Skip to content

Instantly share code, notes, and snippets.

@guimmp92
guimmp92 / nokia-router-cfg-tool.py
Created June 26, 2023 21:50 — forked from thedroidgeek/nokia-router-cfg-tool.py
Nokia/Alcatel-Lucent router backup configuration tool
#!/usr/bin/env python3
#
# Nokia/Alcatel-Lucent router backup configuration tool
#
# Features:
# - Unpack/repack .cfg files generated from the backup and restore functionnality
# in order to modify the full router configuration
# - Decrypt/encrypt the passwords/secret values present in the configuration
================================================================================
Recipe Compile Error in /tmp/kitchen/cookbooks/iii/recipes/default.rb
================================================================================
NoMethodError
-------------
Undefined method or attribute `action' on `node'
@guimmp92
guimmp92 / README.md
Created June 16, 2019 21:42 — forked from ruario/README.md
Alternative (fake) makepkg to create Slackware packages

These scripts are for people who want an alternative to the official Slackware provided makepkg.

Why would you want that?

  • To be able to create Slackware packages with root-owned files, even when run as a regular user.
  • To be able create Slackware packages on non-Slackware based systems without the need to port Pkgtools and its dependencies (e.g. tar-1.13). Some examples being:
    • Projects (or proprietary software vendors) that want to be able to provide binary Slackware packages, where their build/packaging system is on another distro.
    • People who want to pair a package creation script with spkg to use as a secondary package manger on a non-Slackware based distro. This gives the advantage of simple packaging scripts (.SlackBuilds) for additional, self-compiled software.

Two versions are provided:

@guimmp92
guimmp92 / app.js
Created May 24, 2017 18:57 — forked from dskanth/app.js
Server file for Private chat using node.js and socket.io
var app = require('express').createServer()
var io = require('socket.io').listen(app);
var fs = require('fs');
app.listen(8008);
// routing
app.get('/', function (req, res) {
res.sendfile(__dirname + '/chat.html');
});
@guimmp92
guimmp92 / chat.html
Created May 24, 2017 18:56 — forked from dskanth/chat.html
Client file for Private chat using node.js and socket.io
<script src="/socket.io/socket.io.js"></script>
<script src="https://ajax.googleapis.com/ajax/libs/jquery/1.6.4/jquery.min.js"></script>
<script type="text/javascript">
var my_username = '';
function send_individual_msg(id)
{
//alert(id);
//alert(my_username);
socket.emit('check_user', my_username, id);
//socket.emit('msg_user', id, my_username, prompt("Type your message:"));
@guimmp92
guimmp92 / opera-vpn.md
Created May 8, 2017 16:48 — forked from spaze/opera-vpn.md
Opera VPN behind the curtains is just a proxy, here's how it works

When setting up (that's immediately when user enables it in settings) Opera VPN sends few API requests to https://api.surfeasy.com to obtain credentials and proxy IPs, see below, also see The Oprah Proxy.

The browser then talks to a proxy de0.opera-proxy.net (when VPN location is set to Germany), it's IP address can only be resolved from within Opera when VPN is on, it's 185.108.219.42 (or similar, see below). It's an HTTP/S proxy which requires auth.

When loading a page with Opera VPN enabled, the browser sends a lot of requests to de0.opera-proxy.net with Proxy-Authorization request header.

The Proxy-Authorization header decoded: CC68FE24C34B5B2414FB1DC116342EADA7D5C46B:9B9BE3FAE674A33D1820315F4CC94372926C8210B6AEC0B662EC7CAD611D86A3 (that's sha1(device_id):device_password, where device_id and device_password come from the POST /v2/register_device API call, please note that this decoded header is from another Opera installation and thus contains

@guimmp92
guimmp92 / Aircrack Commands
Created April 25, 2017 19:15 — forked from victorreyesh/Aircrack Commands
Cracking WPA2 / WEP Wifi / Aircrack 10 seconds guide. For Mac OSX
//Install Macports.
//Install aircrack-ng:
sudo port install aircrack-ng
//Install the latest Xcode, with the Command Line Tools.
//Create the following symlink:
sudo ln -s /System/Library/PrivateFrameworks/Apple80211.framework/Versions/Current/Resources/airport /usr/sbin/airport
//Figure out which channel you need to sniff:
sudo airport -s
sudo airport en1 sniff [CHANNEL]