Skip to content

Instantly share code, notes, and snippets.

View JasonPellerin's full-sized avatar

Jason Pellerin JasonPellerin

View GitHub Profile
@JasonPellerin
JasonPellerin / gist:764469656e49188353ac
Last active August 29, 2015 14:18
ESP8266_IoT_TripWire.ino
/*
* This sketch sends data via HTTP GET requests to api.thingspeak.com
* which in turn makes a POST requst to the Twillio API sending the phone call or text message
* You need to get api_Key at api.thingspeak.com and paste it
* below. Or just customize this script to talk to other HTTP servers.
* code butchered by: JPellerin
* http://www.jpellerin.info/bl0g/
*/
#include <ESP8266WiFi.h>
@JasonPellerin
JasonPellerin / gist:5e7b305cb244fa9ecbca
Last active November 13, 2016 16:29
Bootstrapped ESP8266 UI
/*
* http://www.jpllerin.info/bl0g/ - More ESP8266 Projects -
*
* http://getbootstrap.com/ - Learn About Twitter Bootstrap
*
* http://fortawesome.github.io/Font-Awesome/3.2.1/cheatsheet/ - Learn About Font-Awesome Icons
*
* http://tympanus.net/codrops/2015/02/16/create-animated-text-fills/ - Learn About CSS Text Fills
*
* https://gist.github.com/igrr/3b66292cf8708770f76b - Base Sketch
import requests
import serial
import time
s = serial.Serial('/dev/ttyACM0', baudrate=9600)
time.sleep(2)
if s.isOpen():
while (True):
r = requests.get('https://api.bitcoinaverage.com/ticker/USD')
// btc_tickr.ino
The circuit:
* LCD RS pin to digital pin 8
* LCD Enable pin to digital pin 6
* LCD D4 pin to digital pin 5
* LCD D5 pin to digital pin 4
* LCD D6 pin to digital pin 3
* LCD D7 pin to digital pin 2
* LCD R/W pin to ground
* LCD pin 16 to digital pin 11
@JasonPellerin
JasonPellerin / twitWire.ino
Last active January 5, 2017 04:08
ESP8266 TwitWire
/*
* This sketch sends data via HTTP GET requests to api.thingspeak.com.
*
* You need to get api_Key at api.thingspeak.com and paste it
* below.
*
*/
#include <ESP8266WiFi.h>
Well, I suppose its `safe' to release this, it seems everyone and their dog has
it and apparantly (and to my surprise) it still works.
The `smurf' attack is quite simple. It has a list of broadcast addresses which
it stores into an array, and sends a spoofed icmp echo request to each of those
addresses in series and starts again. The result is a devistating attack upon
the spoofed ip with, depending on the amount of broadcast addresses used,
many, many computers responding to the echo request.
Before I continue may I first say that this code was a mistake. When it was
//This Month Call Details Report - Run Hourly
// Comma-separated list of recipients. Comment out to not send any emails.
var RECIPIENT_EMAIL = '';
var SPREADSHEET_URL = 'https://docs.google.com/spreadsheets/d/[YOUR URL HERE]';
function clearSheetData() {
var SHEET_NAME = 'Calls This Month';
var ss = SpreadsheetApp.openByUrl(SPREADSHEET_URL);
var sheet = ss.getSheetByName(SHEET_NAME);
//Last Month Call Details Report - Run Monthly On 1st
// Comma-separated list of recipients. Comment out to not send any emails.
var RECIPIENT_EMAIL = '';
var SPREADSHEET_URL = 'https://docs.google.com/spreadsheets/d/[YOUR URL HERE]';
function clearSheetData() {
var SHEET_NAME = 'Calls Last Month';
var ss = SpreadsheetApp.openByUrl(SPREADSHEET_URL);
var sheet = ss.getSheetByName(SHEET_NAME);