Skip to content

Instantly share code, notes, and snippets.

View Ma5onic's full-sized avatar
🎧
Remixing

Ma5onic

🎧
Remixing
View GitHub Profile
@Ma5onic
Ma5onic / raphael-svg-buildjson
Created February 10, 2022 04:02 — forked from benbarnett/raphael-svg-buildjson
loop through the 'paper' variable from Raphael JS and build up the JSON object describing all images and paths within it.
// loop through the 'paper' variable from Raphael JS and build up the JSON object describing all images and paths within it.
buildJSON = function(paper) {
var svgdata = [];
svgdata.push({
width: 390,
height: 400
});
$.each(paper,
@Ma5onic
Ma5onic / ghost-page-404.markdown
Created October 6, 2019 10:37
Ghost Page | 404
@Ma5onic
Ma5onic / Audio Steganography - sender.py
Created July 16, 2019 18:56 — forked from reachsumit/Audio Steganography - sender.py
This code contains a demo for Audio Steganography. It is to be used by sender end to embed text mentioned in string variable to the audio file.
# We will use wave package available in native Python installation to read and write .wav audio file
import wave
# read wave audio file
song = wave.open("song.wav", mode='rb')
# Read frames and convert to byte array
frame_bytes = bytearray(list(song.readframes(song.getnframes())))
# The "secret" text message
string='Peter Parker is the Spiderman!'
# Append dummy data to fill out rest of the bytes. Receiver shall detect and remove these characters.
@Ma5onic
Ma5onic / Audio Steganography - receiver.py
Created July 16, 2019 18:56 — forked from reachsumit/Audio Steganography - receiver.py
This code contains a demo for Audio Steganography. It is to be used by the receiver end, to extract the secret text embedded in the audio file.
# Use wave package (native to Python) for reading the received audio file
import wave
song = wave.open("song_embedded.wav", mode='rb')
# Convert audio to byte array
frame_bytes = bytearray(list(song.readframes(song.getnframes())))
# Extract the LSB of each byte
extracted = [frame_bytes[i] & 1 for i in range(len(frame_bytes))]
# Convert byte array back to string
string = "".join(chr(int("".join(map(str,extracted[i:i+8])),2)) for i in range(0,len(extracted),8))
@Ma5onic
Ma5onic / Audio Steganography_ultrasound - sender.ny
Created July 16, 2019 18:56 — forked from reachsumit/Audio Steganography_ultrasound - sender.ny
This code was shared by Audacity user edgar-rft (https://forum.audacityteam.org/memberlist.php?mode=viewprofile&u=5642) to generate silent subliminals and is an implementation of Oliver M. Lowery's 1989 patent (https://patents.google.com/patent/US5159703A/en).
;nyquist plug-in
;version 1
;type process
;name "Subliminal..."
;action "Subliminal..."
;control carrier "Carrier" real "Hz" 17500 14000 20000
(setf carrier (max 14000 (min carrier 20000)))
;; We have two Nyquist frequencies, carrier/2 and *sound-srate*/2.
@Ma5onic
Ma5onic / Audio Steganography_ultrasound - receiver.ny
Created July 16, 2019 18:56 — forked from reachsumit/Audio Steganography_ultrasound - receiver.ny
This code contains a demo for Audio Steganography. It is to be used by the receiver end, to extract the secret audio embedded within the public audio file.
;; replace the below frequency number with the original frequency used to embed the secret
(mult *track* (hzosc 17500.0))
@Ma5onic
Ma5onic / markdown-text-101.md
Created October 15, 2018 04:24 — forked from matthewzring/markdown-text-101.md
A guide to Markdown on Discord.

Markdown Text 101

Want to inject some flavor into your everyday text chat? You're in luck! Discord uses Markdown, a simple plain text formatting system that'll help you make your sentences stand out. Here's how to do it! Just add a few characters before & after your desired text to change your text! I'll show you some examples...

Sweet Styles

Italics *italics* or _italics_

Underline italics __*underline italics*__

Option 1: Command-line download extension as zip and extract

extension_id=jifpbeccnghkjeaalbbjmodiffmgedin   # change this ID
curl -L -o "$extension_id.zip" "https://clients2.google.com/service/update2/crx?response=redirect&os=mac&arch=x86-64&nacl_arch=x86-64&prod=chromecrx&prodchannel=stable&prodversion=44.0.2403.130&x=id%3D$extension_id%26uc" 
unzip -d "$extension_id-source" "$extension_id.zip"

Thx to crxviewer for the magic download URL.

Often referred to as the "swiss army of knife" for TCP/IP networking, [Netcat][1] is an extremely versatile Linux utility that allows you to do anything under the sun using TCP/UDP sockets. It is one of the most favorite tools for system admins when they need to do networking related troubleshooting and experimentation.

In this tutorial, I am sharing a few useful netcat examples, although the sky is the limit when it comes to possible netcat use cases. If you are using netcat regularly, feel free to share your use case.

Note that when you are binding to well-known ports (0-1023) with nc, you need root privilege. Otherwise, run nc as a normal user.

1. Test if a particular TCP port of a remote host is open.

$ nc -vn 192.168.233.208 5000
@Ma5onic
Ma5onic / CFSBuddy.ps1
Created June 14, 2018 18:56 — forked from dfinke/CFSBuddy.ps1
PowerShell v5.0 ConvertFrom-String Buddy - A GUI that helps you work with this new powerful cmdlet
#Requires -Version 5.0.9814.0
if(!($PSVersionTable.PSVersion.Major -ge 5 -and $PSVersionTable.PSVersion.Build -ge 9814)) {
"Sorry you need PSVersion 5.0.9814.0 or newer"
$psversiontable
return
}
Add-Type -AssemblyName presentationframework