Skip to content

Instantly share code, notes, and snippets.

View cmackenzie1's full-sized avatar
🏠
Working from home

Cole Mackenzie cmackenzie1

🏠
Working from home
View GitHub Profile
@stefandanaita
stefandanaita / cf-logpush-destination-worker.ts
Last active January 7, 2023 19:26
Code for a worker that can receive logpush http requests and parse the contents using streams
// SPDX-License-Identifier: MIT-0
export interface Env {
}
export default {
async fetch(
request: Request,
env: Env,
@cmackenzie1
cmackenzie1 / Lightroom Manifesto.md
Last active March 23, 2023 04:12
My cheatsheet / quick guide to using Adobe Lightroom.

Lighroom Manifesto ✊

🚩 Flags:

Assign flags right after an import to filter out the obviously bad shots and ones you'd like to keep. Use your first instinct and leave undecided ones as unflagged.

  • Pick (P): In focus, eyes open, good positioning
  • Reject (X): Out of focus, blurry motion, eyes closed
  • Unflag (U):
@Neo23x0
Neo23x0 / log4j_rce_detection.md
Last active September 11, 2024 21:41
Log4j RCE CVE-2021-44228 Exploitation Detection

log4j RCE Exploitation Detection

You can use these commands and rules to search for exploitation attempts against log4j RCE vulnerability CVE-2021-44228

Grep / Zgrep

This command searches for exploitation attempts in uncompressed files in folder /var/log and all sub folders

sudo egrep -I -i -r '\$(\{|%7B)jndi:(ldap[s]?|rmi|dns|nis|iiop|corba|nds|http):/[^\n]+' /var/log