This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
_news/news.php?id= | |
-site:php.net -"The PHP Group" inurl:source inurl:url ext:pHp | |
!Host=*.* intext:enc_UserPassword=* ext:pcf | |
?action= | |
?cat= | |
?id= | |
?intitle:index.of? mp3 artist-name-here | |
?intitle:index.of? mp3 name | |
?page= | |
?pagerequested= |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
# | |
# import masscan output and run an nmap scan on the results | |
# | |
import sys | |
import argparse | |
from libnmap.parser import NmapParser, NmapParserException | |
from libnmap.process import NmapProcess |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
for region in `aws ec2 describe-regions --output text | cut -f3` | |
do | |
echo -e "\nListing Instances in region:'$region'..." | |
aws ec2 describe-instances --region $region | jq '.Reservations[] | ( .Instances[] | {state: .State.Name, name: .KeyName, type: .InstanceType, key: .KeyName})' | |
done |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
groupname=default | |
regions=$(aws ec2 describe-regions \ | |
--output text \ | |
--query 'Regions[*].RegionName') | |
for region in $regions; do | |
default_group_id=$(aws ec2 describe-security-groups --region $region --group-name $groupname \ | |
| jq -r '.SecurityGroups[] | .GroupId') |