These are a list of usages of shell commands I can't live without on UNIX-based systems.
Using Homebrew (yes, I am opinionated) you can install the following tools with the following packages:
===== config.ru | |
require 'api' # Loads the app(s) | |
map("/v1/component_a") do | |
run Sinatra.new(Pwnix::ComponentA) | |
end | |
map("/v1/component_b") do | |
run Sinatra.new(Pwnix::ComponentB) |
module Intrigue | |
module Scanner | |
class RecursiveDnsBrute < Intrigue::Scanner::Base | |
private | |
### Main "workflow" function | |
# | |
def _recurse(entity, depth) |
17:53:06 worker.1 | [-] dns_brute_sub: Hit exception: no address for ns221.yahoo.com | |
17:53:07 worker.1 | [-] dns_brute_sub: Hit exception: no address for ns222.yahoo.com | |
17:53:07 worker.1 | [-] dns_brute_sub: Hit exception: no address for us.m11.yahoo.com | |
17:53:07 worker.1 | [-] dns_brute_sub: Hit exception: no address for us.m12.yahoo.com | |
17:53:07 worker.1 | [-] dns_brute_sub: Hit exception: no address for us.m21.yahoo.com | |
17:53:07 worker.1 | [-] dns_brute_sub: Hit exception: no address for us.m22.yahoo.com | |
17:53:07 worker.1 | [-] dns_brute_sub: Hit exception: no address for w11.yahoo.com | |
17:53:07 worker.1 | [-] dns_brute_sub: Hit exception: no address for w12.yahoo.com | |
17:53:07 worker.1 | [-] dns_brute_sub: Hit exception: no address for w21.yahoo.com | |
17:53:07 worker.1 | [-] dns_brute_sub: Hit exception: no address for w22.yahoo.com |
<?php session_start(); ?> | |
<?php | |
if (empty($_SESSION['path'])) { | |
$_SESSION['user'] = shell_exec('whoami'); | |
$_SESSION['host'] = shell_exec('hostname'); | |
$_SESSION['path'] = dirname(__FILE__); | |
} | |
function showInfo($cmd) { | |
$user = $_SESSION['user']; |
#!/bin/sh | |
# https://gist.github.com/christiangalsterer/5f55389b9c50c74c31b9 | |
# Copyright 2015 Christian Galsterer | |
# | |
# Licensed under the Apache License, Version 2.0 (the "License"); | |
# you may not use this file except in compliance with the License. | |
# You may obtain a copy of the License at | |
# |
name, techniques, technologies, installations | |
“feed XYZ”, “mostly network IDS”, “uses snort + ET”, “installed at universities” | |
"feed abc", "endpoint", "uses OSSEC", "installed at financial institutions and amazon" |
{ | |
"success": true, | |
"message": "success", | |
"result": [{ | |
"first_seen": "2020-02-12 08:11:23 UTC", | |
"last_seen": "2020-04-04 03:04:52 UTC", | |
"alias_group": "0.81279e5", | |
"name": "http://104.18.210.56:80", | |
"organization": "intrigueio", | |
"ancestors": [{ |
{ | |
"success": true, | |
"message": "success", | |
"result": [ | |
{ | |
"entity_type": "Intrigue::Entity::Uri", | |
"pretty_name": "Insecure Content Loaded", | |
"first_seen": "2020-03-07 02:53:00 UTC", | |
"alias_group_id": "0.8119e5", | |
"last_seen": "2020-04-04 03:04:50 UTC", |
{ | |
"success": true, | |
"message": "success", | |
"result": [ | |
{ | |
"entity_type": "Intrigue::Entity::Uri", | |
"pretty_name": "Insecure Content Loaded", | |
"first_seen": "2020-03-07 02:53:00 UTC", | |
"alias_group_id": "0.8119e5", | |
"last_seen": "2020-04-04 03:04:50 UTC", |