Skip to content

Instantly share code, notes, and snippets.

View AlexxNica's full-sized avatar
🚀

Alexandre Nicastro AlexxNica

🚀
View GitHub Profile
@paulmillr
paulmillr / github-languages-stats.json
Last active May 11, 2024 02:23
Most active GitHub users raw data
{
"Total": 910,
"my dms": 1,
"harbor is safe": 1,
"the Galaxy ": 1,
"Practice author": 1,
"Graph Representation Learning - rusty1s": 1,
"the PHP ecosystem": 1,
"software and to ensure that Python code is properly ported to Python 3": 1,
"Vienna - alanhamlett": 1,
@sio2boss
sio2boss / client-socket-reconnect.js
Created August 25, 2013 14:19
Node.js Re-connecting Socket
//
// Simple example of using net.Socket but here we capture the
// right events and attempt to re-establish the connection when
// is is closed either because of an error establishing a
// connection or when the server closes the connection.
//
// Requires
var net = require('net');
@codingoutloud
codingoutloud / make-keys.bat
Last active October 3, 2024 07:10
Handy OpenSSL command-line combinations I've used - they might've been hard to find or come up with, so capturing them here.
@echo off
if _%1_==__ goto USAGE
openssl req -x509 -nodes -days 365 -newkey rsa:1024 -keyout mycert.pem -out mycert.pem -subj "/CN=My Cert Name"
openssl pkcs12 -export -out mycert.pfx -inkey mycert.pem -in mycert.pem -passout pass:%1
openssl x509 -inform pem -in mycert.pem -outform der -out mycert.cer
openssl pkcs12 -in mycert.pfx -nodes -passin pass:%1 | openssl x509 -noout -fingerprint
openssl x509 -in mycert.pem -noout -fingerprint
@marcoscaceres
marcoscaceres / application-name.txt
Created November 13, 2013 18:45
application-name.txt
.//00/a10.com_00a075e9a37f52022bdb13807e8bd15f.html.txt
.//00/parcelmonkey.co.uk_00258938c78d758402a7157fbfe9d547.html.txt
.//00/xero.com_0043b9237e6b712ab1fc191cb6826929.html.txt
.//01/7474.com_01a45d3fccad44a8b093c354c34d0922.html.txt
.//01/allinonehomeschool.com_01aa6d67084a66ba2a1911c7ff9fea09.html.txt
.//01/bbyxy.com_012d4c22966d1fa7daa65da54d105b5b.html.txt
.//01/donkiz.fr_017165c9107dec5a1d65817e28c0b65e.html.txt
.//01/engadget.com_015756f28e553328b5d358aa09764558.html.txt
.//01/petersons.com_01ec5e91f48b6cf9a72d93af3a8bde33.html.txt
.//01/pizzahut.com_01eb225f350f043bf0744a325eb6644a.html.txt
(function(exports) {
'use strict';
implementRequestBookmark();
/**
* Expose requestBookmark() on navigator
* @return {void}
*/
function implementRequestBookmark(){
@scy
scy / README.md
Last active December 23, 2024 01:58
My OSX PF config for #30C3.

My OS X “VPN only” Setup For #30C3

You should never let passwords or private data be transmitted over an untrusted network (your neighbor’s, the one at Starbucks or the company) anyway, but on a hacker congress like the #30C3, this rule is almost vital.

Hackers get bored easily, and when they’re bored, they’re starting to look for things to play with. And a network with several thousand connected users is certainly an interesting thing to play with. Some of them might start intercepting the data on the network or do other nasty things with the packets that they can get.

If these packets are encrypted, messing with them is much harder (but not impossible! – see the end of this article). So you want your packets to be always encrypted. And the best way to do that is by using a VPN.

Target audience

@kevin-smets
kevin-smets / iterm2-solarized.md
Last active July 16, 2025 04:34
iTerm2 + Oh My Zsh + Solarized color scheme + Source Code Pro Powerline + Font Awesome + [Powerlevel10k] - (macOS)

Default

Default

Powerlevel10k

Powerlevel10k

/*!
* jQuery JavaScript Library v2.1.1pre
* http://jquery.com/
*
* Includes Sizzle.js
* http://sizzlejs.com/
*
* Copyright 2005, 2014 jQuery Foundation, Inc. and other contributors
* Released under the MIT license
* http://jquery.org/license