Open Telegram and search for @BotFather user and message them the following:
You
/newbot
BotFather
#!/usr/bin/env python3 | |
from ogn.client import AprsClient | |
from ogn.parser import parse, ParseError | |
def process_beacon(raw_message): | |
try: | |
f = False | |
#for i in ['FNT08DFBC', 'WALS:', 'FNT082300', 'DBG:', 'guggenth:', 'FNT065063']: | |
for i in ['FNT065063']: |
from scapy.all import * | |
# change this to your test machine's MAC address | |
SELF_MAC = '00:0c:29:67:22:c2' | |
BCAST_MAC = 'ff:ff:ff:ff:ff:ff' | |
# this will send a PROBE ARP request packet to the supplied IP address argument |
#!/bin/bash | |
set -e | |
USER="username" | |
PAPERLESS_HOST="paperless.your.domain" | |
PASS="$(pass ${PAPERLESS_HOST}/${USER})" | |
URL="https://${PAPERLESS_HOST}/api/documents/post_document/" | |
API="Accept: application/json; version=2" |
:~# /usr/bin/haproxyctl help | |
usage: /usr/bin/haproxyctl <argument> | |
where <argument> can be: | |
start : start haproxy unless it is already running | |
stop : stop an existing haproxy | |
restart : immediately shutdown and restart | |
reload : gracefully terminate existing connections, reload /etc/haproxy/haproxy.cfg | |
status : is haproxy running? on what ports per lsof? | |
configcheck : check /etc/haproxy/haproxy.cfg | |
nagios : nagios-friendly status for running process and listener |
#!/usr/bin/python3 | |
# THIS CODE IS A MESSY QUICK AND DIRTY HACK | |
# AND WON'T BE COMMENTED FURTHER :) | |
import re | |
from collections import OrderedDict | |
from operator import itemgetter |
#!/usr/bin/python3 | |
import requests | |
import os | |
from pprint import pprint | |
import functools | |
import yaml | |
USERNAME='username' | |
PASSWORD='password' |
""" | |
Binance Marketcap PairList provider | |
Provides dynamic pair list based on market cap | |
""" | |
import logging | |
import requests | |
from typing import Any, Dict, List | |
from cachetools.ttl import TTLCache |
#!/bin/bash | |
echo -n "Enter Password: " | |
read p | |
sha=`echo -n "${p}" | sha1sum - | awk '{print $1}'` | |
sha_short=`echo -n "${sha}" | sed 's,^\(.....\).*,\1,'` | |
wget -q -O - "https://api.pwnedpasswords.com/range/${sha_short}" | grep -i "${sha}" |
require("base64") | |
core.register_fetches("ssl_c_pem", function(txn) | |
local der = txn.f:ssl_c_der() | |
local wrap = ('.'):rep(64); | |
local envelope = "-----BEGIN %s-----\n%s\n-----END %s-----\n" | |
local typ = "CERTIFICATE"; | |
der = base64.encode(data); | |
return string.format(envelope, typ, der:gsub(wrap, '%0\n', (#der-1)/64), typ); |