I hereby claim:
- I am skyplabs on github.
- I am skyplabs (https://keybase.io/skyplabs) on keybase.
- I have a public key ASCWCei4GtX0zKqBRc8JkNBZ8K8gI8JFCmhl3mTtd-gHNwo
To claim this, I am signing this object:
#include <stdio.h> | |
#include <stdlib.h> | |
#include <signal.h> | |
#define SIGTERM 15 | |
#define SIGKILL 9 | |
#define SIGINT 2 | |
void signal_handler(int signal) | |
{ |
# Green | |
function echo_ok { | |
echo -e "\033[32m[OK]\033[0m $@" | |
} | |
# Red (using strerr as output) | |
function echo_err { | |
echo -e "\033[31m[ERROR]\033[0m $@" 1>&2 | |
} |
#include <Wire.h> | |
void setup() | |
{ | |
Wire.begin(); | |
Serial.begin(9600); | |
} | |
const float gyro_factor = 14.375; |
is_ipv4() { | |
local -r regex='^((25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.){3}(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)$' | |
[[ $1 =~ $regex ]] | |
return $? | |
} |
#!/bin/bash | |
# Returns the decimal value of the payload contained in NEC infrared frames. | |
# | |
# Uses the ouput of the mode2 tool from the LIRC project as input. | |
if [ -z "$1" ] | |
then | |
echo "Usage: $0 <LIRC decode file>" | |
exit 0 |
MCU = atmega328p | |
TARGET_ARCH = -mmcu=$(MCU) | |
TARGET = main | |
CC = avr-gcc | |
CPPFLAGS = -mmcu=$(MCU) | |
CFLAGS = -Os -g -Wall -I. -DF_CPU=16000000 | |
LDFLAGS = -g -mmcu=$(MCU) -lm -Wl,--gc-sections -Os | |
PGMER = -c arduino -b 115200 -P /dev/ttyACM0 | |
PGMERISP = -c avrispv2 -P /dev/ttyACM0 | |
DUDE = /usr/bin/avrdude -V -p $(MCU) |
<?php | |
// Connection variables. | |
$db_type = ""; | |
$db_host = ""; | |
$db_user = ""; | |
$db_password = ""; | |
$db_database = ""; | |
// We test the connection with the database. | |
try |
I hereby claim:
To claim this, I am signing this object:
FROM docker.io/node:8-stretch | |
LABEL net.skyplabs.maintainer-name="Paul-Emmanuel Raoul" | |
LABEL net.skyplabs.maintainer-email="[email protected]" | |
ENV DEBIAN_FRONTEND=noninteractive | |
RUN apt-get update \ | |
&& apt-get install -y --no-install-recommends chromium |
from scapy.all import * | |
interface = "eth0" | |
def print_packet(packet): | |
ip_layer = packet.getlayer(IP) | |
print("[!] New Packet: {src} -> {dst}".format(src=ip_layer.src, dst=ip_layer.dst)) | |
print("[*] Start sniffing...") | |
sniff(iface=interface, filter="ip", prn=print_packet) |