Skip to content

Instantly share code, notes, and snippets.

View adampielak's full-sized avatar
💭
███▓▒░░. LiNUX .░░▒▓███

Adam Pielak adampielak

💭
███▓▒░░. LiNUX .░░▒▓███
View GitHub Profile
@adampielak
adampielak / siem-python-automation.py
Created December 3, 2025 11:08 — forked from williamzujkowski/siem-python-automation.py
SIEM Python Automation - Wazuh and Graylog API Integration
#!/usr/bin/env python3
"""
SIEM Automation Scripts - Wazuh and Graylog Integration
"""
import requests
from requests.auth import HTTPBasicAuth
import json
class WazuhAPI:
@adampielak
adampielak / llm-alert-triage.py
Created December 3, 2025 11:07 — forked from williamzujkowski/llm-alert-triage.py
LLM Alert Triage - Automated Security Alert Classification with Ollama
#!/usr/bin/env python3
"""
LLM-Powered Security Alert Triage
Automated alert classification using local Ollama LLM
"""
import ollama
import requests
import json
from datetime import datetime, timedelta
@adampielak
adampielak / CVE-2025-1094-checker.py
Created December 3, 2025 10:59 — forked from amitschendel/CVE-2025-1094-checker.py
A python script to check if you are vulnerable to CVE-2025-1094
#!/usr/bin/env python3
"""
PostgreSQL CVE-2025-1094 Vulnerability Checker
This script checks if a PostgreSQL installation is vulnerable to CVE-2025-1094,
a SQL injection vulnerability in PostgreSQL's escaping functions.
Usage:
python3 check_postgres_cve_2025_1094.py [options]
@adampielak
adampielak / WazuheBPFTCPTracer.py
Created November 9, 2025 11:29 — forked from elwali10/WazuheBPFTCPTracer.py
Wazuh & eBPF established TCP connections tracer
#!/usr/bin/env python
#
# tcpv4tracer Trace TCP connections & send them to Wazuh manager.
# For Linux, uses BCC, eBPF. Embedded C.
#
#
# Copyright 2017-2020 Kinvolk GmbH
# Adapted to send events to Wazuh manager - 2023 ELwali Karkoub
#
# Licensed under the Apache License, Version 2.0 (the "License")
@adampielak
adampielak / volume-WazuhManager-Migrator.sh
Created November 9, 2025 11:28 — forked from elwali10/volume-WazuhManager-Migrator.sh
Migrate Wazuh Manager volume from 4.2 to 4.3
docker volume create \
--label com.docker.compose.project=$2 \
--label com.docker.compose.version=$1 \
--label com.docker.compose.volume=wazuh_api_configuration \
$2_wazuh_api_configuration
docker volume create \
--label com.docker.compose.project=$2 \
--label com.docker.compose.version=$1 \
--label com.docker.compose.volume=wazuh_etc \
@adampielak
adampielak / README.md
Created November 4, 2025 21:29 — forked from FrankSpierings/README.md
Linux Container Escapes and Hardening
@adampielak
adampielak / 403-Bypass-Headers-List.txt
Created October 27, 2025 16:41 — forked from Spix0r/403-Bypass-Headers-List.txt
I’ve analyzed numerous tools, blogs, tweets, and other resources on bypassing 403 Forbidden errors using HTTP Headers Fuzzing techniques. After extensive research, I’ve compiled a list of headers you can fuzz to potentially bypass 403 restrictions.
Allow: CONNECT
Allow: GET
Allow: HEAD
Allow: POST
Allow: TRACE
Client-IP: 0
Client-IP: 0177.0000.0000.0001
Client-IP: 0x7F000001
Client-IP: 10.0.0.0
Client-IP: 10.0.0.1
@adampielak
adampielak / bashsnoop.sh
Created October 4, 2023 21:23 — forked from ptrsimon/bashsnoop.sh
Read not-yet-flushed history from a running shell
bpid=$(ps -o pid,comm xwwwf | grep -A1 screen| tail -1 | awk '{print $1}'); \
gcore $bpid; strings core.$bpid | grep '@' | grep root
# no gdb? no problem! dd to the rescue
bpid=$(ps -o pid,comm xwwwf | grep -A1 screen| tail -1 | awk '{print $1}'); \
offset=$(grep heap /proc/$bpid/maps|cut -d '-' -f 1); \
end=$(grep heap /proc/$bpid/maps|cut -d '-' -f 2|awk '{print $1}'); \
dd if=/proc/$bpid/mem iflag=skip_bytes,count_bytes bs=$(getconf PAGESIZE) skip=$((0x$offset)) count=$((0x$end - 0x$offset)) status=none \
| strings | grep root@

Create CA and CA-Signed Certificates


Create CA

#!/bin/bash
set -e
cd `dirname $0`
##########################################################
@adampielak
adampielak / gist:90b452416f95fc1bd9e64bdd3fdeda1e
Created January 6, 2022 10:55 — forked from marfillaster/gist:d34bd199b9e265ccd74af6d31fd9df85
Mikrotik IPv6 dns-over-https doh cloudflare google
# https://forum.mikrotik.com/viewtopic.php?t=132657
/ipv6 dhcp-server option
add code=23 name=recursivens6 value=0xfd000000000000000000000000000001
/ipv6 dhcp-server
add dhcp-option=recursivens6 interface=bridge lease-time=30m name=dhcp6
/ipv6 pool
add name=ULA-pool6 prefix=fd00::/64 prefix-length=64