Skip to content

Instantly share code, notes, and snippets.

@MiyacoGBF
MiyacoGBF / 01_NieR_FAR.md
Last active January 8, 2025 08:54
How to Install FAR, HD Texture Pack, and ReShade (GShade) for NieR:Automata on Linux
@walduino
walduino / ffchromeCA.yaml
Created January 3, 2020 14:57
Ansible to add cert to CA and make firefox and chrome use the system CA store under linux
---
- name: certauth.yml | Make sure the folder exists (Debian, Ubuntu)
file:
path: /usr/local/share/ca-certificates
state: directory
- name: certauth.yml | Download root CA
get_url:
url: "{{ install_ip }}/xxx.crt"
dest: "/usr/local/share/ca-certificates/xxx.crt"
@kvnxiao
kvnxiao / awesome-selfhosted-sorted-by-stars.md
Last active March 1, 2025 16:34
awesome-selfhosted-sorted-by-stars.md

Awesome-Selfhosted

Awesome

Selfhosting is the process of locally hosting and managing applications instead of renting from SaaS providers.

This is a list of Free Software network services and web applications which can be hosted locally. Non-Free software is listed on the Non-Free page.

See Contributing.

@Luzifer
Luzifer / check_mail_v7.py
Last active November 11, 2019 22:10
Uberspace .qmail filter script (for Uberspace-v7 accounts)
#!/usr/bin/env python3
# -*- coding: utf-8 -*-
# Installation: Insert this line into your .qmail-* file
# | /path/to/check_mail_v7.py
from datetime import datetime
import sys
BLOCK_SCORE = 8.0
@davydany
davydany / how-to-tmux-background-process.md
Last active February 24, 2025 11:36
Using TMUX for running processes after you log off

How to Run a Process in the Background with TMUX

There are times when you need to log off your Linux Desktop, and you want a process to run in the background. TMUX manages this very well.

For this example, let's suppose you're running a long running task like running rspecs on your project and it is 5pm, and you need to go home.

Run Your Process

WannaCry|WannaDecrypt0r NSA-Cyberweapon-Powered Ransomware Worm

  • Virus Name: WannaCrypt, WannaCry, WanaCrypt0r, WCrypt, WCRY
  • Vector: All Windows versions before Windows 10 are vulnerable if not patched for MS-17-010. It uses EternalBlue MS17-010 to propagate.
  • Ransom: between $300 to $600. There is code to 'rm' (delete) files in the virus. Seems to reset if the virus crashes.
  • Backdooring: The worm loops through every RDP session on a system to run the ransomware as that user. It also installs the DOUBLEPULSAR backdoor. It corrupts shadow volumes to make recovery harder. (source: malwarebytes)
  • Kill switch: If the website www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com is up the virus exits instead of infecting the host. (source: malwarebytes). This domain has been sinkholed, stopping the spread of the worm. Will not work if proxied (source).

update: A minor variant of the viru

import requests
import sys
import json
def waybackurls(host, with_subs):
if with_subs:
url = 'http://web.archive.org/cdx/search/cdx?url=*.%s/*&output=json&fl=original&collapse=urlkey' % host
else:
url = 'http://web.archive.org/cdx/search/cdx?url=%s/*&output=json&fl=original&collapse=urlkey' % host
import requests
import re
import sys
from multiprocessing.dummy import Pool
def robots(host):
r = requests.get(
'https://web.archive.org/cdx/search/cdx\
?url=%s/robots.txt&output=json&fl=timestamp,original&filter=statuscode:200&collapse=digest' % host)
@pubkey
pubkey / corsair_headset_linux.bash
Last active October 31, 2024 00:06
Corsair Gaming VOID Headset on Linux
# Corsair headsets will stuck the apps on your linux system. This is due to wrong usb-mapping.
# thx to http://www.c0urier.net/2016/corsair-gaming-void-usb-rgb-linux-fun
# 1. open terminal
# 2. type this and search the line with your headset
lsusb
# Get the USB ID of the headset and add it to xorg.conf: