Skip to content

Instantly share code, notes, and snippets.

View TBK's full-sized avatar
💭
I may be slow to respond.

TBK TBK

💭
I may be slow to respond.
View GitHub Profile
@magnetikonline
magnetikonline / README.md
Last active October 31, 2024 17:00
Bash string manipulation cheatsheet.

Bash string manipulation cheatsheet

Assignment
Assign value to variable if variable is not already set, value is returned.

Combine with a : no-op to discard/ignore return value.
${variable="value"}
: ${variable="value"}
@jirutka
jirutka / abuild-can-remove
Last active September 13, 2021 17:50
Some helper scripts for checking dependencies of Alpine packages.
#!/bin/sh
#
# This scripts checks the given list of packages if they have
# reverse dependencies (i.e. there are packages which depends on them).
# Dependencies that are on the list are excluded.
#
# Usage: $0 LIST
set -eu
SCRIPT_DIR="$(dirname "$(readlink -f "$0")")"
@aswild
aswild / vyatta_wireguard_build.sh
Last active February 14, 2020 23:06
Download and build the wireguard kernel module and tools for EdgeOS. see https://github.com/Lochnair/vyatta-wireguard
#!/bin/sh
cat <<_EOF
This script has moved!
Check out https://github.com/aswild/vyatta-wireguard-build
_EOF
@TBK
TBK / associated_freqs.sh
Created November 1, 2022 23:28
Script to extract and convert associated on frequencies to channel numbers from a wpa_supplicant log
#!/bin/sh
# Author: TBK
# Email: [email protected]
# SPDX-License-Identifier: GPL-2.0-only
# Version: 0.0.1
# Description: Tool to extract and nicely present channels that wpa_supplicant has associated on
# Usage: ./associated_freqs.sh
if [ -f wpa_supplicant.log ]; then
# Grab all lines with frequencies that has been associated on | Reduce it to the frequency | Sort | Remove duplicates
@0xdevalias
0xdevalias / _deobfuscating-unminifying-obfuscated-web-app-code.md
Last active November 17, 2024 17:02
Some notes and tools for reverse engineering / deobfuscating / unminifying obfuscated web app code