This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# The following example shows a way to use iptables for basic round-robin load balancing, by redirecting | |
# packets two one of three ports based on a statistic counter. | |
# | |
# TCP packets for new sessions arriving on port 9000 will rotate between ports 9001, 9002 and 9003, where | |
# three identical copies of some application are expected to be listening. | |
# | |
# Packets that aren't TCP or that related to an already-established connection are left untouched, letting | |
# the standard iptables connection tracking machinery send it to the appropriate port. | |
# | |
# For this to work well, connections need to be relatively short. Ideally there would be an extra layer |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# install build deps | |
sudo yum install gcc gcc-c++ make expat-devel gettext-devel libcurl-devel \ | |
libffi-devel libxml2-devel libxslt-devel libyaml-devel postgresql-server \ | |
postgresql-devel readline-devel sqlite-devel openssl-devel ruby-devel \ | |
rubygems autoconf automake bison libtool libpcap-devel | |
# install rbenv | |
git clone https://github.com/sstephenson/rbenv.git ~/.rbenv | |
git clone https://github.com/sstephenson/ruby-build.git ~/.rbenv/plugins/ruby-build | |
echo 'export PATH="$HOME/.rbenv/bin:$PATH"' >> ~/.bash_profile |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
103.246.148.0/23 | |
103.246.150.0/23 | |
103.4.8.0/21 | |
103.8.172.0/22 | |
122.248.192.0/18 | |
13.112.0.0/14 | |
13.124.0.0/16 | |
13.125.0.0/16 | |
13.126.0.0/15 | |
13.208.0.0/16 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<%-- | |
jsp File browser 1.2 | |
Copyright (C) 2003-2006 Boris von Loesch | |
This program is free software; you can redistribute it and/or modify it under | |
the terms of the GNU General Public License as published by the | |
Free Software Foundation; either version 2 of the License, or (at your option) | |
any later version. | |
This program is distributed in the hope that it will be useful, but | |
WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or | |
FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
» city | |
» country | |
nginx city:"San Diego" country:US | |
» geo | |
Devices within a 50km radius of San Diego (32.8,-117): geo:32.8,-117,50 | |
» hostname | |
"Server: gws" hostname:google | |
» net | |
net:216.219.0.0/16 | |
» os |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# | |
# Poc | |
# | |
# ./CVE-2017-5638.sh 192.168.9.3 | |
# | |
# by f0r34chb3t4 - Qui Abr 12 21:00:24 -03 2018 | |
# | |
# CVE-2017-5638 | |
# Apache Struts 2 Vulnerability Remote Code Execution |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# | |
# Poc | |
# by f0r34chb3t4 - Qui Abr 12 21:00:24 -03 2018 | |
# | |
# CVE-2017-5638 | |
# Apache Struts 2 Vulnerability Remote Code Execution | |
# | |
# chmod a+x CVE-2017-5638-poc.sh | |
# |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# | |
# Poc | |
# by f0r34chb3t4 - Qui Abr 12 21:00:24 -03 2018 | |
# | |
# CVE-2017-5638 | |
# Apache Struts 2 Vulnerability Remote Code Execution | |
# | |
# chmod a+x CVE-2017-5638-poc.sh | |
# |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
REDSOCKS |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# Create new chain | |
iptables -t nat -N REDSOCKS | |
# Ignore LANs and some other reserved addresses. | |
iptables -t nat -A REDSOCKS -d 0.0.0.0/8 -j RETURN | |
iptables -t nat -A REDSOCKS -d 10.0.0.0/8 -j RETURN | |
iptables -t nat -A REDSOCKS -d 127.0.0.0/8 -j RETURN | |
iptables -t nat -A REDSOCKS -d 169.254.0.0/16 -j RETURN | |
iptables -t nat -A REDSOCKS -d 172.16.0.0/12 -j RETURN |