I hereby claim:
- I am josephgregg on github.
- I am josephgregg (https://keybase.io/josephgregg) on keybase.
- I have a public key ASDRAes4Xb-Rkvyh0Gt8CprfN9W9t0jNIajusZa0K1X0_wo
To claim this, I am signing this object:
| #!/usr/bin/env python3 | |
| """ | |
| AudioSocket Server - Optimized Audio Quality Version | |
| """ | |
| import asyncio | |
| import struct | |
| import logging | |
| import sys | |
| import json |
| emails: | |
| You are performing OSINT for an upcoming penetration test. For the target domain [TARGET_DOMAIN], identify all known employee email addresses by: | |
| 1. Searching the web and X for publicly listed emails @TARGET_DOMAIN. | |
| 2. Searching LinkedIn for current and former employees of the company associated with TARGET_DOMAIN. | |
| 3. Scraping the target website for metadata in documents like PDFs and Microsoft suite files (e.g., using browse_page on document URLs to extract author names, etc.), and add any identified names. | |
| 4. For each identified employee name, guess email formats as firstname.lastname@TARGET_DOMAIN; handle common nicknames by including variants (e.g., mike/michael, bill/william, rob/robert, nick/nicholas, etc.). | |
| 5. Search deeper across multiple pages/sources for more employees. | |
| 6. Compile a unique list of all found/guessed emails in CSV format (column: email), including inline citations for sources using . |
| esphome: | |
| name: bme280-node | |
| friendly_name: BME280_Node | |
| esp32: | |
| board: esp32-c6-devkitm-1 | |
| framework: | |
| type: esp-idf | |
| logger: |
| interface TenantInfo { | |
| tenant_id: string; | |
| tenant_name: string; | |
| tenant_region: string; | |
| cloud_instance: string; | |
| sso_enabled: string; | |
| domain_count: number; | |
| federated_domains?: string[]; // Optional field | |
| } |
| import sys | |
| import lxml.etree as etree | |
| from urllib import request | |
| import dns.resolver | |
| def main(domain): | |
| get_expensive_solution(domain) | |
| get_federation_info(domain) | |
| def get_expensive_solution(domain): |
| #!/usr/bin/env python3 | |
| import csv | |
| import base64 | |
| import logging | |
| import argparse | |
| import traceback | |
| import lxml.etree as etree | |
| import sys | |
| from io import StringIO | |
| from urllib import request |
| import ldap3 | |
| import sys | |
| def get_domain_admin_usernames(server_name, domain_name): | |
| domain_parts = domain_name.split(".") | |
| if len(domain_parts) < 2: | |
| print("Error: Invalid domain name") | |
| sys.exit(1) | |
| tld = ".".join(domain_parts[1:]) | |
| base_dn = "DC={},DC={}".format(domain_parts[0], tld) |
| set apps to {"Transmission", "Keybase", "Signal"} | |
| set notificationBox to "Your apps have been killed as the VPN connection was terminated at " & (current date) & "." | |
| repeat with targetApp in apps | |
| tell application targetApp to quit | |
| end repeat | |
| display dialog notificationBox |
I hereby claim:
To claim this, I am signing this object:
| -A SSH-IN -i enp4s0 -p tcp -m hashlimit --hashlimit-upto 2/min --hashlimit-burst 5 --hashlimit-mode srcip,dstport --hashlimit-name SSH_IN -m state --state NEW -m tcp --dport 22 -m comment --comment "Allow 2 new SSH connections per minute based on SRC IP and DST PORT" -j ACCEPT | |
| -A SSH-IN -p tcp -m state --state NEW -m tcp --dport 22 -j LOG --log-prefix "IPTABLES SSH:" | |
| -A SSH-IN -p tcp -m state --state NEW -m tcp --dport 22 -j DROP |