This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
server.document-root = "/home/user/light/pages/" | |
server.port = "8080" | |
server.bind = "127.0.0.1" | |
server.username = "user" | |
server.groupname = "www" | |
accesslog.filename = "/home/user/light/logs/access" | |
server.errorlog = "/home/user/light/logs/error" | |
server.modules = ( | |
"mod_redirect", |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[Unit] | |
Description=Remote desktop service (VNC) | |
After=syslog.target network.target | |
[Service] | |
Type=forking | |
User=enp | |
# Clean any existing files in /tmp/.X11-unix environment | |
ExecStartPre=/bin/sh -c '/usr/bin/Xvnc -kill %i > /dev/null 2>&1 || :' |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
terminal = 'st' -- can be app in path, or full path e.g. /usr/bin/xterm | |
editor = "vim" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Vncserver service file for Debian or Ubuntu with systemd | |
# | |
# Install vncserver and tools | |
# e.g. apt-get install tightvncserver autocutsel gksu | |
# | |
# 1. Copy this file to /etc/systemd/system/vncserver@:1.service | |
# 2. Edit User= | |
# e.g "User=paul" | |
# 3. Edit the vncserver parameters appropriately in the ExecStart= line! | |
# e.g. the -localhost option only allows connections from localhost (or via ssh tunnels) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
1. Disallow root from connecting via ssh. | |
2. Setup firejail or other firewall to block external connection after 6 invalid login attempts from the origin. | |
3. setup clamAV antivirus system. | |
3. Switch to hardend LTS kernel. | |
4. disallow non privleged users rwx access to /boot | |
5. uninstall all non necessary software/packages |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
systemctl enable sshd #make shure | |
mkfs.ext4 /dev/vda2 | |
mount /dev/vda2 /mnt | |
pacstrap /mnt base linux-hardened linux-hardened-headers arch-install-scripts | |
genfstab -U /mnt >> /mnt/etc/fstab | |
arch-chroot /mnt <<"EOT" | |
echo "en_US.UTF-8 UTF-8" >> /etc/locale.gen | |
locale-gen | |
echo "LANG=en_US.UTF-8" >> /etc/locale.conf |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
#enp's epic .bashrc | |
#feel free to copy and edit just pls keep this and the above comments :p | |
#If not running interactively, don't do anything | |
case $- in | |
*i*) ;; | |
*) return;; | |
esac |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
25 WAY TO BECOME THE ULTIMATE SCRIPT KIDDIE | |
1. You do not need to learn C, C++, C#, Python, Perl, PHP, Assembly and other computer programming languages since Kali, Parrot OS, and Backbox Linux have scripts and GUIs for performing penetration testing, wireless cracking, and vulnerability assessment. | |
2. Use r57, c100 or c99 shells as your backdoor shells as a proof that you were able to hack their web application and have gained access to the server. | |
3. Use the Hail Mary attack in Armitage in a covert penetration test because the GUI is awesome. It is very cool and totally legit. You donβt need to know the exploits being launched. | |
4. You donβt need to study exploit development or all those EIP and ESP stuffs since you can just download any exploits in Exploit-DB or Packet Storm. The Metasploit Framework has a bunch of exploits too so no worries. Some forums have exploit kits that are free to download and you should be all right with it. | |
5. Make unbelievable claims that you are the worldβs no. 1 hacker and |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
--[[ | |
Awesome WM configuration template | |
github.com/lcpz | |
--]] | |
-- {{{ Required libraries | |
local awesome, client, mouse, screen, tag = awesome, client, mouse, screen, tag | |
local ipairs, string, os, table, tostring, tonumber, type = ipairs, string, os, table, tostring, tonumber, type |
NewerOlder