groupadd -r admin
usermod -a -G admin vagrant
cp /etc/sudoers /etc/sudoers.orig
sed -i -e '/Defaults\s\+env_reset/a Defaults\texempt_group=admin' /etc/sudoers
sed -i -e 's/%admin ALL=(ALL) ALL/%admin ALL=NOPASSWD:ALL/g' /etc/sudoers
visudo -cf /etc/sudoers
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| <script type="text/javascript"> | |
| !function(){var analytics=window.analytics=window.analytics||[];if(!analytics.initialize)if(analytics.invoked)window.console&&console.error&&console.error("Segment snippet included twice.");else{analytics.invoked=!0;analytics.methods=["trackSubmit","trackClick","trackLink","trackForm","pageview","identify","group","track","ready","alias","page","once","off","on"];analytics.factory=function(t){return function(){var e=Array.prototype.slice.call(arguments);e.unshift(t);analytics.push(e);return analytics}};for(var t=0;t<analytics.methods.length;t++){var e=analytics.methods[t];analytics[e]=analytics.factory(e)}analytics.load=function(t){var e=document.createElement("script");e.type="text/javascript";e.async=!0;e.src=("https:"===document.location.protocol?"https://":"http://")+"cdn.segment.com/analytics.js/v1/"+t+"/analytics.min.js";var n=document.getElementsByTagName("script")[0];n.parentNode.insertBefore(e,n)};analytics.SNIPPET_VERSION="3.0.1"; | |
| window.analytics.load(" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| accinfo.php?cartId= | |
| acclogin.php?cartID= | |
| add.php?bookid= | |
| add_cart.php?num= | |
| addcart.php? | |
| addItem.php | |
| add-to-cart.php?ID= | |
| addToCart.php?idProduct= | |
| addtomylist.php?ProdId= | |
| adminEditProductFields.php?intProdID= |
This tutorial was written based on Ubuntu 14.04 with VestaCP.
For this example, I created user cooler, domain repo.my.cooler and database cooler_repo on VestaCP panel.
To install Gogs, you will need to use user with admin rights, on my tutorial I'm using default admin user from VestaCP.
1 - install supervisor.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| <?php | |
| # Logo | |
| $logoFilename = 'placeholder.png'; | |
| if (file_exists(ROOTDIR . '/assets/img/logo.png')) { | |
| $logoFilename = 'logo.png'; | |
| } elseif (file_exists(ROOTDIR . '/assets/img/logo.jpg')) { | |
| $logoFilename = 'logo.jpg'; | |
| } | |
| $pdf->Image(ROOTDIR . '/assets/img/' . $logoFilename, 15, 25, 75); |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| First install pip for Python2. Download the get-pip.py file from https://bootstrap.pypa.io/get-pip.py | |
| $ cd <download location> | |
| $ sudo -H python ./get-pip.py | |
| Installing pip also installs Python3 | |
| To run Python3 | |
| $ python3 | |
| Install pip3 by just executing the same file as in the step above, but this time using Python3 | |
| $ sudo -H python3 ./get-pip.py |
Once in a while, you may need to cleanup resources (containers, volumes, images, networks) ...
// see: https://github.com/chadoe/docker-cleanup-volumes
$ docker volume rm $(docker volume ls -qf dangling=true)
$ docker volume ls -qf dangling=true | xargs -r docker volume rm
Follow the instructions at https://letsencrypt.readthedocs.org. Assuming you installed as root, the client will be now be located at /root/letsencrypt.
By default:
- The beta client will use the test infrastructure to issue a certificate, and thus won’t be trusted by browsers;
- The client uses a temporary web server to authenticate the host which will conflict with the existing web server(s);
- Metaspoit: Penetration testing software
- GhostShell: Malware indetectable, with AV bypass techniques, anti-disassembly, etc.
- BeEF: The Browser Exploitation Framework
- PTF: Penetration Testers Framework
- Bettercap: MITM framework
- Nessus: Vulnerability scanner
- AutoNessus: Auto Nessus
- BDFProxy: Patch Binaries via MITM (BackdoorFactory)