Skip to content

Instantly share code, notes, and snippets.

View raczajko's full-sized avatar

Raúl Aguiar Czajkowski raczajko

  • Secretaría Técnica de Planificación del Desarrollo Económico y Social
  • Paraguay
  • X @raczajko
View GitHub Profile
@raczajko
raczajko / form.html
Last active March 17, 2021 18:25
Formulario HTML5, con leaflet para capturar datos georeferenciados en un form.
<!DOCTYPE html>
<html dir="ltr" lang="es">
<head>
<meta charset="utf-8"/>
<meta name="viewport" content="width=device-width, initial-scale=1">
<script src="https://cdnjs.cloudflare.com/ajax/libs/jquery/2.1.3/jquery.min.js"></script>
<link rel="stylesheet" href="https://cdnjs.cloudflare.com/ajax/libs/leaflet/0.7.3/leaflet.css"/>
<link rel="stylesheet" type="text/css" media="all" href="w3form6.css">
<title>Form Test</title>
@raczajko
raczajko / scrip_jenkins_backup_postgresql.sh
Created July 21, 2017 21:12
Script para el backup automatizado de TODAS las bases de datos de un servidor Postgresql utilizando jenkins
#!/bin/bash
SERVIDOR=`hostname`
SERVIDOR_BACKUP=xxx.yyy.tld
PG_VERSION=9.3
BACKUP_DIR=/tmp/
REMOTE_COPY=/mnt/backup/`hostname`/`date +%Y`/`date +%m`/`date +%d`/
ssh root@$SERVIDOR_BACKUP mkdir -p $REMOTE_COPY
TIMESLOT=`date +%Y%m%d%H%M%S`
databases=`/usr/pgsql-$PG_VERSION/bin/psql -U postgres -q -c "\l" | awk '{ print $1}' | grep -vE '^\||^-|^List|^Name|template[0|1]|^\('`
for i in $databases;
##1. Creamos el dump de la BD MySQL
mysqldump -u user -p <db> > <db>.sql
##copiamos a la vm donde haremos el cambio
scp <db>.sql <user>@192.168.1.254:/home/<user>/
##2. Instalamos docker
@raczajko
raczajko / Makefile
Created July 11, 2018 18:51 — forked from h4cc/Makefile
Ubuntu 18.04 Bionic Beaver - Basic packages i usually install
#
# Ubuntu 18.04 (Bionic Beaver)
#
# Basic packages i usually install.
#
# Author: Julius Beckmann <[email protected]>
#
# Upgraded Script from 17.04: https://gist.github.com/h4cc/09b7fe843bb737c8039ac62d831f244e
# Upgraded Script from 16.04: https://gist.github.com/h4cc/fe48ed9d85bfff3008704919062f5c9b
@raczajko
raczajko / gist:cff51cd00d6897fc5a48aefea77db0e3
Created July 16, 2023 18:21
capture PHP request to determine attacker's payload
<?php
/* may be late but he can help others.
it's not my code, I get it from :
https://gist.github.com/magnetikonline/650e30e485c0f91f2f40
*/
class DumpHTTPRequestToFile {
public function execute($targetFile) {
$data = sprintf(