I hereby claim:
- I am neu5ron on github.
- I am neu5ron (https://keybase.io/neu5ron) on keybase.
- I have a public key whose fingerprint is 6A0E 02A4 E191 1C10 DAB4 F257 C2E9 3D96 A895 5C05
To claim this, I am signing this object:
3d-game.com #dtdns.com | |
4irc.com #dtdns.com | |
b0ne.com #dtdns.com | |
bbsindex.com #dtdns.com | |
chatnook.com #dtdns.com | |
darktech.org #dtdns.com | |
deaftone.com #dtdns.com | |
dtdns.net #dtdns.com | |
effers.com #dtdns.com | |
etowns.net #dtdns.com |
domain_regex = r'(([\da-zA-Z])([_\w-]{,62})\.){,127}(([\da-zA-Z])[_\w-]{,61})?([\da-zA-Z]\.((xn\-\-[a-zA-Z\d]+)|([a-zA-Z\d]{2,})))' | |
#Python | |
domain_regex = '{0}$'.format(domain_regex) | |
valid_domain_name_regex = re.compile(domain_regex, re.IGNORECASE) | |
self.domain_name = self.domain_name.lower().strip().encode('ascii') | |
if re.match(valid_domain_name_regex, self.domain_name ): | |
return True | |
else: | |
return False |
dynu.com | |
dyn.com | |
no-ip.com | |
noip.com | |
changeip.com | |
afraid.org | |
duckdns.org | |
dnsdynamic.org | |
duiadns.net | |
myonlineportal.com |
I hereby claim:
To claim this, I am signing this object:
#define ROOT C:\Program Files\nxlog | |
define ROOT C:\Program Files (x86)\nxlog | |
Moduledir %ROOT%\modules | |
CacheDir %ROOT%\data | |
Pidfile %ROOT%\data\nxlog.pid | |
SpoolDir %ROOT%\data | |
LogFile %ROOT%\data\nxlog.log | |
<Extension _json> |
sudo apt-get -y install build-essential checkinstall automake libtool pkg-config; | |
wget -O libsodium.tar.gz https://download.libsodium.org/libsodium/releases/LATEST.tar.gz | |
mkdir libsodium && tar -zxvf libsodium.tar.gz -C libsodium --strip-components=1; | |
cd libsodium; | |
chmod +x configure && sh ./configure; | |
make; | |
sudo make install; | |
sudo ldconfig; | |
cd ../; | |
wget -O dnscrypt.tar.gz https://download.dnscrypt.org/dnscrypt-proxy/LATEST.tar.gz; |
filter { | |
if [@meta][log][type] == "windows-wef" { | |
# PowerShell Operational Only | |
if [Channel] == "Microsoft-Windows-PowerShell/Operational" { | |
# EventID 4103 | |
if [EventID] == 4103 { |
<QueryList> | |
<Query Id="0" Path="Security"> | |
<Select Path="Security"> | |
*[EventData[Data[@Name='ObjectName'] and (Data='C:\Users\Public\Documents\new-login-information.txt')]] | |
and | |
*[System[(EventID='4663')]] | |
</Select> | |
</Query> | |
</QueryList> |
#define ROOT C:\Program Files\nxlog | |
define ROOT C:\Program Files (x86)\nxlog | |
Moduledir %ROOT%\modules | |
CacheDir %ROOT%\data | |
Pidfile %ROOT%\data\nxlog.pid | |
SpoolDir %ROOT%\data | |
LogFile %ROOT%\data\nxlog.log | |
<Extension _json> |
module HTTP; | |
# Add additional HTTP Headers | |
redef record Info += { | |
#Origin "Origin" | |
origin: string &log &optional; | |
}; | |
event http_header(c: connection, is_orig: bool, name: string, value: string) &priority=5 |