Skip to content

Instantly share code, notes, and snippets.

View ShubhamRasal's full-sized avatar
💻
Cooking software

Shubham Rasal ShubhamRasal

💻
Cooking software
View GitHub Profile
@Huntinex
Huntinex / report.py
Last active March 21, 2025 10:33
Automatic bug bounty report generator
import poe, sys
client = poe.Client("<POE_API_KEY_HERE>")
title=sys.argv[1]
path=sys.argv[2]
more=""
if len(sys.argv) > 3:
more="\" and here is more information: "+sys.argv[3]
message="""generate a bug bounty report for me (hackerone.com), the title of the bug is """+title+""" and the vulnerability path is \""""+path+more+"""
@ShubhamRasal
ShubhamRasal / .env
Created February 16, 2023 04:38
Deploy metabase with Caddy using Docker compose
# =====================================
# Database environment
#
DB_TYPE=mysql
DB_HOST=
DB_NAME=
DB_USER=
DB_PASSWORD=
@ShubhamRasal
ShubhamRasal / main.go
Created January 19, 2023 17:41
nuclie-as-sdk
package main
import (
"context"
"fmt"
"log"
"os"
"path"
"time"
(?i)((access_key|access_token|admin_pass|admin_user|algolia_admin_key|algolia_api_key|alias_pass|alicloud_access_key|amazon_secret_access_key|amazonaws|ansible_vault_password|aos_key|api_key|api_key_secret|api_key_sid|api_secret|api.googlemaps AIza|apidocs|apikey|apiSecret|app_debug|app_id|app_key|app_log_level|app_secret|appkey|appkeysecret|application_key|appsecret|appspot|auth_token|authorizationToken|authsecret|aws_access|aws_access_key_id|aws_bucket|aws_key|aws_secret|aws_secret_key|aws_token|AWSSecretKey|b2_app_key|bashrc password|bintray_apikey|bintray_gpg_password|bintray_key|bintraykey|bluemix_api_key|bluemix_pass|browserstack_access_key|bucket_password|bucketeer_aws_access_key_id|bucketeer_aws_secret_access_key|built_branch_deploy_key|bx_password|cache_driver|cache_s3_secret_key|cattle_access_key|cattle_secret_key|certificate_password|ci_deploy_password|client_secret|client_zpk_secret_key|clojars_password|cloud_api_key|cloud_watch_aws_access_key|cloudant_password|cloudflare_api_key|cloudflare_auth_k
  graph TD;
      Nuclei-Templates--> Customization;
      Nuclei-Templates--> Automation;
      Nuclei-Templates--> Collaboration;
      Customization--> id1(No code, Simple as Editing a text file);
      Automation--> Scan;
      Automation--> Triage;
      Automation--> Retest;
 Automation--&gt; Regression;
@dragonsinth
dragonsinth / gcp-kube.go
Last active August 1, 2024 13:47
Connect to Google Kubernetes with GCP credentials and pure Golang
package main
import (
"context"
"encoding/base64"
"flag"
"fmt"
"log"
container "google.golang.org/api/container/v1beta1"
@sd031
sd031 / DevOps related courses with links
Created September 12, 2019 04:14
GCP, AWS Certification, DevOps / DevSecOps courses link that I did go through
@zironycho
zironycho / alb-ingress.yaml
Created May 19, 2019 13:32
argocd alb-ingress controller setup
apiVersion: extensions/v1beta1
kind: Ingress
metadata:
namespace: argocd
name: argocd-ingress
annotations:
kubernetes.io/ingress.class: alb
alb.ingress.kubernetes.io/scheme: internet-facing
alb.ingress.kubernetes.io/listen-ports: '[{"HTTP":80,"HTTPS": 443}]'
alb.ingress.kubernetes.io/certificate-arn: {{ your-acm-arn }}
@ahmetb
ahmetb / gcpauth.go
Created May 22, 2018 17:21
Authenticating to GKE cluster with client-go, IAM service account and a Google auth plugin written from scratch
package main
import (
"context"
"fmt"
"log"
"net/http"
"golang.org/x/oauth2"
"golang.org/x/oauth2/google"
Spent quite long time to try to figure out how to setup this Linux + Window Jenkins env.
My user case is, I only want to maintain Linux Jenkins setup, namely Linux on both Jenkins slaves and master.
The current setup is mixed Linux and Windows Jenkins slaves.
On the windows slave, we run a very simple powershell which does two things: psexec to another Windows target to run a bat and get the logs back
So my idea is to move this powershell to Linux slave to run. since powershell is supporting Linux (https://github.com/PowerShell/PowerShell)
But then I realize psexec is still needed on Windows then powershell is not the bottleneck for the change I want to do.
psexec is the key, which enable remote run bat on the Windows target from a Windows.
So we need to find a tool which allow us to run remote bat from a Linux. As if it is a powershell (as-is no need change) or re-write
into a shell script (just call the new tool , plus fetch log)