start new:
tmux
start new with session name:
tmux new -s myname
#!/bin/sh | |
# Installs tarsnap client on Debian and Ubuntu | |
# | |
# You'll need to setup an account at | |
# http://www.tarsnap.com | |
# and load it with some funds | |
# | |
# Make sure you run this as root | |
# |
#!/bin/sh | |
# modified by jfro from http://www.cnysupport.com/index.php/linode-dynamic-dns-ddns-update-script | |
# Update: changed because the old IP-service wasn't working anymore | |
# Uses curl to be compatible with machines that don't have wget by default | |
# modified by Ross Hosman for use with cloudflare. | |
# | |
# Place at: | |
# /usr/local/bin/cf-ddns.sh | |
# if you're lazy (like me): curl https://gist.githubusercontent.com/larrybolt/6295160/raw/9efbc7850613e06db1b415bdf4fbdd8361209865/cf-ddns.sh > /usr/local/bin/cf-ddns.sh && chmod +x /usr/local/bin/cf-ddns.sh && vim /usr/local/bin/cf-ddns.sh | |
# run `crontab -e` and add next line: |
############################################################################### | |
# The MIT License | |
# | |
# Copyright 2012-2014 Jakub Jirutka <[email protected]>. | |
# | |
# Permission is hereby granted, free of charge, to any person obtaining a copy | |
# of this software and associated documentation files (the "Software"), to deal | |
# in the Software without restriction, including without limitation the rights | |
# to use, copy, modify, merge, publish, distribute, sublicense, and/or sell | |
# copies of the Software, and to permit persons to whom the Software is |
#!/bin/sh | |
# | |
# Amazon EC2 user-data file for automatic configuration of IPsec/L2TP VPN | |
# on a Ubuntu server instance. Tested with 14.04 (Trusty) AND 12.04 (Precise). | |
# With minor modifications, this script *can also be used* on dedicated servers | |
# or any KVM- or XEN-based Virtual Private Server (VPS) from other providers. | |
# | |
# DO NOT RUN THIS SCRIPT ON YOUR PC OR MAC! THIS IS MEANT TO BE RUN WHEN | |
# YOUR AMAZON EC2 INSTANCE STARTS! | |
# |
#! /usr/bin/env python | |
# Dyre/Dyreza DGA | |
# Implementation by Talos | |
# From http://blogs.cisco.com/security/talos/threat-spotlight-dyre | |
# Another Python implementation was also posted back in December 2014 by moritz.kroll: | |
# https://www.virustotal.com/en/file/3716902c64afe40369e6ed67f9b9f7eea30f809348b3558adcff622965e80435/analysis/ | |
from datetime import date | |
from hashlib import sha256 | |
from socket import gethostbyname, gaierror |
wget --spider -o wget.log -e robots=off -r -l 5 -p -S --header="X-Bypass-Cache: 1" live-mysite.gotpantheon.com | |
# Options explained | |
# --spider: Crawl the site | |
# -o wget.log: Keep the log | |
# -e robots=off: Ignore robots.txt | |
# -r: specify recursive download | |
# -l 5: Depth to search. I.e 1 means 'crawl the homepages'. 2 means 'crawl the homepage and all pages it links to'... | |
# -p: get all images, etc. needed to display HTML page | |
# -S: print server response |
#!/bin/bash | |
SERVERS=(108.162.196.125 108.162.197.125) | |
for server in ${SERVERS[*]} | |
do | |
echo "Now processing $server" | |
wget --timeout=10 -t1 -O tor.txt https://check.torproject.org/cgi-bin/TorBulkExitList.py?ip=$server | |
for ip in `tail -n +4 tor.txt` |
#/bin/sh | |
# name of the ipset - v4 or v6 will be appended. | |
IPSET_NAME=cloudflare- | |
# argument: v4 or v6 (defaults to v4) | |
cloudflare_ipset () | |
{ | |
local ipv | |
local inetv |