git clone <repo>
clone the repository specified by ; this is similar to "checkout" in some other version control systems such as Subversion and CVS
Add colors to your ~/.gitconfig file:
| sf2-ddd | |
| ├── app | |
| ├── bin | |
| ├── build | |
| ├── lib | |
| ├── src | |
| │ └── __VendorPrefix | |
| │ ├── Application | |
| │ │ └── __DomainNameBundle | |
| │ │ ├── Command |
Long story short, ansible does not work on a Windows control machine, so you basically have to:
ansible --connection=local ... in the target vmBelow are Vagrantfile examples for both approaches
| <# | |
| .SYNOPSIS | |
| Reset-WindowsUpdate.ps1 - Resets the Windows Update components | |
| .DESCRIPTION | |
| This script will reset all of the Windows Updates components to DEFAULT SETTINGS. | |
| .OUTPUTS | |
| Results are printed to the console. Future releases will support outputting to a log file. |
| # Set-ExecutionPolicy Bypass -Scope Process -Force; iex ((New-Object System.Net.WebClient).DownloadString('https://api.cacher.io/raw/0fcd76d0761e565a8c4e/10eb91268af60bb8abb2/start-cleanup')) | |
| Function Start-Cleanup { | |
| <# | |
| .SYNOPSIS | |
| Automate cleaning up a C:\ drive with low disk space | |
| .DESCRIPTION | |
| Cleans the C: drive's Window Temperary files, Windows SoftwareDistribution folder, | |
| the local users Temperary folder, IIS logs(if applicable) and empties the recycling bin. |
| $MethodDefinitions = @' | |
| using System; | |
| using System.Runtime.InteropServices; | |
| public class ConsoleCursor { | |
| [StructLayout(LayoutKind.Sequential)] | |
| internal struct CONSOLE_CURSOR_INFO | |
| { | |
| internal uint Size; |
| const template = document.createElement('template'); | |
| template.innerHTML = ` | |
| <div> | |
| Hello Weather App | |
| </div> | |
| ` | |
| class WeatherCard extends HTMLElement { | |
| constructor() { |
You can use these commands and rules to search for exploitation attempts against log4j RCE vulnerability CVE-2021-44228
This command searches for exploitation attempts in uncompressed files in folder /var/log and all sub folders
sudo egrep -I -i -r '\$(\{|%7B)jndi:(ldap[s]?|rmi|dns|nis|iiop|corba|nds|http):/[^\n]+' /var/logSecurity Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-2021-44228)