Skip to content

Instantly share code, notes, and snippets.

View 6un9-h0-Dan's full-sized avatar
:octocat:

6un9-h0_D@n 6un9-h0-Dan

:octocat:
View GitHub Profile
@6un9-h0-Dan
6un9-h0-Dan / linkedin-industry-codes.json
Created April 6, 2022 16:54 — forked from gp187/linkedin-industry-codes.json
LinkedIn Full Industry Codes in JSON
[
{"Code": 47,"Groups": "corp, fin","Description": "Accounting"},
{"Code": 94,"Groups": "man, tech, tran","Description": "Airlines/Aviation"},
{"Code": 120,"Groups": "leg, org","Description": "Alternative Dispute Resolution"},
{"Code": 125,"Groups": "hlth","Description": "Alternative Medicine"},
{"Code": 127,"Groups": "art, med","Description": "Animation"},
{"Code": 19,"Groups": "good","Description": "Apparel & Fashion"},
{"Code": 50,"Groups": "cons","Description": "Architecture & Planning"},
{"Code": 111,"Groups": "art, med, rec","Description": "Arts and Crafts"},
{"Code": 53,"Groups": "man","Description": "Automotive"},
@6un9-h0-Dan
6un9-h0-Dan / log4j_rce_detection.md
Created December 23, 2021 21:04 — forked from Neo23x0/log4j_rce_detection.md
Log4j RCE CVE-2021-44228 Exploitation Detection

log4j RCE Exploitation Detection

You can use these commands and rules to search for exploitation attempts against log4j RCE vulnerability CVE-2021-44228

Grep / Zgrep

This command searches for exploitation attempts in uncompressed files in folder /var/log and all sub folders

sudo egrep -I -i -r '\$(\{|%7B)jndi:(ldap[s]?|rmi|dns|nis|iiop|corba|nds|http):/[^\n]+' /var/log
@6un9-h0-Dan
6un9-h0-Dan / hunchly_youtube_imagga.py
Created June 28, 2021 17:01
Hunchly data forwarder that downloads YouTube videos, and analyzes their frames for objects using the Imagga API.
# pip install flask pytube3 opencv-python imagehash requests
from flask import Flask,request
from PIL import Image
from pytube import YouTube
import cv2
import hashlib
import imagehash
import json
import os