I hereby claim:
- I am stevenrombauts on github.
- I am stevenrombauts (https://keybase.io/stevenrombauts) on keybase.
- I have a public key whose fingerprint is F7C5 734E D67D 2B27 E822 B828 6D9F B13A 592F C2C0
To claim this, I am signing this object:
<?php | |
/** | |
* Run over different date patterns | |
* and attempt to extract the correct date from a given string. | |
* | |
* @param String containing date. | |
* @return date in the YYYY-MM-DD format, or FALSE if no match was found. | |
**/ | |
function grab_date($str) | |
{ |
<?php | |
$versions = array('1.0 RC1', '1.0 RC2', '1.0 RC3', '1.0 RC4', '1.0 RC5', '1.0 RC6', '1.5.0', '1.5.1', '1.5.10', '1.5.11', '1.5.12', '1.5.13', '1.5.14', '1.5.15', '1.5.2', '1.5.3', '1.5.4', '1.5.5', '1.5.6', '1.5.7', '1.5.8', '1.5.9', '1.6.0', '1.6.1', '1.6.2', '1.6.3', '1.6.4', '1.6.5', '1.6.6', '1.6.7', '5.3.5-1ubuntu7.11', '2.14 RC1', '3.12RC5'); | |
foreach($versions as $version) | |
{ | |
$result = preg_match("/^(\d+)\.(\d+)[\. \-]?([a-z0-9\-\.]+)$/i", $version, $matches); | |
if($result) | |
{ | |
$major = (int) $matches[1]; |
<?php | |
$changelog = <<<EOL | |
ADDED-Complete new frontend default theme. Optimised to easily blend into any Joomla template. | |
added: Fully refactored administrator to fully match Joomla 1.5's native look and feel | |
Wuuut? Testing, testing. | |
fixed DOCLlink, search plugin and modules are now included in the package and installed automatically | |
improved Performed a full security audit | |
improved | |
added - Performance optimizations | |
EOL; |
#!/bin/bash | |
# Slick Progress Bar | |
# Created by: Ian Brown ([email protected]) | |
# Please share with me your modifications | |
# Note: From http://stackoverflow.com/questions/11592583/bash-progress-bar | |
# Functions | |
PUT(){ echo -en "\033[${1};${2}H";} | |
DRAW(){ echo -en "\033%";echo -en "\033(0";} | |
WRITE(){ echo -en "\033(B";} | |
HIDECURSOR(){ echo -en "\033[?25l";} |
I hereby claim:
To claim this, I am signing this object:
#!/bin/bash | |
### BEGIN INIT INFO | |
# Provides: newrelic-mysql | |
# Required-Start: $local_fs $remote_fs $network $syslog $named | |
# Required-Stop: $local_fs $remote_fs $network $syslog $named | |
# Default-Start: 2 3 4 5 | |
# Default-Stop: 0 1 6 | |
# X-Interactive: true | |
# Short-Description: Start/stop New Relic MySQL plugin | |
### END INIT INFO |
<?php | |
// The original redirect target: | |
$redirect = 'http://www.lokalepolitie.be/administrator/5388?view=dashboard'; | |
// If the form is posted, return the following headers: | |
if ($_POST['_token']) | |
{ | |
header('HTTP/1.1 303 See Other'); | |
header('Connection: Keep-Alive'); | |
header('Content-Length: 265'); |
#!/bin/bash | |
echo "Updating joomlatools/console .." | |
composer global remove joomlatools/joomla-console | |
composer global require joomlatools/console | |
joomla plugin:install joomlatools/console-joomlatools | |
echo "Updating the auto-updater scripts .." | |
wget -O /home/vagrant/scripts/updater/login.sh https://raw.githubusercontent.com/joomlatools/joomla-vagrant/master/puppet/modules/scripts/files/scripts/updater/login.sh |
#!/usr/bin/env python | |
## | |
# This scripts tests a given website for the 20151201 Remote Code Execution Vulnerability ( https://developer.joomla.org/security-centre/630-20151214-core-remote-code-execution-vulnerability.html) | |
# | |
# Instructions: | |
# - Download this gist: wget https://gist.githubusercontent.com/stevenrombauts/553584e7ab2ef4a832f2/raw/a140c7f5c1bcdc44e71dbfb07da76e418379ba8e/exploit-joomla.py | |
# - Make executable: chmod +x exploit-joomla.py | |
# - Run: ./exploit-joomla.py http://yoursite.com/ | |
## | |
import requests |