Grab the main page with all the links:
curl https://slackmojis.com/ > emoji
Open file in vim and run the following commands:
v/src=/d
%s/^.*https:/https:/g"
%s/?.*$//g
Grab the main page with all the links:
curl https://slackmojis.com/ > emoji
Open file in vim and run the following commands:
v/src=/d
%s/^.*https:/https:/g"
%s/?.*$//g
I hereby claim:
To claim this, I am signing this object:
event bro_init() | |
{ | |
for (stream in Log::active_streams) | |
{ | |
local filter = Log::get_filter(stream, "default"); | |
filter$path = fmt("bro_%s", filter$path); | |
Log::add_filter(stream, filter); | |
} | |
} |
https://kansascity.craigslist.org/sys/d/dell-t7400-precision/6238490010.html
If all of these files are in the same directory, you can run the following steps to deploy
Download the roles
ansible-galaxy install -r requirements.yml
Run the deploy playbook
ansible-playbook deploy.yml
input { | |
kafka { | |
topics => ["bro-raw"] | |
add_field => { "[@metadata][stage]" => "broraw_kafka" } | |
# Set this to one per kafka partition to scale up | |
#consumer_threads => 4 | |
group_id => "bro_logstash" | |
bootstrap_servers => | |
codec => json | |
auto_offset_reset => "earliest" |
Import-Module ActiveDirectory | |
$password = (Read-Host -AsSecureString "AccountPassword") | |
$users = import-csv ".\users.csv" | |
foreach ($user in $users){ | |
New-ADUser ` | |
-SamAccountName ($user.GivenName + "." + $user.Surname).ToLower() ` | |
-UserPrincipalName (($user.GivenName + "." + $user.Surname).ToLower() + "@" + $env:USERDNSDOMAIN) ` | |
-DisplayName ($user.GivenName + " " + $user.Surname) ` |
{ | |
"order": 10, | |
"index_patterns": [ | |
"bro-diag-*" | |
], | |
"mappings": { | |
"_doc": { | |
"properties": { | |
"acks": { | |
"type": "long" |
#ASA-1-113039 | |
%{CISCO_TAGGED_SYSLOG} Group <%{DATA:group.name}> User <%{USER:user.name}> IP <%{IP:source.ip}> %{GREEDYDATA:cisco_message} |
I recently ran into an issue while replaying some network traffic that was captured as pcap-ng and I wanted to share what I had to do to get things working.
The issue is that the packet capture contained traffic from two NICs, which is supported by pcap-ng, but not pcap. The commands here filter by interface and then convert the individual interface captures into regular pcap.