Skip to content

Instantly share code, notes, and snippets.

View robdyke's full-sized avatar

Rob Dyke robdyke

View GitHub Profile
@robdyke
robdyke / credentials.txt
Last active August 12, 2017 18:09
xmr-stak-cpu - config elements
"pool_address" : "$POOL_ADDR",
"wallet_address" : "$WALLET",
"pool_password" : "$POOL_PWD",
@robdyke
robdyke / CONDUCT-template.md
Created February 3, 2018 21:49
Project template files

Code of Conduct

Our Pledge

In the interest of fostering an open and welcoming environment, we as contributors and maintainers pledge to making participation in our project and our community a harassment-free experience for everyone, regardless of age, body size, disability, ethnicity, gender identity and expression, level of experience, nationality, personal appearance, race, religion, or sexual identity and orientation.

@robdyke
robdyke / docker-compose.yml
Created June 28, 2018 00:44 — forked from ernest-okot/docker-compose.yml
Traefik Docker Stack with HTTPS integration with LetsEncrypt
version: '3'
services:
traefik:
image: traefik:alpine
command: |-
--entryPoints="Name:http Address::80 Redirect.EntryPoint:https"
--entryPoints="Name:https Address::443 TLS"
--defaultentrypoints="http,https"
--accesslogsfile="/var/log/access.log"
@robdyke
robdyke / authorized_keys
Last active July 3, 2018 09:07
Public Keys
ssh-rsa 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 [email protected]
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDAXT+xavUgdpmdTbmguXv71mEXLPyJCnrSBNkjulrEsyxuRck3IT6ZumG/q47FTJXbBhL4O2EFhGnSP6IVUmUIu63zm42nhRusLitp5Of6GKD978amK/mgi5CFjkp1MsRdLtgpAioeFKSu+r8BXcnj/ActcFD/Jl6pxqnURJ/J0yOyCB5pL6CAADGv29IyU/VndetvyBZbGhed4YdTx6HQ+NZfIvlZyffRijCKeq7h7Bjnp1HTV4Z4
@robdyke
robdyke / odoo_calculate_workers.sh
Created December 22, 2018 01:58
Analyzes the characteristics of the server and helps calculate the number of workers and memory for each
#!/bin/bash
# CONST 1GB
CONST_1GB="1024*1024*1024"
# VARIABLE WORKERS
CMD_W=0
@robdyke
robdyke / AndroidManifest.xml
Created January 5, 2019 21:53
package="com.tinderhouse.healthhelpnow"
<?xml version="1.0" encoding="utf-8" standalone="no"?><manifest xmlns:android="http://schemas.android.com/apk/res/android" package="com.tinderhouse.healthhelpnow" platformBuildVersionCode="129" platformBuildVersionName="1.8.9">
<uses-permission android:name="android.permission.INTERNET"/>
<uses-permission android:name="android.permission.ACCESS_COARSE_LOCATION"/>
<uses-permission android:name="android.permission.ACCESS_FINE_LOCATION"/>
<uses-permission android:name="android.permission.READ_EXTERNAL_STORAGE"/>
<uses-permission android:name="android.permission.WRITE_EXTERNAL_STORAGE"/>
<uses-permission android:name="android.permission.ACCESS_NETWORK_STATE"/>
<uses-permission android:name="android.permission.WRITE_CONTACTS"/>
<uses-permission android:name="android.permission.CAMERA"/>
<uses-permission android:name="android.permission.RECORD_AUDIO"/>
@robdyke
robdyke / wireguard.conf
Created January 24, 2021 01:05 — forked from nealfennimore/wireguard.conf
Wireguard VPN - Forward all traffic to server
# ------------------------------------------------
# Config files are located in /etc/wireguard/wg0
# ------------------------------------------------
# ---------- Server Config ----------
[Interface]
Address = 10.10.0.1/24 # IPV4 CIDR
Address = fd86:ea04:1111::1/64 # IPV6 CIDR
PostUp = iptables -A FORWARD -i wg0 -j ACCEPT; iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE; ip6tables -A FORWARD -i wg0 -j ACCEPT; ip6tables -t nat -A POSTROUTING -o eth0 -j MASQUERADE # Add forwarding when VPN is started
PostDown = iptables -D FORWARD -i wg0 -j ACCEPT; iptables -t nat -D POSTROUTING -o eth0 -j MASQUERADE; ip6tables -D FORWARD -i wg0 -j ACCEPT; ip6tables -t nat -D POSTROUTING -o eth0 -j MASQUERADE # Remove forwarding when VPN is shutdown

Security Disclosure to Organisation

IMMEDIATE ACTION STRONGLY ADVISED

  • The thing you need to fix 1
  • The thing you need to fix 2
  • The thing you need to fix 3

IMMEDIATE ACTION STRONGLY ADVISED

#!/usr/bin/env python3
import zipfile
import sys
import re
import xml.etree.ElementTree as ET
namespaces = {
'a': 'http://schemas.openxmlformats.org/drawingml/2006/main',
'r': 'http://schemas.openxmlformats.org/officeDocument/2006/relationships',