This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
description "nginx webserver" | |
start on startup | |
stop on shutdown | |
respawn | |
expect fork | |
exec /opt/local/sbin/nginx |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
description "projeto server config" | |
pre-start script | |
mkdir -p /var/log/puma | |
chown deploy. /var/log/puma | |
mkdir -p /var/run/puma | |
chown deploy. /var/run/puma | |
end script | |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
threads 2,2 | |
# conexão do tipo unix socket | |
#bind "unix:///var/tmp/projeto.sock" | |
# conexão do tipo TCP socket | |
#bind "tcp://0.0.0.0:5000" | |
pidfile "/var/run/puma/projeto.pid" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
## | |
# This module requires Metasploit: http//metasploit.com/download | |
# Current source: https://github.com/rapid7/metasploit-framework | |
## | |
require 'msf/core' | |
class Metasploit3 < Msf::Exploit::Remote | |
Rank = ExcellentRanking | |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python | |
''' | |
# Exploit Title: python socket.recvfrom_into() remote buffer overflow | |
# Date: 21/02/2014 | |
# Exploit Author: @sha0coder | |
# Vendor Homepage: python.org | |
# Version: python2.7 and python3 | |
# Tested on: linux 32bit + python2.7 | |
# CVE : CVE-2014-1912 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Exploit Title: nginx v1.3.9-1.4.0 DOS POC (CVE-2013-2070) | |
# Google Dork: CVE-2013-2070 | |
# Date: 16.05.2013 | |
# Exploit Author: Mert SARICA - mert [ . ] sarica [ @ ] gmail [ . ] com - http://www.mertsarica.com | |
# Vendor Homepage: http://nginx.org/ | |
# Software Link: http://nginx.org/download/nginx-1.4.0.tar.gz | |
# Version: 1.3.9-1.4.0 | |
# Tested on: Kali Linux & nginx v1.4.0 | |
# CVE : CVE-2013-2070 | |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# -*- mode: ruby -*- | |
# vi: set ft=ruby : | |
Vagrant.configure("2") do |config| | |
config.vm.box = "hellobits" | |
config.vm.box_url = "http://hellobits.com/vagrant/hellobits.box" | |
config.vm.synced_folder ".", "/Projects", id: "vagrant-root" | |
# config.vm.network :private_network, ip: "192.168.50.2" | |
forward_port = ->(guest, host = guest) do |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
aaa_base | |
aaa_elflibs | |
aaa_terminfo | |
bash | |
bin | |
bzip2 | |
coreutils | |
devs | |
dhcpcd | |
dialog |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
ssh-conf(){ | |
if [ $# -lt 2 ]; then | |
echo "Faz assim: ssh-conf <Host> [<user>@]<hostname>]" >&2 | |
return 1 | |
fi | |
short=$1 | |
arg=$2 | |
if $(echo "$arg" | grep '@' >/dev/null); then |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/sh | |
ISO="cn" | |
IPT=/sbin/iptables | |
WGET=/usr/bin/wget | |
EGREP=/bin/egrep | |
SPAMLIST="countrydrop" | |
ZONEROOT="/root/iptables" |