I hereby claim:
- I am gjyoung1974 on github.
- I am gyoung_pm (https://keybase.io/gyoung_pm) on keybase.
- I have a public key ASAF8gGiFaeXCvDmIwloFWlqIl9HrqctHUPFK2P8M0YpqAo
To claim this, I am signing this object:
| #!/bin/env python3 | |
| from jira import JIRA | |
| # Get these from ENV | |
| user = "gordon.young@" | |
| token = "" | |
| jira_url = 'https://x.atlassian.net' | |
| jira = JIRA(server=jira_url, basic_auth=(user, token)) |
I hereby claim:
To claim this, I am signing this object:
| #!/usr/bin/env bash | |
| # | |
| # Summary: Use this script to rotat the root ssh key on an EC2 instance | |
| function PrintHelp() { | |
| echo "usage: $__base.sh [options...] " | |
| echo "options:" | |
| echo " -s --ssh-key-file Path to EC2 private ssh key file for the key to be replaced. Required." | |
| echo " -h --host IP address or DNS name for the EC2 instance. Required." | |
| echo " -a --aws-key-file The file for the .csv access key file for an AWS administrator. Optional. The AWS administrator" |
| import pkcs11 | |
| # Load the library & select the token | |
| lib = pkcs11.lib("/usr/local/lib/softhsm/libsofthsm2.so") | |
| token = lib.get_token(token_label='root') | |
| # Open a session on our token | |
| with token.open(user_pin='1234') as session: | |
| # Generate an RSA keypair in this session | |
| pub, priv = session.generate_keypair(pkcs11.KeyType.RSA, 2048) |
| function Set-PasswordRemotely { | |
| [CmdletBinding()] | |
| param( | |
| [Parameter(Mandatory = $true)][string] $UserName, | |
| [Parameter(Mandatory = $true)][string] $OldPassword, | |
| [Parameter(Mandatory = $true)][string] $NewPassword, | |
| [Parameter(Mandatory = $true)][alias('DC', 'Server', 'ComputerName')][string] $DomainController | |
| ) | |
| $DllImport = @' | |
| [DllImport("netapi32.dll", CharSet = CharSet.Unicode)] |
| <?xml version="1.0" encoding="UTF-8"?> | |
| <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> | |
| <plist version="1.0"> | |
| <dict> | |
| <key>PayloadContent</key> | |
| <array> | |
| <dict> | |
| <key>ADOrganizationalUnit</key> | |
| <string>OU=Company,OU=Computers</string> | |
| <key>HostName</key> |
| #!/usr/bin/env python | |
| import ldap | |
| from utilities.conv_time import filetime_to_dt | |
| # Instantiate LDAP object | |
| l = ldap.initialize("ldap://1.1.1.1") | |
| bind = l.simple_bind_s("gordon.young@ad.acme", "somePassw0rd") | |
| l.protocol_version = ldap.VERSION3 | |
| l.set_option(ldap.OPT_REFERRALS, 0) |
| $SearchBase='OU=Users,OU=SomeOU,DC=ad,DC=SomeDomain' | |
| $arr = Get-ADUser -Server "ad.SomeDomain" -SearchBase $SearchBase -Filter * | |
| ForEach ($item in $arr) { | |
| # Prepare the command line | |
| $command = @' | |
| cmd.exe /C C:\Windows\ADMT\admt.exe USER /n $item.SamAccountName.ToString() /o C:\users\SomeUser\options.ini | |
| '@ | |
| # store the object: |
| #********************************************************************************************* | |
| # Create a folder named C:\Script prior executing the Script and a BATCH file | |
| # Also create a Text file named C:\Script\Script.txt. | |
| # Paste the following command into the text file delete shadows all. | |
| # It will delete all full server backup shadow copies for efficient disk space management. | |
| #********************************************************************************************* | |
| #Backup systemstate and delete all backups except last 4 copies.START | |
| #wbadmin start backup -backuptarget:D: -allCritical -vssfull -quiet | |
| #diskshadow.exe /s C:\Script\Script.txt |
| GITHUB_TOKEN="token" | |
| export PS1="\[\e[34m\]\u\[\e[m\]\[\e[35m\]@\[\e[m\]\[\e[32m\]\h\[\e[m\]:\[\e[36m\]\w\[\e[m\]\[\e[33m\]\[\e[m\]:\\$\[\e[m\] " | |
| alias dockerrm='docker rmi -f $(docker images -a -q)' | |
| vpn() | |
| { | |
| sudo charon-cmd \ |