Skip to content

Instantly share code, notes, and snippets.

View jcran's full-sized avatar
💭
feelin fancy

Jonathan Cran jcran

💭
feelin fancy
View GitHub Profile
@jcran
jcran / git_branch_naming.md
Last active October 20, 2021 18:53 — forked from revett/git_branch_naming.md
Git Branch Naming Conventions

<type>/<name>

<type>

bug    - Code changes linked to a known issue.
feat   - New feature.
hotfix - Quick fixes to the codebase.
spike   - Spikes (will probably not be merged - just investigating / testing before moving to a feature branch).
{
"success": true,
"message": "success",
"result": [
{
"product": "Google",
"count": "2"
},
{
"product": "Cloudflare",
@jcran
jcran / intrigue.io collection results api - recent entities - example result
Last active April 7, 2020 04:38
example result from intrigue.io collection results api - recent entities
{
"success": true,
"message": "success",
"result": [
{
"name": "104.18.167.96:2087",
"type": "Intrigue::Entity::NetworkService",
"first_seen": "2020-04-06 21:51:00 UTC",
"last_seen": "2020-04-06 21:51:00 UTC",
"hidden": false,
@jcran
jcran / intrigue.io. collection results api - vulnerabilities
Created April 7, 2020 02:45
example output from intrigue.io collection results api - vulnerabilities
{
"success": true,
"message": "success",
"result": [
{
"name": "CVE-2019-11044",
"cve": "CVE-2019-11044",
"shortname": "Vulnerability in PHP",
"description": "In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 on Windows, PHP link() function accepts filenames with embedded \\0 byte and treats them as terminating at that byte. This could lead to security vulnerabilities, e.g. in applications checking paths that the code is allowed to access.",
"exploits": [],
@jcran
jcran / intrigue.io collection results api - hosts endpoint
Last active April 7, 2020 04:39
example of a result returned from intrigue.io collection results (hosts) endpoint
{
"success": true,
"message": "success",
"result": {
"104.18.210.56": {
"resolutions": [],
"first_seen": "2020-02-12 08:11:22 UTC",
"last_seen": "2020-04-04 03:04:51 UTC",
"net_name": "CLOUDFLARENET, US",
"geolocation": {
{
"success": true,
"message": "success",
"result": [
{
"entity_type": "Intrigue::Entity::Uri",
"pretty_name": "Insecure Content Loaded",
"first_seen": "2020-03-07 02:53:00 UTC",
"alias_group_id": "0.8119e5",
"last_seen": "2020-04-04 03:04:50 UTC",
{
"success": true,
"message": "success",
"result": [
{
"entity_type": "Intrigue::Entity::Uri",
"pretty_name": "Insecure Content Loaded",
"first_seen": "2020-03-07 02:53:00 UTC",
"alias_group_id": "0.8119e5",
"last_seen": "2020-04-04 03:04:50 UTC",
{
"success": true,
"message": "success",
"result": [{
"first_seen": "2020-02-12 08:11:23 UTC",
"last_seen": "2020-04-04 03:04:52 UTC",
"alias_group": "0.81279e5",
"name": "http://104.18.210.56:80",
"organization": "intrigueio",
"ancestors": [{
name, techniques, technologies, installations
“feed XYZ”, “mostly network IDS”, “uses snort + ET”, “installed at universities”
"feed abc", "endpoint", "uses OSSEC", "installed at financial institutions and amazon"
@jcran
jcran / nvd_download.sh
Created January 29, 2018 20:28 — forked from christiangalsterer/nvd_download.sh
Script to download the National Vulnerability Database files from https://nvd.nist.gov
#!/bin/sh
# https://gist.github.com/christiangalsterer/5f55389b9c50c74c31b9
# Copyright 2015 Christian Galsterer
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#