Skip to content

Instantly share code, notes, and snippets.

View UA-SOlsen's full-sized avatar
💭
Looking for the mustard!!

S. Olsen UA-SOlsen

💭
Looking for the mustard!!
View GitHub Profile
@UA-SOlsen
UA-SOlsen / log4j_rce_check.py
Created December 13, 2021 06:01 — forked from byt3bl33d3r/log4j_rce_check.py
Python script to detect if an HTTP server is potentially vulnerable to the log4j 0day RCE (https://www.lunasec.io/docs/blog/log4j-zero-day/)
#! /usr/bin/env python3
'''
Needs Requests (pip3 install requests)
Author: Marcello Salvati, Twitter: @byt3bl33d3r
License: DWTFUWANTWTL (Do What Ever the Fuck You Want With This License)
This should allow you to detect if something is potentially exploitable to the log4j 0day dropped on December 9th 2021.
@UA-SOlsen
UA-SOlsen / dump_route53_records.md
Created July 22, 2021 14:50 — forked from porjo/dump_route53_records.md
Export route53 records to CSV

Retrieve hosted zones with aws route53 list-hosted-zones then enter the zone Id below:

aws route53 list-resource-record-sets --hosted-zone-id "/hostedzone/xxxxxxxxxxx" | \
   jq -r '.ResourceRecordSets[] | [.Name, .Type, (.ResourceRecords[]? | .Value), .AliasTarget.DNSName?]  | @tsv'