This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Based on https://jenkins.io/doc/book/installing/ | |
# Download the container and start it | |
docker run -u root --rm -d -p 8080:8080 -p 50000:50000 -v ${HOME}/projects/jenkins/home:/var/jenkins_home -v /var/run/docker.sock:/var/run/docker.sock jenkinsci/blueocean | |
# View the logs | |
docker logs jenkinsci/blueocean | |
#Open a shell | |
docker exec -it jenkinsci/blueocean bash |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
cd /Applications/Burp Suite Professional.app/Contents/java/app | |
java -agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005 -jar burpsuite_pro.jar |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
#################################### | |
# Reads the jenkins plugins installed on an existing instance and exports the shortnames | |
# run as follows: | |
# export-jenkins-plugins.sh <server-adress> <username> | |
# e.g. | |
# export-jenkins-plugins.sh localhost:8080 admin | |
# This command requires to install jq | |
# https://stedolan.github.io/jq/download/ |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# vim: set ts=4 sw=4 expandtab tw=79 : | |
#title :cleanup-stale-unmerged-branches.sh | |
#description :This script cleans up all unmerged branches older then 4 months, except develop and master | |
#author :[email protected] | |
#date :2018-04-04 | |
#version :0.1 | |
#notes :initially based on https://gist.github.com/dominics/1762685 | |
#usage :clean-stale-unmerged-branches.sh unmerged.txt |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Multi Maven Module: | |
mvn archetype:generate \ | |
-DarchetypeGroupId=org.codehaus.mojo.archetypes \ | |
-DarchetypeArtifactId=pom-root \ | |
-DarchetypeVersion=RELEASE \ | |
-DgroupId=biz.netcentric.sling \ | |
-DartifactId=sling-multi-module-maven-project \ | |
-Dversion=1.0.0-SNAPSHOT \ | |
-DinteractiveMode=false |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# First start zap locally. | |
# Starts Zap in daemon mode listening on port 9999 bound to all interfaces with API key disabled | |
./zap.sh -daemon -host 0.0.0.0 -port 9999 -addoninstallall -config api.disablekey=true -config api.incerrordetails=true -config api.addrs.addr.name=.* -config api.addrs.addr.regex=true | |
# Starts Zap UI listening on port 9999 bound to all interfaces with API key disabled | |
./zap.sh -host 0.0.0.0 -port 9999 -addoninstallall -config api.disablekey=true -config api.incerrordetails=true -config api.addrs.addr.name=.* -config api.addrs.addr.regex=true | |
# Starts Zap in daemon mode listening on port 9999 bound to all interfaces with API key disabled and an http sender script enabled | |
./zap.sh -daemon -host 0.0.0.0 -port 9999 -addoninstallall -config api.disablekey=true -config api.incerrordetails=true -config script.scripts.name="SenderExample" -config script.scripts.engine="Oracle Nashorn" -config script.scripts.type=httpsender -config script.scripts.enabled=true -config script.scripts.file="scr |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Usage: IE={box} vagrant up | |
# | |
# Eg. IE=XPIE6 vagrant up | |
boxes = { | |
"XPIE6" => "http://aka.ms/vagrant-xp-ie6", | |
"XPIE8" => "http://aka.ms/vagrant-xp-ie8", | |
"VistaIE7" => "http://aka.ms/vagrant-vista-ie7", | |
"Win7IE8" => "http://aka.ms/vagrant-win7-ie8", | |
"Win7IE9" => "http://aka.ms/vagrant-win7-ie9", |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
CUSTOM VECTORS | |
"><img src=x onerror=prompt(1);> | |
+123'];alert(1);[[' | |
123',alert(1),' | |
123\",term:alert(1)//\" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
// ==UserScript== | |
// @name Jinx 2.0 | |
// @namespace swende.se | |
// @grant GM_registerMenuCommand | |
// @description This is a slightly adapted version of Martin Holst Swende's great GM script Jinx. Please see the original code http://swende.se/projects/jinx.html | |
// @version 1 | |
// @include * | |
// @require http://ajax.googleapis.com/ajax/libs/jquery/1.3.2/jquery.min.js | |
// ==/UserScript== | |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
// ==UserScript== | |
// @name XSSMonkey | |
// @namespace thartm | |
// @description Identifies potential Cross Site Scripting (XSS) sinks in the currently displayed website and provides an easy option to probe them. Based on ph3wl's XSS script. | |
// @include * | |
// @require http://ajax.googleapis.com/ajax/libs/jquery/1.3.2/jquery.min.js | |
// ==/UserScript== | |
// | |
// Set your test string here |