Aşağıda yer alan komutlar sanal bir qemu köprülü ağı kurmak içindir. Ana bilgisayar koşuğlara sanal ip aralığı üzerinden erişebilir.
qemu, vde2, dnsmasq
#!/bin/sh
# QEMU/VDE network environment preparation script
| #!/bin/sh | |
| tmux new-session -d -s work1 'cd a/b/c'; # start new detached tmux session, run htop | |
| tmux split-window; # split the detached tmux session | |
| tmux send 'cd /d/e/f' ENTER; # send 2nd command 'htop -t' to 2nd pane. I believe there's a `--target` option to target specific pane. | |
| #tmux a; | |
| tmux new-session -d -s work2 'htop'; | |
| # default vertical / -h horizontal | |
| tmux split-window -h; | |
| tmux send 'a/b/c/myscript.sh' ENTER; | |
| tmux a; |
| #!/bin/bash | |
| # | |
| # build static tar because we need exercises in minimalism | |
| # MIT licentar: google it or see robxu9.mit-license.org. | |
| # https://github.com/luciusmagn/tar-static/ | |
| # For Linux, also builds musl for truly static linking. | |
| tar_version="1.34" | |
| musl_version="1.2.2" |
| /* SPDX-License-Identifier: GPL-2.0 */ | |
| /* | |
| * Copyright 2022 CM4all GmbH / IONOS SE | |
| * | |
| * author: Max Kellermann <[email protected]> | |
| * | |
| * Proof-of-concept exploit for the Dirty Pipe | |
| * vulnerability (CVE-2022-0847) caused by an uninitialized | |
| * "pipe_buffer.flags" variable. It demonstrates how to overwrite any | |
| * file contents in the page cache, even if the file is not permitted |
| #!/bin/sh | |
| tmux new-session -d | |
| tmux split-window -v | |
| tmux split-window -h | |
| tmux swap-pane -D | |
| tmux split-window -h | |
| tmux -2 attach-session -d |
| server: | |
| http_listen_port: 9080 | |
| grpc_listen_port: 0 | |
| positions: | |
| filename: /tmp/positions.yaml | |
| client: | |
| url: http://${LOKI_SERVER}:${LOKI_PORT}/api/prom/push |
| #!/usr/bin/env python3 | |
| import sys | |
| import socket, os | |
| import json | |
| soket = os.getenv("GREETD_SOCK") | |
| client = socket.socket(socket.AF_UNIX, socket.SOCK_STREAM) | |
| client.connect(soket) |
| #!/bin/env python3 | |
| import boto3 | |
| import requests | |
| import json | |
| import os | |
| import sys | |
| from botocore.config import Config | |
| s3 = boto3.client('s3') |