Skip to content

Instantly share code, notes, and snippets.

View marcinantkiewicz's full-sized avatar

Marcin Antkiewicz marcinantkiewicz

View GitHub Profile
@marcinantkiewicz
marcinantkiewicz / op_write_secret.sh
Last active October 9, 2024 03:38
write secret with arbitrary attributes to 1password vault
#!/bin/bash
# default for business accounts, override with `--vault name`
vault="Employee"
while [[ "$#" -gt 0 ]]; do
case $1 in
--vault)
vault="$1"
;;
@marcinantkiewicz
marcinantkiewicz / dig-edns.md
Created April 23, 2024 15:22 — forked from fartbagxp/dig-edns.md
Testing eDNS with dig

Print secret name of secrets that do not have the versionAliases attribute

gcloud secrets list --format=json | jq '.[] | select( has("versionAliases")|not)|.name'

#! /usr/bin/env sh
while getopts sf:p ARG
do
case "${ARG}" in
s) SHORT_LIST=1;;
f) FILEPATH=${OPTARG};;
p) PULL=1;;
*) echo "\nReads GCP cloudbuild config, lists secrets contained in the file\n\nUsage: $(basename $0) [-s] -f filename\n -s short output, do not display google secrets path\n -f cloudbuild config to read\n -p list values for the secrets from GCP, in a format ready to be exported into bash\n\n" && exit 1;
esac
@marcinantkiewicz
marcinantkiewicz / pull_secrets.sh
Created November 10, 2023 16:42
read cloudbuild manifest, find secrets, pull them from Secrets Manager, and display in a way where they can be saved in env.
#! /usr/bin/env sh
set -o pipefail
FILEPATH=$1; shift;
function pull_secrets {
MANIFEST=$1; shift;
SECRETS=$(cat "${MANIFEST}" | jq -r '.availableSecrets.secretManager[] | .env + "=" + .versionName');
PROJECT_ID=$(gcloud projects list --filter $(gcloud config get project) --format="value(PROJECT_NUMBER)")
https://github.com/Hammerspoon/hammerspoon/discussions/3379
https://www.guerrilladigital.cc/2021/02/18/no-elgato-stream-deck-no-problem-i-reprogrammed-my-akai-lpd8-to-work-as-an-obs-scene-switcher/
-- A quick hammerspoon to use the buttons on my Akai LPD8
-- which is a pretty fun little drum pad that can be had
-- for $40-50 bucks if you shop around:
-- https://images.reverb.com/image/upload/s--TanFLw05--/t_card-square/v1571420337/zzyfza1vf8wsxjynymgr.jpg
devices = hs.midi.virtualSources()
@marcinantkiewicz
marcinantkiewicz / newline_in_search_params.yaml
Created March 23, 2023 21:33
nuclei template - newline in search params
id: newline_search_params
info:
name: newline_search_params
author: f
severity: low
description: search param set to newline results in empty response
tags: inputvalidation
requests:
@marcinantkiewicz
marcinantkiewicz / list_repos.js
Created March 18, 2023 23:47
List GitHub repos via browser console
// go to https://github.com/orgs/ORGNAME/repositories, open JS console
// run the below. Once done, extract with "JSON.parse(sessionStorage.repolist).forEach((e)=>{console.log(e)})"
//
// The following will covert from https to ssh endpoint link
// %s/$/.git/
// %s/https:\/\//git@/
// %s/\.com\//\.com:/
//
extract();
function extract(){
@marcinantkiewicz
marcinantkiewicz / _ verify_curl_bash.md
Last active February 8, 2023 22:49
This repo provides a trivial example script, and shows how SpectreOps preflight adds a checksum verification step to the curl| bash.. pipe installer.

verify packages installed via 'curl | bash'

Spectral Ops preflight provides an easy way to add an integrity check to the pipe installed, turning them into 'curl | checksum | bash'.

preflight-error

The process takes has two steps:

  1. calculate the checksum
  2. pass the downloaded script through preflight when executing, preflight will pass the input to its output if the calculated and provided hashes match.
if (-Not([Security.Principal.WindowsPrincipal][Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] "Administrator")){
Write-Host "Not admin, elvevating"
Start-Process powershell.exe "-NoProfile -ExecutionPolicy Bypass -File `"$PSCommandPath`"" -Verb RunAs; exit
}
else {
Write-Host "I hate PS so, so much"
Start-Sleep -Second 5
}