This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
sudo dnf update -y && sudo dnf autoremove -y | |
reboot | |
# Enable RPMFusion repos: https://docs.fedoraproject.org/en-US/quick-docs/rpmfusion-setup/ | |
sudo dnf install https://mirrors.rpmfusion.org/free/fedora/rpmfusion-free-release-$(rpm -E %fedora).noarch.rpm https://mirrors.rpmfusion.org/nonfree/fedora/rpmfusion-nonfree-release-$(rpm -E %fedora).noarch.rpm | |
sudo dnf config-manager --enable fedora-cisco-openh264 | |
sudo dnf update @core | |
# If secure boot | |
sudo dnf install kmodtool akmods mokutil openssl |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# Run cron jobs for all wordpress sites in a folder using WP CLI. | |
# Author: https://github.com/ph33nx | |
# !IMP: Change BASE_DIR below to the folder that has the wordpress sites. Ex: /var/www or /usr/share/nginx etc.. | |
BASE_DIR="/path_to_folder_that_has_wordpress_sites/" | |
# Check for wp-cli.phar existence in the system | |
if ! command -v wp &> /dev/null; then | |
echo "WP-CLI could not be found. Please install it first." |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# backup_mysql_db.sh | |
# This script backs up each MySQL/MariaDB database into its own file daily. | |
# The backups are stored in /var/backups/mysql/<database_name>/<database_name>_<date_time>.sql | |
# Backups older than 30 days are automatically deleted. | |
# | |
# Author: Ph33nx | |
# GitHub: https://github.com/ph33nx | |
# |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# This script is designed to update WordPress core, plugins, and themes, | |
# set correct file permissions, and restart Nginx and PHP-FPM services. | |
# Update www-data user to the filesystem user of WP. | |
# !IMP: Make sure WP CLI is installed: https://wp-cli.org/ | |
# | |
# Original script concept by https://github.com/ph33nx | |
# | |
# To schedule this script to run every Thursday at 4 AM, add the following line to your crontab: |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# On Fresh windows installation, open powershell or terminal and run the script as following: | |
# powershell.exe -executionpolicy bypass -file .\fresh-windows-dev-enviroment.ps1 | |
winget install Git.Git | |
winget install GitHub.GitLFS | |
git config --global core.autocrlf false | |
winget install Microsoft.VisualStudioCode | |
winget install OpenJS.NodeJS.LTS # NodeJS LTS | |
winget install Python.Python.3.12 # Python 3.12 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Get the current directory | |
$folder = Get-Location | |
# Delete hidden files recursively based on pattern | |
Get-ChildItem -Path $folder -Recurse -Force -File | Where-Object { $_.Name -like "._*" } | ForEach-Object { | |
# Remove any file attributes | |
Set-ItemProperty -Path $_.FullName -Name Attributes -Value 0 | |
# Attempt to delete the file | |
Remove-Item -Path $_.FullName -Force | |
} |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# Install Homebrew | |
/bin/bash -c "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/HEAD/install.sh)" | |
(echo; echo 'eval "$(/opt/homebrew/bin/brew shellenv)"') >> ~/.zprofile | |
eval "$(/opt/homebrew/bin/brew shellenv)" | |
brew analytics off |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# This script is meant to be run on a fresh Ubuntu 24.04 LTS installation. | |
# Tired of manually installing LEMP stack on Ubuntu? This script will do it for you. | |
# | |
# Optionally, This script restores a server from a backup. It assumes the following directory structure: | |
# - backup/ | |
# - nginx/ (contains nginx configuration files) | |
# - db/ (contains .sql files for database restoration) | |
# - sites.zip (zipped file containing site files) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
:: ################################################################ | |
:: ## 🔥 WinMasterBlocker 🔥 # | |
:: ################################################################ | |
:: # Author: https://github.com/ph33nx # | |
:: # Repo: https://github.com/ph33nx/WinMasterBlocker # | |
:: # # | |
:: # This script blocks inbound/outbound network access # | |
:: # for major apps like Adobe, Autodesk, Corel, Maxon, # | |
:: # and more using Windows Firewall. # | |
:: # # |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
@REM This batch script loops through all exe's inside a directory and blocks all .exe's inside that folder and its subfolders using windows inbuilt firewall. | |
@REM IMP: Replace FOLDER_NAME with the folder in which you want all .exe's blocked. or replace the whole url, for ex: C:\Program Files\Adobe | |
@ setlocal enableextensions | |
@ cd /d "%~dp0" | |
@for /R "C:\Program Files\FOLDER_NAME" %%a in (*.exe) do ( | |
netsh advfirewall firewall add rule name="%%~na (Blocked using script)" dir=out program="%%a" action=block |