Skip to content

Instantly share code, notes, and snippets.

View auser's full-sized avatar

Ari auser

View GitHub Profile
#!/usr/bin/env bash
# untar the ova
tar -xvf [path-to-ova]
# Convert to qcow2
qemu-img convert -O qcow2 jangow\ 01-disk001.vmdk jangow.qcow2
# Create a new machine in UTM
# Select emulated
#!/usr/bin/env bash
declare -A Colors=(
[Color_Off]='\033[0m'
[Black]='\033[0;30m'
[Red]='\033[0;31m'
[Green]='\033[0;32m'
[Yellow]='\033[0;33m'
[Blue]='\033[0;34m'
[Purple]='\033[0;35m'
@auser
auser / run.sh
Last active April 9, 2024 17:21
#!/usr/bin/env bash
# Default configuration
IMAGE_NAME="auser/dev"
# Color definitions
declare -A Colors=(
[Color_Off]='\033[0m'
[Black]='\033[0;30m'
[Red]='\033[0;31m'
@auser
auser / clone-all.sh
Created December 19, 2023 16:55 — forked from zeekay/clone-all.sh
#!/usr/bin/env sh
repos='bridge bridge-react chat cli coreth dao docs exchange explorer faucet finance gsn indexer lattice lpm luxjs marketplace multiparty netrunner netrunner-sdk node oraclevm plugins-core safe safe-ios sites standard subnet-evm town ui vault vmsdk wallet zchain'
for r in $repos;
do git clone [email protected]:luxdefi/$r
done
# /etc/systemd/system/[email protected]
[Unit]
Description=Manage VNC Server on this droplet
After = syslog.target network.target
[Service]
Type=forking
PidFile = /home/auser/.vnc/%H:%i.pid
ExecPreStart=/usr/bin/tigervncserver -kill %i >/dev/null 2>&1
ExecStart=/usr/bin/tigervncserver -depth 24 -geometry 1920x1080 -localhost %i

Keybase proof

I hereby claim:

  • I am auser on github.
  • I am auser (https://keybase.io/auser) on keybase.
  • I have a public key ASAmUp6O5pKPPrq1HOrLDcA70zfA3gKBOo1NL-Oe3pGEvgo

To claim this, I am signing this object:

@auser
auser / index.html
Last active November 10, 2021 17:40
<html>
<head>
<title>My Post Secret</title>
</head>
<body>
<div id="app"></div>
<form>
<input type="text" name="name" />
</form>
</body>
@auser
auser / tutorial.txt
Created June 23, 2021 14:45 — forked from JamesMenetrey/tutorial.txt
PwnTools; example of usage
Source: https://tc.gts3.org/cs6265/2017/l/lab04/README-tut.txt
====================================
Lec04: Writing Exploits with PwnTool
====================================
http://docs.pwntools.com/
http://docs.pwntools.com/en/stable/intro.html
@auser
auser / pwner.py
Created June 13, 2021 12:38
picoCTF Here's a LIBC
#!/usr/bin/env python3
from pwn import gdb, log, p64, process, remote, u64
p = process('./vuln')
# p = remote('mercury.picoctf.net', 49464)
gdb.attach(p)
offset = 136
junk = b'A' * offset
cycler==0.10.0
kiwisolver==1.3.1
matplotlib==3.3.4
numpy==1.19.5
Pillow==8.2.0
pyparsing==2.4.7
python-dateutil==2.8.1
six==1.16.0