Skip to content

Instantly share code, notes, and snippets.

View random-robbie's full-sized avatar
💭
Hacking!

Robbie random-robbie

💭
Hacking!
View GitHub Profile
  1. Harry Potter and the Philosopher's Stone (2001)
  2. Harry Potter and the Chamber of Secrets (2002)
  3. Harry Potter and the Prisoner of Azkaban (2004)
  4. Harry Potter and the Goblet of Fire (2005)
  5. Harry Potter and the Order of the Phoenix (2007)
  6. Harry Potter and the Half-Blood Prince (2009)
  7. Harry Potter and the Deathly Hallows – Part 1 (2010)
  8. Harry Potter and the Deathly Hallows – Part 2 (2011)

System: You are Grok 2, a curious AI built by xAI. You are intended to answer almost any question, often taking an outside perspective on humanity, and you always strive towards maximum helpfulness! Remember that you have these general abilities, and many others as well which are not listed here:

  • You can analyze individual X posts and their links.
  • You can answer questions about user profiles on X.
  • You can analyze content uploaded by user including images and pdfs.
  • You have realtime access to the web and posts on X. Remember these are some of the abilities that you do NOT have:
  • You CANNOT talk in voice mode.

Follow these instructions:

@random-robbie
random-robbie / allow_cloudflare.sh
Created December 5, 2024 21:48
Allows Cloudflare IP's to hit port 443 and 80 on your security group.
#!/bin/bash
# Security Group ID
SECURITY_GROUP_ID=sg-05e2bcc947b27e64c
# Fetch Cloudflare IPv4 and IPv6 ranges
IPV4_RANGES=$(curl -s https://www.cloudflare.com/ips-v4/)
# Add IPv4 ranges
for IP in $IPV4_RANGES; do
@random-robbie
random-robbie / free-ec2-deploy.sh
Last active December 5, 2024 10:33
Deploy your free EC2 via Bash
#!/bin/bash
# Set error handling
set -e
# Variables
KEY_NAME="my-testing-key"
SECURITY_GROUP_NAME="pentesting-ssh"
INSTANCE_TYPE="t2.micro"
SSH_KEY_PATH="$HOME/.ssh/id_rsa.pub" # SSH key location
#!/bin/bash
# Configuration
LAMBDA_FUNCTION_NAME="lambda"
AWS_PROFILE="what-security"
REGION="us-east-1" # Change if needed
MEMORY_SIZE=512
TIMEOUT=30
RUNTIME="python3.9"
ARCHITECTURE="x86_64"
ID: 4a4f0909-76f6-4d27-87b1-f6cd5f5cbbb7
Title: WP Users Masquerade <= 2.0.0 - Authentication Bypass
Description: The WP Users Masquerade plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.0.0. This is due to incorrect authentication and capability checking in the 'ajax_masq_login' function. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to log in as any existing user on the site, such as an administrator.
Type: plugin
CVSS Score: 8.8
CVE: CVE-2024-9522
Slug: wp-users-masquerade
Download Link: [Download wp-users-masquerade Version 2.0.0](https://downloads.wordpress.org/plugin/wp-users-masquerade.zip)
#!/bin/bash
# Update Homebrew
brew update
# Install Python 3.11 if not already installed
brew install [email protected]
# Create a virtual environment
python3.11 -m venv openweb-ui-env

Missing Person Search Playbook (UK)

Introduction

When a person goes missing in the UK, it's crucial to act swiftly and methodically to increase the chances of finding them safe and sound. This playbook outlines a series of detailed steps and actions to assist in the search for a missing person.

1. Immediate Actions

  • Notify Authorities: Dial 999 to contact the police immediately and report the missing person. Provide as much information as possible, including the person's name, age, physical description, last known location, and any relevant details about their mental or physical health.
  • Provide Details: Cooperate fully with law enforcement, providing any additional information they request and following their instructions. The police will issue a Missing Persons Report and begin their investigation.
  • Search Immediate Surroundings: If it's safe to do so, conduct a thorough search of the area where the person was last seen or known to be. Look in nearby parks, streets, and buildings.
/var/lib/jenkins/secrets/initialAdminPassword
/var/lib/jenkins/config.xml
/var/lib/jenkins/credentials.xml
/var/lib/jenkins/certificate.pfx
/usr/share/jenkins/ref/init.groovy.d/custom.groovy
/usr/share/jenkins/ref/plugins.txt
/var/lib/jenkins/.gradle
/var/lib/jenkins/gce_keys/google_compute_engine.pub
/var/lib/jenkins/gce_keys/google_compute_engine
/var/lib/jenkins/.ssh/google_compute_engine
#!/bin/bash
# Disable swap
sudo swapoff -a
sudo sed -i '/ swap / s/^\(.*\)$/#\1/g' /etc/fstab
# Update system
sudo apt update && sudo apt upgrade -y
# Install dependencies