Skip to content

Instantly share code, notes, and snippets.

@crawc
crawc / blacklist.txt
Created October 11, 2022 22:06 — forked from cephurs/blacklist.txt
2500+ IP malicious IP addresses
2500+ IP addresses dedicated to serving malware.
1.168.33.91
103.12.217.155
103.242.11.1
103.242.11.94
103.243.51.129
103.253.141.43
103.255.101.168
@crawc
crawc / blacklist.txt
Created October 11, 2022 22:06 — forked from cephurs/blacklist.txt
2500+ IP malicious IP addresses
2500+ IP addresses dedicated to serving malware.
1.168.33.91
103.12.217.155
103.242.11.1
103.242.11.94
103.243.51.129
103.253.141.43
103.255.101.168
@crawc
crawc / mpv-ipcam-monitor.sh
Created October 4, 2022 18:05 — forked from paius1/mpv-ipcam-monitor.sh
Script to view and Monitor rtsp:// stream from a security camera
#!/usr/bin/env bash
#
# Simple script to monitor a ipcam stream running on mpv
# using the ipc-server
# requires mpv, socat, and jq written for bash 4
# xwinwrap to run on the Desktop
# by gmail plgroves 2019
#
# script creates a kill script in same path as this script
# named This_script-kill
@crawc
crawc / index.html
Created September 19, 2022 18:19
Video.js fullscreen 360 video
<div class="player-wrapper">
<video id="player" class="player video-js vjs-default-skin vjs-big-play-centered" crossorigin="anonymous" preload="metadata" autoplay controls>
<source poster="https://raw.githubusercontent.com/Pierrinho/elephant/master/elephant.jpg" src="https://raw.githubusercontent.com/Pierrinho/elephant/master/elephant.mp4">
</video>
</div>
@crawc
crawc / udptextd.php
Created August 25, 2022 01:26 — forked from tiebingzhang/udptextd.php
An one-off PHP UDP server to listen on a UDP port and print the text received. Can be used as a very basic UDP log listener.
#!/usr/bin/php -f
<?php
error_reporting(~E_WARNING);
//Create a UDP socket
if(!($sock = socket_create(AF_INET, SOCK_DGRAM, 0))) {
$errorcode = socket_last_error();
$errormsg = socket_strerror($errorcode);
die("Couldn't create socket: [$errorcode] $errormsg \n");
}
echo "Socket created \n";
@crawc
crawc / index.html
Created February 11, 2022 02:34
Simple CSS Waves | Mobile & Full width
<div class="header">
<!--Content before waves-->
<div class="inner-header flex">
<form class="login">
<img src="https://tscencompass.com/wp-content/uploads/tsc-hc-encompass.png">
<input type="text" placeholder="Username">
<input type="password" placeholder="Password">
@crawc
crawc / index.html
Created February 11, 2022 02:02
Simple CSS Waves | Mobile & Full width
<!--Hey! This is the original version
of Simple CSS Waves-->
<div class="header">
<!--Content before waves-->
<div class="inner-header flex">
<!--Just the logo.. Don't mind this-->
<svg version="1.1" class="logo" baseProfile="tiny" id="Layer_1" xmlns="http://www.w3.org/2000/svg"
xmlns:xlink="http://www.w3.org/1999/xlink" x="0px" y="0px" viewBox="0 0 500 500" xml:space="preserve">
@crawc
crawc / index.html
Created February 11, 2022 02:00
Wavy login form
<form class="login">
<input type="text" placeholder="Username">
<input type="password" placeholder="Password">
<button>Login</button>
</form>
@crawc
crawc / iptables.txt
Created February 8, 2022 16:52 — forked from warewolf/iptables.txt
iptables based rate limiting
-A INPUT -i eth0 -p udp -m udp --dport 5060 -j SIP
#
-A SIP -i eth0 -p udp -m udp --dport 5060 -m string --string "INVITE" --algo bm --from 23 --to 28 -m comment --comment "Catch SIP INVITEs" -j SIPINVITE
-A SIP -i eth0 -p udp -m udp --dport 5060 -m string --string "REGISTER" --algo bm --from 23 --to 30 -m comment --comment "Catch SIP REGISTERs" -j SIPREGISTER
-A SIP -m comment --comment "Catch and accept everything else" -j ACCEPT
#
-A SIPINVITE -m hashlimit --hashlimit-upto 4/min --hashlimit-burst 4 --hashlimit-mode srcip,dstip,dstport --hashlimit-name anon-sip-rateinv --hashlimit-srcmask 24 -m comment --comment "Rate limit SIP invites" -j ACCEPT
-A SIPINVITE -m limit --limit 10/min -j LOG --log-prefix "SIPINV DROP: "
-A SIPINVITE -m comment --comment "Rate limit exceeded, reject" -j REJECT
#
#!/bin/bash
# [email protected]
# https://highsecurity.blogspot.com/2013/09/asteriskfreepbx-post-voicemail-trigger.html
# invokes sending to webserver socket when there's a change in voicemail events for user
# v.1.0
# prequalify if this is a reload or not, if reload, we don't do anything
server=10.10.10.1:6050
fullstring="$1 $2 $3 $4 $5"
isreload=`echo "$fullstring" | grep -c "@"`