Connection | |
ping -c 1 google.com > /dev/null | |
if [ "$?" != 0 ] | |
then | |
echo [*] [Internet Connection]: FAILED...; | |
echo [x] [warning]:This Script Needs An Active Internet Connection; | |
sleep 3 |
#!/usr/bin/env bash | |
## | |
## generate mnemonic passphrases beginning with the given letters | |
## | |
## Author: Kevin Ernst | |
## Date: 27 May 2021 | |
## License: MIT | |
## Source: https://gist.github.com/ernstki/589bfb4adfb3869834c97bd106d58b7e | |
## | |
## Usage: pphrases a b c [...] |
During many penetration tests (or red versus blue team exercises), I have found myself with the need to investigate users, groups, computers and policies of a Windows domain. To do that, I have developed a series of PowerShell scripts that dump all that information from Active Directory into XML files.
########## | |
# Tweaked Win10 Initial Setup Script | |
# Primary Author: Disassembler <[email protected]> | |
# Modified by: alirobe <[email protected]> based on my personal preferences. | |
# Version: 2.20.2, 2018-09-14 | |
# Primary Author Source: https://github.com/Disassembler0/Win10-Initial-Setup-Script | |
# Tweaked Source: https://gist.github.com/alirobe/7f3b34ad89a159e6daa1/ | |
# Tweak difference: | |
# | |
# @alirobe's version is a subset focused on safely disabling telemetry, some 'smart' features and 3rd party bloat ... |
============================================= | |
- Discovered by: Dawid Golunski | |
- http://legalhackers.com | |
- dawid (at) legalhackers.com | |
- CVE-2016-6662 | |
- Release date: 12.09.2016 | |
- Severity: Critical | |
============================================= |
# -*- mode: ruby -*- | |
# vi: set ft=ruby : | |
# All Vagrant configuration is done below. The "2" in Vagrant.configure | |
# configures the configuration version (we support older styles for | |
# backwards compatibility). Please don't change it unless you know what | |
# you're doing. | |
Vagrant.configure("2") do |config| | |
# The most common configuration options are documented and commented below. | |
# For a complete reference, please see the online documentation at |
#! /usr/bin/env bash | |
### | |
# | |
# install_mysql.sh | |
# | |
# This script assumes your Vagrantfile has been configured to map the root of | |
# your application to /vagrant and that your web root is the "public" folder | |
# (Laravel standard). Standard and error output is sent to | |
# /vagrant/vm_build.log during provisioning. |