git clone <repo>
clone the repository specified by ; this is similar to "checkout" in some other version control systems such as Subversion and CVS
Add colors to your ~/.gitconfig file:
sf2-ddd | |
├── app | |
├── bin | |
├── build | |
├── lib | |
├── src | |
│ └── __VendorPrefix | |
│ ├── Application | |
│ │ └── __DomainNameBundle | |
│ │ ├── Command |
Long story short, ansible does not work on a Windows control machine, so you basically have to:
ansible --connection=local ...
in the target vmBelow are Vagrantfile
examples for both approaches
<# | |
.SYNOPSIS | |
Reset-WindowsUpdate.ps1 - Resets the Windows Update components | |
.DESCRIPTION | |
This script will reset all of the Windows Updates components to DEFAULT SETTINGS. | |
.OUTPUTS | |
Results are printed to the console. Future releases will support outputting to a log file. |
# Set-ExecutionPolicy Bypass -Scope Process -Force; iex ((New-Object System.Net.WebClient).DownloadString('https://api.cacher.io/raw/0fcd76d0761e565a8c4e/10eb91268af60bb8abb2/start-cleanup')) | |
Function Start-Cleanup { | |
<# | |
.SYNOPSIS | |
Automate cleaning up a C:\ drive with low disk space | |
.DESCRIPTION | |
Cleans the C: drive's Window Temperary files, Windows SoftwareDistribution folder, | |
the local users Temperary folder, IIS logs(if applicable) and empties the recycling bin. |
$MethodDefinitions = @' | |
using System; | |
using System.Runtime.InteropServices; | |
public class ConsoleCursor { | |
[StructLayout(LayoutKind.Sequential)] | |
internal struct CONSOLE_CURSOR_INFO | |
{ | |
internal uint Size; |
const template = document.createElement('template'); | |
template.innerHTML = ` | |
<div> | |
Hello Weather App | |
</div> | |
` | |
class WeatherCard extends HTMLElement { | |
constructor() { |
You can use these commands and rules to search for exploitation attempts against log4j RCE vulnerability CVE-2021-44228
This command searches for exploitation attempts in uncompressed files in folder /var/log
and all sub folders
sudo egrep -I -i -r '\$(\{|%7B)jndi:(ldap[s]?|rmi|dns|nis|iiop|corba|nds|http):/[^\n]+' /var/log
Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-2021-44228)