Skip to content

Instantly share code, notes, and snippets.

View anabelle's full-sized avatar

Anabelle Handdoek anabelle

View GitHub Profile
def receive_email
@params = params
#make sure request is a post
text = params["text"]
html = params["html"]
to = params["to"]
from = params["from"]
subject = params["subject"]
attachment1 = params["attachment1"]
lead_string = attachment1.read
rescue_from 'Emailer::Incoming::MissingInfo', 'Emailer::Incoming::Error' do |exception|
logger.warn "[Emailer::Incoming] #{exception.message}"
EmailBounce.bounce_once_per_day(exception) unless params[:from].blank?
response.content_type = Mime::TEXT
render :text => exception.message, :status => 200
end
@anabelle
anabelle / aircrack-cheatsheet.sh
Created January 13, 2012 01:33
Aircrack suite steps
# iniciar monitor
sudo airmon-ng start wlan0
# ver redes
sudo airodump-ng mon0
# Obtener handshake (reemplazar canal y MAC
sudo airodump-ng -c 3 -w wpa --bssid 00:00:00:00:00:00 mon0
# Forzar handsahake
@anabelle
anabelle / sshadd.sh
Created December 25, 2011 01:58
add ssh key to server
# Agregar esto a .bashrc o a .bash_aliases
# Uso: add_ssh [email protected]
function add_ssh {
cat ~/.ssh/id_rsa.pub | ssh $1 'cat >> .ssh/authorized_keys'
}
export -f add_ssh
@anabelle
anabelle / gist:1515478
Created December 23, 2011 22:01 — forked from ofan/gist:1508676
comon passwords
123456789
12345678
11111111
dearbook
00000000
123123123
1234567890
88888888
111111111
147258369
@anabelle
anabelle / commands-to-find-malware.sh
Created December 16, 2011 02:17
Shell commands to help finding infections in website files
# files modified within 30 days.
find /home/mywebsite -type f -name "*.php" -ctime -30
# find for suspicious strings
find ./ -name "*.php" -type f | xargs sed -i 's#<?php /\*\*/ eval(base64_decode("aWY.*?>##g' 2>&1
find ./ -name "*.php" -type f | xargs sed -i '/./,$!d' 2>&1
# grep for suspicious and very long strings
grep -R "document.write(unescape" *
grep -iR --include "*.js" "[a-zA-Z0-9\/\+]\{255,\}" *