Skip to content

Instantly share code, notes, and snippets.

@retr0h
retr0h / High_Voltage-1975.md
Created August 23, 2012 22:51
ACDC playlist
@rhowardiv
rhowardiv / ppt.sh
Created October 9, 2012 19:23
powerpoint in bash
#!/bin/bash
usage() {
echo "Interactively show slides from a file"
echo
echo "Usage:"
echo "$0 FILE LINES"
echo
echo "FILE is the file containing the slides."
echo "In the file, each slide is indicated with a simple 'slide' by itself"
@josiahcarlson
josiahcarlson / refresh_lock.py
Created October 15, 2012 05:36
A way to refresh a lock from chapter 6 of Redis in Action
'''A function to refresh a lock that can timeout, before it times out.'''
def refresh_lock(conn, lockname, identifier, lock_timeout=10):
pipe = conn.pipeline(True)
lockname = 'lock:' + lockname
while True:
try:
pipe.watch(lockname)
if pipe.get(lockname) == identifier:
@jimweirich
jimweirich / ruby_flight2.rb
Created November 7, 2012 21:36
Flying the Parrot AR Drone via Ruby code
# See a video of this at: http://www.youtube.com/watch?v=jlKt2Ed-Y04&feature=youtu.be
require 'ardrone'
drone = ARDrone::Drone.new
drone.start
drone.take_off
sleep 5
drone.turn_right(1.0)
@jathanism
jathanism / encrypt.py
Created November 9, 2012 00:33
Simple AES crypto thingy to to encrypt/decrypt passwords.
# -*- coding: utf-8 -*-
"""
Simple AES crypto thingy to to encrypt/decrypt passwords.
"""
from Crypto.Cipher import AES # http://pypi.python.org/pypi/pycrypto
DEFAULT_PADDER = '\x03'
DEFAULT_KEYLEN = 16
@joewilliams
joewilliams / sudo.sh
Created November 12, 2012 19:23 — forked from boorad/sudo.sh
sudo to sesudo
#!/bin/bash
declare -a args
while [ $# -gt 0 ] ; do
case "$1" in
-n) shift ;;
*) args=("${args[@]}" "$1") ; shift ;;
esac
done
@shanselman
shanselman / gist:5422230
Last active April 10, 2025 15:49
Evil Blog Comment Spammer just exposed his template through some error and the whole thing showed up in my comments.
{
{I have|I've} been {surfing|browsing} online more than {three|3|2|4} hours today, yet I never found any interesting article like yours. {It's|It
is} pretty worth enough for me. {In my opinion|Personally|In my view}, if all {webmasters|site owners|website owners|web owners} and bloggers made good content as
you did, the {internet|net|web} will be {much more|a lot more}
useful than ever before.|
I {couldn't|could not} {resist|refrain from} commenting. {Very well|Perfectly|Well|Exceptionally well} written!|
{I will|I'll} {right away|immediately} {take hold of|grab|clutch|grasp|seize|snatch}
your {rss|rss feed} as I {can not|can't} {in finding|find|to find} your {email|e-mail} subscription {link|hyperlink} or {newsletter|e-newsletter} service. Do {you have|you've} any?
{Please|Kindly} {allow|permit|let} me {realize|recognize|understand|recognise|know} {so that|in order that} I {may just|may|could} subscribe.
Thanks.|
@ragingwind
ragingwind / Backend Architectures Keywords and References.md
Last active July 22, 2025 10:47
Backend Architectures Keywords and References
@ah8r
ah8r / README.md
Last active June 7, 2020 19:51
Hut3 Cardiac Arrest (compatible with Python 2.7)

Cardiac Arrest

Hut3 Cardiac Arrest - A script to check OpenSSL servers for the Heartbleed bug (CVE-2014-0160).

Note: This code was originally a GitHub Gist but has been copied to a full GitHub Repository so issues can also be tracked. Both will be kept updated with the latest code revisions.

DISCLAIMER: There have been unconfirmed reports that this script can render HP iLO unresponsive. This script complies with the TLS specification, so responsitivity issues are likely the result of a bad implementation of TLS on the server side. CNS Hut3 and Adrian Hayter do not accept responsibility if this script crashes a server you test it against. USE IT AT YOUR OWN RISK. As always, the correct way to test for the vulnerability is to check the version of OpenSSL installed on the server in question. OpenSSL 1.0.1 through 1.0.1f are vulnerable.

This script has several advantages over similar scripts that have been re