Skip to content

Instantly share code, notes, and snippets.

View adampielak's full-sized avatar
💭
███▓▒░░. LiNUX .░░▒▓███

Adam Pielak adampielak

💭
███▓▒░░. LiNUX .░░▒▓███
View GitHub Profile

Raspberry Pi VPN Router

This is a quick-and-dirty guide to setting up a Raspberry Pi as a "router on a stick" to PrivateInternetAccess VPN.

Requirements

Install Raspbian Jessie (2016-05-27-raspbian-jessie.img) to your Pi's sdcard.

Use the Raspberry Pi Configuration tool or sudo raspi-config to:

@adampielak
adampielak / sc-backup.sh
Created May 31, 2021 16:07 — forked from SteveMcGrath/sc-backup.sh
SecurityCenter Backup Script
#!/bin/bash
## SecurityCenter Backup Script
#
# This script is intended to create backups of all of the SecurityCenter data
# on a daily/weekly/monthly/etc. basis. This is intended to be run as a cronjob
# and expect the SysAdmin to have configured the root@localhost mail alias to
# route through their email system in-case of errors. An example of how to run
# this as a cronjob is below:
#
# 1 45 * * * root /opt/scripts/backups/sc-backup.sh

Discovery

Tools

SQL Injection

' or '1' ='1' --

Website Directory Enumeration

@adampielak
adampielak / dual.cfg
Created January 6, 2022 10:44 — forked from marfillaster/dual.cfg
Mikrotik dual/triple dhcp wan recursive failover w/ pcc load balancing
/interface bridge add name=bridge
/interface bridge port
add bridge=bridge interface=ether3
add bridge=bridge interface=ether2
add bridge=bridge interface=ether1
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
@adampielak
adampielak / gist:90b452416f95fc1bd9e64bdd3fdeda1e
Created January 6, 2022 10:55 — forked from marfillaster/gist:d34bd199b9e265ccd74af6d31fd9df85
Mikrotik IPv6 dns-over-https doh cloudflare google
# https://forum.mikrotik.com/viewtopic.php?t=132657
/ipv6 dhcp-server option
add code=23 name=recursivens6 value=0xfd000000000000000000000000000001
/ipv6 dhcp-server
add dhcp-option=recursivens6 interface=bridge lease-time=30m name=dhcp6
/ipv6 pool
add name=ULA-pool6 prefix=fd00::/64 prefix-length=64

Create CA and CA-Signed Certificates


Create CA

#!/bin/bash
set -e
cd `dirname $0`
##########################################################
@adampielak
adampielak / bashsnoop.sh
Created October 4, 2023 21:23 — forked from ptrsimon/bashsnoop.sh
Read not-yet-flushed history from a running shell
bpid=$(ps -o pid,comm xwwwf | grep -A1 screen| tail -1 | awk '{print $1}'); \
gcore $bpid; strings core.$bpid | grep '@' | grep root
# no gdb? no problem! dd to the rescue
bpid=$(ps -o pid,comm xwwwf | grep -A1 screen| tail -1 | awk '{print $1}'); \
offset=$(grep heap /proc/$bpid/maps|cut -d '-' -f 1); \
end=$(grep heap /proc/$bpid/maps|cut -d '-' -f 2|awk '{print $1}'); \
dd if=/proc/$bpid/mem iflag=skip_bytes,count_bytes bs=$(getconf PAGESIZE) skip=$((0x$offset)) count=$((0x$end - 0x$offset)) status=none \
| strings | grep root@
@adampielak
adampielak / 403-Bypass-Headers-List.txt
Created October 27, 2025 16:41 — forked from Spix0r/403-Bypass-Headers-List.txt
I’ve analyzed numerous tools, blogs, tweets, and other resources on bypassing 403 Forbidden errors using HTTP Headers Fuzzing techniques. After extensive research, I’ve compiled a list of headers you can fuzz to potentially bypass 403 restrictions.
Allow: CONNECT
Allow: GET
Allow: HEAD
Allow: POST
Allow: TRACE
Client-IP: 0
Client-IP: 0177.0000.0000.0001
Client-IP: 0x7F000001
Client-IP: 10.0.0.0
Client-IP: 10.0.0.1
@adampielak
adampielak / README.md
Created November 4, 2025 21:29 — forked from FrankSpierings/README.md
Linux Container Escapes and Hardening