$ cosign verify registry.k8s.io/kube-apiserver-amd64:v1.25.2
https://github.com/jonjohnsonjr/apkrane
$ apkrane ls https://packages.wolfi.dev/os/x86_64/APKINDEX.tar.gz --latest --full
$ cosign verify registry.k8s.io/kube-apiserver-amd64:v1.25.2
https://github.com/jonjohnsonjr/apkrane
$ apkrane ls https://packages.wolfi.dev/os/x86_64/APKINDEX.tar.gz --latest --full
#!/usr/bin/env python | |
# -*- coding: utf-8 -*- | |
# | |
# This is how I used it: | |
# $ cat ~/.bash_history | python bash-to-zsh-hist.py >> ~/.zsh_history | |
import sys | |
import time |
#!/bin/bash -eu | |
set -o pipefail | |
# Run a command and report status to https://healthchecks.io | |
usage() { | |
echo "Usage: $0 <healthchecks.io UUID> <command>" | |
exit 1 | |
} | |
trap usage EXIT |
""" | |
Play with AWS EC2 describe_instance_types | |
""" | |
from boto3.session import Session | |
sess = Session() | |
ec2c = sess.client('ec2') | |
resp = ec2c.describe_instance_types() |
#!/bin/bash | |
############################################################################## | |
# ossa.sh - Open Source Security Assessment | |
# | |
# | |
# Author(s): Craig Bender <[email protected]> | |
# | |
# This program is free software: you can redistribute it and/or modify | |
# it under the terms of the GNU General Public License as published by | |
# the Free Software Foundation, version 3 of the License. |
#!/bin/bash | |
# Inspired on https://david-kerwick.github.io/2017-01-04-combining-zsh-history-files/ | |
set -e | |
history1=$1 | |
history2=$2 | |
merged=$3 | |
echo "Merging history files: $history1 + $history2" | |
test ! -f $history1 && echo "File $history1 not found" && exit 1 |
Information can be put into dmi tables via some qemu-system hosts (x86_64 and aarch64). That information is exposed in Linux under /sys/class/dmi/id
and can be read with dmidecode
. The names are very annoyingly inconsistent. The point of this doc is to map them.
Example qemu cmdline:
qemu-system-x86_64 -smbios type=<type>,field=value[,...]
qemu-system-x86_64 -smbios type=0,vendor=superco,version=1.2.3
backdoor-image can be used to easily add user with passwordless sudo access to a image or a root filesystem.
Operating on an image requires the 'mount-image-callback' tool from
cloud-utils. That can be installed on ubuntu via apt-get install -qy cloud-image-utils
.
#!/usr/bin/env python3 | |
"""Generate a presigned URL to download an S3 object | |
<cmd> bucket_name key_name [expiration_days]""" | |
import sys | |
import boto3 | |
from botocore.client import Config |
#!/bin/bash | |
## Pass local .tar.gz path as first argument | |
# Update the following variables | |
# This will be created if it does not exist | |
ACCOUNT_NAME="philrocheubuntu" | |
# This will be created if it does not exist | |
CONTAINER="philrocheubuntuimages" | |
# Customize this as all vm resouces with this group will be cleaned up. This will be created if it does not exist |