Skip to content

Instantly share code, notes, and snippets.

View Stichoza's full-sized avatar
๐Ÿš
๐Ÿ’จ Wrooom

Levan Velijanashvili Stichoza

๐Ÿš
๐Ÿ’จ Wrooom
View GitHub Profile
@Neo23x0
Neo23x0 / log4j_rce_detection.md
Last active August 15, 2025 09:49
Log4j RCE CVE-2021-44228 Exploitation Detection

log4j RCE Exploitation Detection

You can use these commands and rules to search for exploitation attempts against log4j RCE vulnerability CVE-2021-44228

Grep / Zgrep

This command searches for exploitation attempts in uncompressed files in folder /var/log and all sub folders

sudo egrep -I -i -r '\$(\{|%7B)jndi:(ldap[s]?|rmi|dns|nis|iiop|corba|nds|http):/[^\n]+' /var/log
@PhillippOhlandt
PhillippOhlandt / nothingToDoHereFunction
Created May 20, 2015 10:00
Nothing to do here ASCII function
function nothingToDoHere($newLine = '<br>'){
return '
โ”€โ”€โ”€โ”€โ”€โ”€โ–ˆโ–€โ–„โ”€โ–„โ–€โ–„โ”€โ–€โ–ˆโ–€โ”€โ–ˆโ”€โ–ˆโ”€โ–€โ”€โ–ˆโ–€โ–„โ”€โ–„โ–€โ–€โ–€โ”€โ”€โ”€โ”€โ”€'.$newLine.'
โ”€โ”€โ”€โ”€โ”€โ”€โ–ˆโ”€โ–ˆโ”€โ–ˆโ”€โ–ˆโ”€โ”€โ–ˆโ”€โ”€โ–ˆโ–€โ–ˆโ”€โ–ˆโ”€โ–ˆโ”€โ–ˆโ”€โ–ˆโ”€โ–€โ–ˆโ”€โ”€โ”€โ”€โ”€'.$newLine.'
โ”€โ”€โ”€โ”€โ”€โ”€โ–€โ”€โ–€โ”€โ”€โ–€โ”€โ”€โ”€โ–€โ”€โ”€โ–€โ”€โ–€โ”€โ–€โ”€โ–€โ”€โ–€โ”€โ”€โ–€โ–€โ”€โ”€โ”€โ”€โ”€โ”€'.$newLine.'
โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€'.$newLine.'
โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ–€โ–ˆโ–€โ”€โ–„โ–€โ–„โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€'.$newLine.'
โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ–ˆโ”€โ”€โ–ˆโ”€โ–ˆโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€'.$newLine.'
โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ–€โ”€โ”€โ”€โ–€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€'.$newLine.'
โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€'.$newLine.'
@eyecatchup
eyecatchup / apple-meta-insanity.html
Created February 8, 2015 12:28
Insanity of Apple-specific meta tags..
<!DOCTYPE html>
<html>
<head>
<meta charset="utf-8">
<title>Apple Meta Insanity</title>
<!--
APPLE WEB APP META TAGS
-->
@safareli
safareli / gicrostaticAI.md
Last active August 29, 2015 14:10
แƒ’แƒ˜แƒ™แƒ แƒแƒกแƒขแƒแƒขแƒ˜แƒ™แƒฃแƒ แƒ˜ แƒฎแƒ”แƒšแƒแƒ•แƒœแƒฃแƒ แƒ˜ แƒ˜แƒœแƒขแƒ”แƒšแƒ”แƒฅแƒขแƒ˜

แƒแƒ› แƒ‘แƒแƒšแƒ แƒ“แƒ แƒแƒก แƒ›แƒ”แƒ’แƒแƒ‘แƒ แƒ”แƒ‘แƒก แƒฆแƒแƒ›แƒ”แƒ”แƒ‘แƒ˜ แƒแƒฆแƒแƒ  แƒ’แƒ•แƒซแƒ˜แƒœแƒแƒ•แƒก แƒ“แƒ แƒ•แƒ›แƒฃแƒจแƒแƒแƒ‘แƒ“แƒ˜แƒ— แƒฎแƒ”แƒšแƒแƒ•แƒœแƒฃแƒ แƒ˜ แƒ˜แƒœแƒขแƒ”แƒšแƒ”แƒฅแƒขแƒ˜แƒก แƒ”แƒ แƒ— แƒ’แƒ˜แƒ™แƒ แƒแƒกแƒขแƒ˜แƒ™แƒฃแƒ แƒข แƒžแƒ แƒแƒ”แƒขแƒ–แƒ” แƒ แƒแƒ›แƒšแƒ˜แƒก แƒคแƒแƒ แƒ’แƒšแƒ”แƒ‘แƒจแƒ˜แƒช แƒจแƒ”แƒ•แƒฅแƒ›แƒ”แƒœแƒ˜แƒ— แƒ”แƒก bookmarklet * แƒ˜แƒก แƒ“แƒแƒ’แƒ”แƒฎแƒ›แƒแƒ แƒ”แƒ‘แƒแƒ— แƒœแƒ”แƒ‘แƒ˜แƒกแƒ›แƒ˜แƒ”แƒ  แƒ™แƒ˜แƒ—แƒฎแƒ•แƒแƒ–แƒ” แƒ˜แƒžแƒแƒ•แƒแƒ— แƒžแƒแƒกแƒฃแƒฎแƒ˜ :3

javascript:var _a = document.location.href = "https://www.google.ge/#q="+encodeURIComponent(prompt("what you want?"))

ps. แƒ—แƒฃ แƒแƒ  แƒ˜แƒชแƒ˜แƒ— แƒ แƒแƒแƒ แƒ˜แƒก bookmarklet แƒ“แƒ แƒ’แƒแƒ˜แƒœแƒขแƒ”แƒ แƒ”แƒกแƒ”แƒ‘แƒ— แƒ“แƒแƒแƒฌแƒ”แƒฅแƒ˜แƒ— F12 แƒจแƒ”แƒ›แƒ“แƒ”แƒ’ แƒ’แƒแƒ“แƒแƒ“แƒ˜แƒ— แƒ™แƒแƒœแƒกแƒแƒšแƒจแƒ˜ แƒ“แƒ แƒฉแƒแƒฌแƒ”แƒ แƒ”แƒ— แƒ”แƒก :

document.location.href = "https://www.google.ge/#q="+encodeURIComponent(prompt("what you want?"))
@staltz
staltz / introrx.md
Last active August 30, 2025 02:27
The introduction to Reactive Programming you've been missing
@gosukiwi
gosukiwi / .vimrc
Last active February 24, 2020 06:01
.vimrc
" ---------------------- USABILITY CONFIGURATION ----------------------
" Basic and pretty much needed settings to provide a solid base for
" source code editting
" don't make vim compatible with vi
set nocompatible
" turn on syntax highlighting
syntax on
" and show line numbers
@tatocaster
tatocaster / magtifun_sms_terminal.py
Last active April 22, 2016 12:36
magtifun sender from terminal (python)
import urllib,urllib2,cookielib
cookie_jar = cookielib.CookieJar()
opener = urllib2.build_opener(urllib2.HTTPCookieProcessor(cookie_jar))
urllib2.install_opener(opener)
url_1 = 'http://www.magtifun.ge/index.php?page=11&lang=ge'
values = dict(password='Password', user='User', act='1')
data = urllib.urlencode(values)
req = urllib2.Request(url_1, data)
@TemporaryJam
TemporaryJam / Howto convert a PFX to a seperate .key & .crt file
Last active April 4, 2024 10:52
How to convert a .pfx SSL certificate to .crt/key (pem) formats. Useful for NGINX
source: http://www.markbrilman.nl/2011/08/howto-convert-a-pfx-to-a-seperate-key-crt-file/
`openssl pkcs12 -in [yourfile.pfx] -nocerts -out [keyfile-encrypted.key]`
What this command does is extract the private key from the .pfx file. Once entered you need to type in the importpassword of the .pfx file. This is the password that you used to protect your keypair when you created your .pfx file. If you cannot remember it anymore you can just throw your .pfx file away, cause you wonโ€™t be able to import it again, anywhere!. Once you entered the import password OpenSSL requests you to type in another password, twice!. This new password will protect your .key file.
Now letโ€™s extract the certificate:
`openssl pkcs12 -in [yourfile.pfx] -clcerts -nokeys -out [certificate.crt]`
@max
max / gist:5708466
Created June 4, 2013 18:54
Flat UI Colors as Sass variables
// I needed flatuicolors.com as Sass variables...
// In your console, run:
$('.color').get().map(function(el) { return "$" + el.classList[1] + ": " + el.getAttribute('data-clipboard-text') + ';' }).join('\r\n');
// Output:
// $turquoise: #1abc9c;
// $emerland: #2ecc71;
// $peter-river: #3498db;
// $amethyst: #9b59b6;
// $wet-asphalt: #34495e;