Skip to content

Instantly share code, notes, and snippets.

View jcrashkit's full-sized avatar

jcrashkit jcrashkit

View GitHub Profile
version: '3.2'
services:
db:
image: mysql:5.7
volumes:
- "database:/var/lib/mysql"
- ./config/start.sql:/docker-entrypoint-initdb.d/start.sql
- ./config/eve_universe.sql:/docker-entrypoint-initdb.d/eve_universe.sql
version: '3'
services:
db:
image: mysql:5.7
volumes:
- database:/var/lib/mysql
- ./config/start.sql:/docker-entrypoint-initdb.d/start.sql
- ./config/eve_universe.sql:/docker-entrypoint-initdb.d/eve_universe.sql
restart: always
@jcrashkit
jcrashkit / .htaccess
Created March 16, 2020 23:49 — forked from Zodiac1978/.htaccess
Safer WordPress with these .htaccess additions
# Don't show errors which contain full path diclosure (FPD)
# Use that line only if PHP is installed as a module and not per CGI
# try using a php.ini in that case.
# Change mod_php5.c to mod_php7.c if you are running PHP7
<IfModule mod_php5.c>
php_flag display_errors Off
</IfModule>
# Don't list directories
<IfModule mod_autoindex.c>
@jcrashkit
jcrashkit / snoreless.php
Created March 14, 2020 21:45
Sleep apnea valve excerpts
<?php
include('httpdir');
?>
baseUp() {
target=$1
if [ -z "$target" ]
then
echo -e "\e[31mUndefined\e[0m"
fi
domain=`echo $target | sed -e 's|^[^/]*//||' -e 's|/.*$||'`
targetWs=$WS/targets/$domain
WS=$HOME/Workspace
rebase() {
target=$1
if [ -z "$target" ]
then
exit 0
fi
var OnOne = function() {
this.filter = {
sitename: '',
numsites: ''
};
this.dialogs = {};
var that = this;
@media (min-width: 992px) {
.animate {
animation-duration: 0.3s;
-webkit-animation-duration: 0.3s;
animation-fill-mode: both;
-webkit-animation-fill-mode: both;
}
}
@keyframes slideIn {
<script>
let submitBtn;
let newTarget;
submitBtn = addEventListener('click', () => {
let newTarget = document.getElementById("newTarget").elements["hostname"]
console.log(`target: ${newTarget.value}`);
addTarget(newTarget.value)
})
@jcrashkit
jcrashkit / gist:39148ce4f25dc7d4ab1ab665b2184a46
Created February 16, 2020 06:52 — forked from jesusprubio/gist:8f092af4ca252e252eab
Proposal: A Node.js penetration test framework

Proposal: Node.js penetration test framework

Hi guys! Since I started to write Bluebox-ng I've been tracking the different security projects I found written in Node.js. Now we've published the first stable version we think it's the right moment to speak among us (and, of course, everyone interested in it :).

Why?

  • I think we're rewriting the same stuff in our respective projects again and again. For example, almost any tool supports IPv6 because the functions we need are still not present in the Node core and the libraries I found (IMHO) were not enough.
  • There're different projects implementing exactly the same thing, ie: port scanners.
  • We're working in a too new environment, so we need to make it together.