Skip to content

Instantly share code, notes, and snippets.

View zycon's full-sized avatar
🎯
Focusing

Tibin Lukose zycon

🎯
Focusing
View GitHub Profile
@zycon
zycon / pvc-nfs.yaml
Created May 25, 2020 22:01
pvc-nfs.yaml
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: pv-claim-nfs
namespace: default
spec:
storageClassName: "nfs-storageclass"
accessModes:
- ReadWriteOnce
resources:
@zycon
zycon / nfs-server-kubernetes.yaml
Last active May 25, 2020 22:10
NFS Server yaml kubernete readwritemany
apiVersion: v1
kind: ReplicationController
metadata:
name: nfs-server
namespace: default
spec:
replicas: 1
selector:
role: nfs-server
template:
@zycon
zycon / nfs-pvc-claim.yaml
Created May 25, 2020 22:14
NFS PVC Claim
apiVersion: v1
kind: PersistentVolume
metadata:
name: nfs-storage-logs
namespace: default
spec:
capacity:
storage: 50Gi
accessModes:
- ReadWriteMany
@zycon
zycon / keybase.md
Created May 26, 2020 08:24
keybase.md

Keybase proof

I hereby claim:

  • I am zycon on github.
  • I am tibin (https://keybase.io/tibin) on keybase.
  • I have a public key whose fingerprint is D4AC F4BC 2229 F36C 9A3F 8686 9681 D4B5 817D A2CB

To claim this, I am signing this object:

@zycon
zycon / readme.md
Last active June 18, 2020 20:08
openvpn http traffic to burp suite

Sometime it would be hard to configure proxy in smartphone for insepcting the packets. And some apps might not respect it too, the quick solution which came into my mind is to configure an openvpn server in laptop and then forward the http packets to burp in the host machine Steps

  1. Configure an openvpn server with a client in a host
  2. Configure burp suits to listen on all interface with invisible proxy listening on port 8080
  3. forward the packets by applying the iptables in NAT entry
iptables -t nat -A PREROUTING -i tun0 -p tcp --dport 80 -j REDIRECT --to-port 8080
iptables -t nat -A PREROUTING -i tun0 -p tcp --dport 443 -j REDIRECT --to-port 8080

you may need to root your android and push the burp root certificates to the trusted system ca's to intercept the app traffic

@zycon
zycon / portopen.ps
Created September 23, 2020 07:17
windows-port opening
$listener = [System.Net.Sockets.TcpListener]6655
$listener.Start();
$listener.Stop();
### FILTER PODS
kubectl delete pods --field-selector=status.phase=Pending
### GET IMAGES
kubectl get pods -o jsonpath="{.items[*].spec.containers[*].image}" |tr -s '[[:space:]]' '\n' |sort |uniq -c
### Delete pods not running
kubectl get pods | grep -v Running | awk '{print $1}' | xargs kubectl delete pod
@zycon
zycon / gist:f598f5c0df7b608756d0079ee23928b9
Created March 19, 2021 17:21
Run program background linux
run.sh > /dev/null 2>&1&
##Creating user
CREATE USER read_u PASSWORD 'any-password';
##Creating role
create role client_readonly;
###Select the database that you need to grant the access then execute the queries
##Select public table too if neccessary
GRANT USAGE ON SCHEMA client_schema TO client_readonly;
GRANT SELECT ON ALL TABLES IN SCHEMA client_schema TO client_readonly;
##Making sure the future created tables in the schema have this rule enabled
screen - To create a screen
screen -x [screen id] - Connect / Attach to a specific running screen.
Ctrl + D - while in a screen to Terminate / Stop a screen from running.
Ctrl + A, Then press D - while in a screen to detach from screen without disturbing it.
killall screen - Detach or terminate all screens.