I hereby claim:
- I am josephgregg on github.
- I am josephgregg (https://keybase.io/josephgregg) on keybase.
- I have a public key ASDRAes4Xb-Rkvyh0Gt8CprfN9W9t0jNIajusZa0K1X0_wo
To claim this, I am signing this object:
#!/usr/bin/env python3 | |
""" | |
AudioSocket Server - Optimized Audio Quality Version | |
""" | |
import asyncio | |
import struct | |
import logging | |
import sys | |
import json |
emails: | |
You are performing OSINT for an upcoming penetration test. For the target domain [TARGET_DOMAIN], identify all known employee email addresses by: | |
1. Searching the web and X for publicly listed emails @TARGET_DOMAIN. | |
2. Searching LinkedIn for current and former employees of the company associated with TARGET_DOMAIN. | |
3. Scraping the target website for metadata in documents like PDFs and Microsoft suite files (e.g., using browse_page on document URLs to extract author names, etc.), and add any identified names. | |
4. For each identified employee name, guess email formats as firstname.lastname@TARGET_DOMAIN; handle common nicknames by including variants (e.g., mike/michael, bill/william, rob/robert, nick/nicholas, etc.). | |
5. Search deeper across multiple pages/sources for more employees. | |
6. Compile a unique list of all found/guessed emails in CSV format (column: email), including inline citations for sources using . |
esphome: | |
name: bme280-node | |
friendly_name: BME280_Node | |
esp32: | |
board: esp32-c6-devkitm-1 | |
framework: | |
type: esp-idf | |
logger: |
interface TenantInfo { | |
tenant_id: string; | |
tenant_name: string; | |
tenant_region: string; | |
cloud_instance: string; | |
sso_enabled: string; | |
domain_count: number; | |
federated_domains?: string[]; // Optional field | |
} |
import sys | |
import lxml.etree as etree | |
from urllib import request | |
import dns.resolver | |
def main(domain): | |
get_expensive_solution(domain) | |
get_federation_info(domain) | |
def get_expensive_solution(domain): |
#!/usr/bin/env python3 | |
import csv | |
import base64 | |
import logging | |
import argparse | |
import traceback | |
import lxml.etree as etree | |
import sys | |
from io import StringIO | |
from urllib import request |
import ldap3 | |
import sys | |
def get_domain_admin_usernames(server_name, domain_name): | |
domain_parts = domain_name.split(".") | |
if len(domain_parts) < 2: | |
print("Error: Invalid domain name") | |
sys.exit(1) | |
tld = ".".join(domain_parts[1:]) | |
base_dn = "DC={},DC={}".format(domain_parts[0], tld) |
set apps to {"Transmission", "Keybase", "Signal"} | |
set notificationBox to "Your apps have been killed as the VPN connection was terminated at " & (current date) & "." | |
repeat with targetApp in apps | |
tell application targetApp to quit | |
end repeat | |
display dialog notificationBox |
I hereby claim:
To claim this, I am signing this object:
-A SSH-IN -i enp4s0 -p tcp -m hashlimit --hashlimit-upto 2/min --hashlimit-burst 5 --hashlimit-mode srcip,dstport --hashlimit-name SSH_IN -m state --state NEW -m tcp --dport 22 -m comment --comment "Allow 2 new SSH connections per minute based on SRC IP and DST PORT" -j ACCEPT | |
-A SSH-IN -p tcp -m state --state NEW -m tcp --dport 22 -j LOG --log-prefix "IPTABLES SSH:" | |
-A SSH-IN -p tcp -m state --state NEW -m tcp --dport 22 -j DROP |