Find the path of a key / value in a JSON hierarchy easily.
Vous êtes l'heureuse ou l'heureux propriétaire d'une Brique Internet, mais vous ne savez pas l'installer ? Ce service a été conçu pour vous ! Après quelques questions à propos de vous, vous allez avoir à choisir quelques paramètres, et à suivre un guide d'installation rapide.
DNS Diagnostics and Performance Measurement Tools
Ever been wondering if your ISP is hijacking your DNS traffic? Ever observed any misbehavior with your DNS responses? Ever been redirected to wrong address and suspected something is wrong with your DNS? Here we have a set of tools to perform basic audits on your DNS requests and responses to make sure your DNS is working as you expect.
You can measure the response time of any given DNS server for arbitrary requests using dnsping. Just like traditional ping utility, it gives you similar functionality for DNS requests.
You can also trace the path your DNS request takes to destination to make sure it is not being redirected or hijacked. This can be done by comparing different DNS queries being sent to the same DNS server using dnstraceroute and observe if there is any difference between the path.
dnseval evaluates multiple DNS resolvers and helps you choose the best DNS server for your network. While it is highly recommended to use your own DNS resolver and never trust any third-party DNS server, but in case you need to choose the best DNS forwarder for your network, dnseval lets you compare different DNS servers from performance (latency) and reliability (loss) point of view.
GoAccess is an open source real-time web log analyzer and interactive viewer that runs in a terminal in *nix systems. It provides fast and valuable HTTP statistics for system administrators that require a visual server report on the fly.
Produce JSON from commandline https://github.com/jpmens/jo/blob/master/jo.md
f you are in a situation where:
you are in a group/association where you take your meetings notes (PV) in a pad (etherpad(-lite))
you don't have any place to store this information
meetings notes hang around with not place to be put, start to be lost, aren't visible or easily findable
Then PVPADs is a tool for you and your group/association. It is a very simple website where you put a pad URL and a date (and more stuff if needed) and PVPADs will store the pad contents and renders it in html and list it chronologically so everything is at the same place and everyone can reads it easily.
PVPADs is also multi organisations, meaning that you can handle several organisations on the same instance and filter organisations based on the URL.
TL;DR : J’ai donc commis (à LA RACHE, bien sûr, faut pas déconner quand même) le greffon letsencrypt-ssh, qui permet de répondre aux défis d’authentification en exécutant un script à travers une connexion SSH. https://git.framasoft.org/gouttegd/letsencrypt-ssh
needrestart checks which daemons need to be restarted after library upgrades. It is inspired by checkrestart from the debian-goodies package.
There are some hook scripts in the ex/ directory (to be used with apt and dpkg. The scripts will call needrestart after any package installation/upgrades.
needrestart should work on GNU/Linux. It has limited functionality on GNU/kFreeBSD since /proc//maps does not show removed file links.
restarting services
needrestart supports but does not require systemd (available since v0.6). If systemd is not available or does not return a service name needrestart uses hooks to identify the corresponding System V init script. The shipped hooks support the following package managers:
dpkg
rpm
pacman
The service command is used to run the tradiditional System V init script.
It often happens that we need to find the default port number for a specific service, or what service is listening on a given port. The tool uses the Iana.org website to get the official list of ports. A private script has been created to fetch regularly the website and update the ports.json file. For this reason, an update command will be created in a future version.
... allows you to run a command and see what it does to your files without actually doing it! After reviewing the operations listed, you can then decide whether you really want these things to happen or not.
Krill are filter feeders. True to its namesake, krill filters feeds. It is not picky about its diet, and will happily consume RSS, Atom, CDF and even Twitter feeds (no credentials required!). It aggregates feed items from all sources you specify, filters out those that interest you, and displays them as a live stream of clean, legible command line output. || Un petit outil CLI qui dépote
Tool used to find vulnerable routers and devices on the Internet and perform tests
When I switched from bash(1) to zsh(1), I was surprised to find how many standard programs lacked completion functions. Only few of the coreutils are supported in vanilla zsh(1).
Although there are user-contributed repositories like zsh-users/zsh-completions I still couldn't find completion functions for tools like cat, nl, df and others.
So I wrote some and I've found that I basically just copied the info from help text to the completion function. Boring. Something that even a machine could do. Well, kinda...
Almost every program with command line arguments implements also --help text, which already lists the options even with their description. So why not use that for generating the functions?
... Because every program uses slightly different format and it would be nightmare to cover all the cases, you say? Then you're exactly right. But then I though that I don't anything perfect, just something that mostly works.
Luckily, most programs do play nice. But help texts are still meant to be for humans so sometimes it borks...
Here's a zsh(1) plugin I wrote that does exactly that..
Packet-journey (pktj) permet à des opérateurs réseau de monter des routeurs logiciels faciles à configurer et capables de monter en échelle. Pour ce faire, l'applicatif se base sur les bibliothèques et drivers de DPDK et utilise des fonctionnalités natives du noyau Linux, faisant le pont entre fast-forwarding et routage logiciel souple.
create an "nsupdate" script from DNS zone file differences
The nsdiff program examines the old and new versions of a DNS zone, and outputs the differences as a script for use by BIND's nsupdate program. It provides a bridge between static zone files and dynamic updates.
The nspatch script is a wrapper around nsdiff | nsupdate
that checks and reports errors in a manner suitable for running from cron.
The nsvi script makes it easy to edit a dynamic zone.
If you use BIND 9.7 or 9.8, you can use nsdiff as an alternative to the DNSSEC inline-signing feature which appeared in BIND 9.9. The server updates the DNSSEC records dynamically, but you can continue to manage the unsigned static zone file as before and use nsdiff | nsupdate
to push changes to the server.
There are other situations where you have a zone which is partly dynamic and partly static, for example, a reverse DNS zone mostly updated by a DHCP server, which also has a few static entries. You can use nsdiff to update the static part of the zone.
Documentation publique adminsys Nos Oignons
This site was created to help sort through the many LiveCDs available. It currently tracks LiveCDs, LiveDVDs, and LiveUSB operating systems. Purpose: Desktop, OS Installation, Education, Rescue, Clustering, Security, Home Entertainment, Gaming, Medical, Diagnostic, Firewall, Forensics, Server
DNSdumpster.com is a FREE domain research tool that can discover hosts related to a domain. Finding visible hosts from the attackers perspective is an important part of the security assessment process.
========================================================
Très chouette présentation, complet.
D'autres outils DNS:
https://github.com/tomsteele/blacksheepwall
https://github.com/jhaddix/domain
https://code.google.com/p/gxfr/
http://trac.assembla.com/fierce
https://pentest-tools.com/information-gathering/find-subdomains-of-domain
https://code.google.com/p/dnsmap/
https://github.com/guelfoweb/knock
https://github.com/darkoperator/dnsrecon
Zonemaster is a program that was designed to help people check, measure and hopefully also understand the workings of the DNS (Domain Name System). It consists of three basic modules: - Engine (a test framework that supports all functionality to perform DNS tests) - The CLI interface and - The web interface
When a domain (such as "zonemaster.net") is submitted to Zonemaster interfaces (CLI or Web) it will investigate the domain’s general health by traversing the DNS from root (.) to the TLD (Top Level Domain, like .net) to eventually the nameserver(s) that holds the information about the specified domain (zonemaster.net). The different sanity checks conducted by the zonemaster tool is documented in the Test Requirements document