#!/bin/bash
DISTRO="bookworm"
# download the GPG key of the repository:
wget -q0 - http://downloads.linux.hpe.com/SDR/repo/mcp/GPG-KEY-mcp | apt-key add -
# create apt sources file for HP/Proliant repo
echo -e "deb http://downloads.linux.hpe.com/SDR/repo/mcp/ $DISTRO/current non-free" > /etc/apt/sources.list.d/proliant.sources.list
You can use ssacli (smart storage administrator command line interface) tool to manage any of supported HP Smart Array Controllers in your Proxmox host without need to reboot your server to access Smart Storage Administrator in BIOS. That means no host downtime when managing your storage.
CLI is not as convenient as GUI interface provided by BIOS or desktop utilities, but still allows you to fully manage your controller, physical disks and logical drives on the fly with no Proxmox host downtime.
ssacli replaces older hpssacli, but shares the same syntax and adds support for newer servers and controllers.
| #!/bin/sh | |
| ## Credits to @gdamjan this script is partially based on his 6rd script (https://gist.github.com/gdamjan/1141850) | |
| ## You must have a real routable IPv4 address for IPv6 rapid deployment (6rd) | |
| ## tunnels. | |
| ## Also make sure you have at least linux kernel 2.6.33 and you have enabled 6rd | |
| ## CONFIG_IPV6_SIT_6RD=y | |
| PREFIX="2a02:120" # Swisscom 6rd ipv6 prefix | |
| GATEWAY="193.5.29.1" # Swisscom 6rd gateway host |
| #!/bin/sh | |
| ## Credits to @gdamjan this script is partially based on his 6rd script (https://gist.github.com/gdamjan/1141850) | |
| ## You must have a real routable IPv4 address for IPv6 rapid deployment (6rd) | |
| ## tunnels. | |
| ## Also make sure you have at least linux kernel 2.6.33 and you have enabled 6rd | |
| ## CONFIG_IPV6_SIT_6RD=y | |
| PREFIX="2001:b07" # Fastweb 6rd ipv6 prefix | |
| GATEWAY="81.208.50.214" # Fastweb 6rd gateway host |
| version: '3' | |
| services: | |
| bareos-dir: | |
| image: barcus/bareos-director | |
| volumes: | |
| - /home/bareos/config/director:/etc/bareos | |
| - /home/bareos/data/director:/var/lib/bareos #(required for MyCatalog backup) | |
| environment: | |
| - DB_HOST=bareos-db | |
| - DB_PORT=3306 |
| #!/bin/bash | |
| find -type f -name "*.flac" -print0 | while read -d $'\0' a; do | |
| < /dev/null ffmpeg -i "$a" -ab 320k -map_metadata 0 -id3v2_version 3 "${a[@]/%flac/mp3}" | |
| done |
| #!/usr/bin/env bash | |
| if [[ $UID != 0 ]]; | |
| then | |
| echo "Please run this script with sudo or as root:" | |
| echo | |
| echo "sudo $0 $*" | |
| exit 1 || return 1 | |
| fi |
| #!/bin/bash | |
| convert=`which tshark` | |
| list_pcap=`ls -lh |grep -v .sh |awk '{ print $9 }'|awk -F.pcapng '{ print $1 }'` | |
| for i in $list_pcap; do | |
| echo "Converting: "$i | |
| $convert -F pcap -r $i.pcapng -w $i.pcap | |
| done |
CVE-2018-7600 | Drupal < 7.58 / < 8.3.9 / < 8.4.6 / < 8.5.1 - 'Drupalgeddon2' RCE (SA-CORE-2018-002)
Source: https://gist.github.com/g0tmi1k/7476eec3f32278adc07039c3e5473708
Improved (Ruby) exploit ~ http://github.com/dreadlocked/Drupalgeddon2/ // https://www.exploit-db.com/exploits/44449/