Make sure you check dmesg
periodically between these steps for errors...
sudo apt-get update
sudo apt-get install --reinstall linux-modules-$(uname -r)
sudo apt-get install --reinstall linux-headers-$(uname -r)
sudo dkms autoinstall
hciconfig -a
import re | |
import os | |
# extract relative & absolute paths from css and js files | |
# warning: assumes all assets in javascript are within either backticks, single or double quotes. | |
asset_path = './downloaded/' # location of assets to extract URLs from | |
outfile = 'asset_links.txt' # output file | |
chr_b = '' # characters to be printed before the asset link. Leave empty ('') if none. | |
chr_a = '' # characters to be printed after the asset link. Leave empty ('') if none. |
import os | |
import re | |
""" | |
Finds page gaps in pages / archives / research papers / publications / books / numerical archives / files / ranges. | |
Use it to find if you are missing any items in an archive. | |
You can use this on multi-volume archives or files of any type, it simply just searches for strings in the filename. | |
Example output: |
from bluepy.btle import Peripheral, UUID, BTLEInternalError # bluepy==1.3.0 | |
device_address = "00:00:00:00:00:00" | |
try: | |
# check if address is 'random' or 'public' type | |
octets = device_address.split(':') | |
first_octet_binary = bin(int(octets[0], 16))[2:] | |
if first_octet_binary[-1] == '1': | |
addr_type = 'random' |
from bluepy.btle import Peripheral, UUID | |
device_address = "00:00:00:00:00:00" | |
peripheral = Peripheral(device_address, addrType='random') | |
services = peripheral.getServices() | |
for service in services: | |
characteristics = service.getCharacteristics() |
import sys | |
from bluepy.btle import Scanner, DefaultDelegate, Peripheral | |
# the address of your device. Find it using nRF Connect or in your Bluetooth settings | |
device_address = "00:00:00:00:00:00" | |
# example output: | |
""" | |
Device found with address: 00:00:00:00:00:00 |
<!-- | |
if you use PiHole or similar you may have bumped into this | |
issue when Google spams you with referral links as the top | |
result and you can't load them. Well, no longer. Now you | |
can easily extract the link. Fsck Google! | |
Just paste the googleadservices link in, click decode and... tada! | |
--> | |
<!DOCTYPE html> | |
<html lang="en"> |
import os | |
import hashlib | |
import shutil | |
def get_file_md5(filename): | |
"""Calculate the MD5 hash for a file.""" | |
md5_hash = hashlib.md5() | |
with open(filename, "rb") as f: | |
for chunk in iter(lambda: f.read(4096), b""): | |
md5_hash.update(chunk) |
import csv | |
import keyboard | |
import os | |
import signal | |
import sys | |
from datetime import datetime | |
""" | |
Key Snatcher v0.1 - a Linux keylogger - by av1d |
#!/bin/bash | |
# use acme.sh to 'automatically' grab an SSL certificate and deploy it for a list of domains | |
# https://github.com/acmesh-official/acme.sh | |
# domains.txt contains the domain and its path, space-separated, one per line: | |
# example.com /home/luser/example.com | |
# example.org /home/luser/public_html | |
file="domains.txt" |