Skip to content

Instantly share code, notes, and snippets.

View miglen's full-sized avatar
👨‍💻

Miglen Evlogiev miglen

👨‍💻
View GitHub Profile
@miglen
miglen / Esox-Lucius_PiHoleblocklists.txt
Created September 30, 2021 10:13
Esox-Lucius_PiHoleblocklists.txt
This file has been truncated, but you can view the full file.
# Source https://github.com/Esox-Lucius/PiHoleblocklists
0-800-email.com
0-aprcredit-card.website
0-aprcredit-cards.website
0-aprcreditcard.website
0-aprcreditcards.website
0-secure-paypal.com
0.0.0.0 0-0.028.openvpn.cloud.btcchina.com
0.0.0.0 0-100-195.btcc.com
0.0.0.0 0-100-bhd.foxypool.cf
@miglen
miglen / README.md
Created September 1, 2021 13:18
Notes from Vulnerability management in package dependencies @ Softuni - 31.08.2021

Overview

The following page contains my notes and links about the seminar we had @ Softuni on Vulnerability management in package dependencies at 31st of August 2021.

@miglen
miglen / packagejson.py
Created February 10, 2021 11:55
Dirty check for non existing public npm dependencies
#!/bin/env python3
# https://www.bleepingcomputer.com/news/security/researcher-hacks-over-35-tech-firms-in-novel-supply-chain-attack/
# The following script finds all package.json files in the current dir and checks if there are referenced any
# dependencies that no public package is available for, making your application vulnerable to supply-chain attack.
# Simply run ./packagejson.py in your root repository direcotory.
import json
import requests
from pathlib import Path
import urllib.parse
@miglen
miglen / aws.opml
Created February 9, 2021 10:06 — forked from benkehoe/aws.opml
AWS RSS feeds
<?xml version="1.0" encoding="UTF-8"?>
<opml version="1.0">
<head>
<title>AWS RSS feeds 2019-04-22</title>
</head>
<body>
<outline text="AWS" title="AWS">
<outline type="rss" text="Infrastructure &amp; Automation" title="Infrastructure &amp; Automation" xmlUrl="https://aws.amazon.com/blogs/infrastructure-and-automation/feed/" htmlUrl="https://aws.amazon.com/blogs/infrastructure-and-automation/"/>
<outline type="rss" text="AWS Developer Blog" title="AWS Developer Blog" xmlUrl="http://feeds.feedburner.com/AwsDeveloperBlog" htmlUrl="https://aws.amazon.com/blogs/developer/"/>
@miglen
miglen / check-CVE-2021-3156.sh
Created January 27, 2021 15:10
Test and patch CVE-2021-3156
#!/bin/bash
# Test and patch CVE-2021-3156
patch() {
# Simple method to patch with yum | apt
if command -v apt-get >/dev/null; then
sudo apt-get update
sudo apt-get install $1
elif command -v yum >/dev/null; then
sudo yum updateinfo $1
@miglen
miglen / iam_priviledge_escallation_deny_poilcy.json
Created December 15, 2020 17:52
IAM Policy to deny API actions that could potentially allow privilege escalation.
{
"Version": "2012-10-17",
"Statement": [{
"Sid": "DenyPriviledgeEscallationActions",
"Effect": "Deny",
"Action": [
"cloudformation:CreateStack",
"codestar:AssociateTeamMember",
"codestar:CreateProject",
"codestar:CreateProjectFromTemplate",
@miglen
miglen / ec2-instance-prompt.sh
Last active January 23, 2024 17:11
AWS EC2 Instance Prompt with EC2 ARN Instance Id Public IP Private IP Account Id Region and Instance Name Tag
#!/bin/bash
#
# description: EC2 Instance Prompt
# author: Miglen Evlogiev <[email protected]>
#
# deployment: copy this file into /etc/profile.d/ec2-instance-prompt.sh
# sudo wget https://gist.githubusercontent.com/miglen/e2e577b95acf1171a1853871737323ce/raw/ec2-instance-prompt.sh -P /etc/profile.d/
# sudo bash /etc/profile.d/ec2-instance-prompt.sh
#
@miglen
miglen / flyefit.py
Created August 25, 2020 15:35
Automatic booking of flyefit.ie sessions.
#!/usr/bin/env python
# -*- coding: utf-8 -*-
import datetime
import requests
from bs4 import BeautifulSoup
"""
The following script books specified sessions for
tomorrow in flyefiet gym web app.
"""
@miglen
miglen / web-servers.md
Created March 9, 2019 15:40 — forked from willurd/web-servers.md
Big list of http static server one-liners

Each of these commands will run an ad hoc http static server in your current (or specified) directory, available at http://localhost:8000. Use this power wisely.

Discussion on reddit.

Python 2.x

$ python -m SimpleHTTPServer 8000
@miglen
miglen / natas.md
Last active November 14, 2018 15:41
OverTheWire - Natas challenge

URL: http://overthewire.org/wargames/natas/ Type: Web

Natas Level 0

curl -s -u natas0:natas0 http://natas0.natas.labs.overthewire.org

The password is hidden in the source-code.

Natas Level 1