Open your sudo
file:
sudo vi /etc/pam.d/sudo
Add the following after the first line:
auth sufficient pam_tid.so
(?i)((access_key|access_token|admin_pass|admin_user|algolia_admin_key|algolia_api_key|alias_pass|alicloud_access_key|amazon_secret_access_key|amazonaws|ansible_vault_password|aos_key|api_key|api_key_secret|api_key_sid|api_secret|api.googlemaps AIza|apidocs|apikey|apiSecret|app_debug|app_id|app_key|app_log_level|app_secret|appkey|appkeysecret|application_key|appsecret|appspot|auth_token|authorizationToken|authsecret|aws_access|aws_access_key_id|aws_bucket|aws_key|aws_secret|aws_secret_key|aws_token|AWSSecretKey|b2_app_key|bashrc password|bintray_apikey|bintray_gpg_password|bintray_key|bintraykey|bluemix_api_key|bluemix_pass|browserstack_access_key|bucket_password|bucketeer_aws_access_key_id|bucketeer_aws_secret_access_key|built_branch_deploy_key|bx_password|cache_driver|cache_s3_secret_key|cattle_access_key|cattle_secret_key|certificate_password|ci_deploy_password|client_secret|client_zpk_secret_key|clojars_password|cloud_api_key|cloud_watch_aws_access_key|cloudant_password|cloudflare_api_key|cloudflare_auth_k |
#!/bin/bash | |
# Written by Frans Rosén (twitter.com/fransrosen) | |
_debug="$2" #turn on debug | |
_timeout="20" | |
#you need a valid key, since the errors happens after it validates that the key exist. we do not need the secret key, only access key | |
_aws_key="AKIA..." | |
H_ACCEPT="accept-language: en-US,en;q=0.9,sv;q=0.8,zh-TW;q=0.7,zh;q=0.6,fi;q=0.5,it;q=0.4,de;q=0.3" | |
H_AGENT="user-agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.146 Safari/537.36" |
<?php | |
// Don't include the PHP tag if PHP is already opened in the file. | |
add_filter( 'the_seo_framework_title_from_generation', function( $title, $args ) { | |
if ( ! function_exists( 'wc' ) ) return $title; | |
if ( null === $args ) { |
import xml.etree.ElementTree as ET | |
import urllib | |
import base64 | |
import math | |
import sys | |
import re | |
# usage: Open Burp, navigate to proxy history, ctrl-a to select all records, right click and "Save Items" as an .xml file. | |
# python burplist.py burprequests.xml | |
# output is saved to wordlist.txt |
#!/bin/bash | |
# by joevt Jan 7/2021 | |
dodump=1 | |
if [[ "$1" == "-s" ]]; then | |
dodump=0 | |
shift | |
fi |
#!/bin/bash | |
# chromeos_docker.sh | |
# Usage: | |
# chromeos_docker.sh recoveryfileurl name milestone arch | |
# or if image.bin already exists this works too: | |
# chromeos_docker.sh dummy name milestone arch | |
# (Default is not to delete the image after download.) | |
# e.g. | |
# Example for x86_64: | |
# chromeos_docker.sh https://dl.google.com/dl/edgedl/chromeos/recovery/chromeos_13505.73.0_nocturne_recovery_stable-channel_mp.bin.zip nocturne 87 x86_64 |
#!/bin/bash -x | |
# arch2crew | |
# Script to help with creating Chromebrew package files from Arch Linux PKGBUILD files | |
# Assumes rubocop is installed via "gem install rubocop" | |
# Usage: arch2crew <Arch Linux package name> | |
# Satadru Pramanik <[email protected]> | |
# | |
archpkgname="${1}" | |
# Initial setup |
Open your sudo
file:
sudo vi /etc/pam.d/sudo
Add the following after the first line:
auth sufficient pam_tid.so
{ | |
"pkgs" : [ | |
"ea-apache24", | |
"ea-apache24-config", | |
"ea-apache24-config-runtime", | |
"ea-apache24-mod_bwlimited", | |
"ea-apache24-mod_cgid", | |
"ea-apache24-mod_deflate", | |
"ea-apache24-mod_env", | |
"ea-apache24-mod_expires", |
#!/usr/bin/env python3 | |
""" | |
InSCRAPEsula v0.1 | |
Inspired by and sections borrowed from https://github.com/ziplokk1/incapsula-cracker-py3" | |
""" | |
import logging | |
import re | |
from ast import literal_eval | |
from base64 import b64encode, b64decode | |
from random import random |