Skip to content

Instantly share code, notes, and snippets.

View l1kw1d's full-sized avatar
🖥️
- https://jprovo.st -

Jonathan Provost l1kw1d

🖥️
- https://jprovo.st -
View GitHub Profile
@l1kw1d
l1kw1d / index.html
Created April 7, 2021 12:28
SVG Badge Generator
<svg width="167" height="177" viewBox="0 0 167 177" xmlns="http://www.w3.org/2000/svg" id="shield">
<path id="border" d="M83.2.9L.6 30l13 108.3 69.7 38.3 70.1-38.8 13.1-108.3L83.2.9z" fill="url(#pattern0)" />
<path id="right" d="M158.2 35.7L83.1 10.1v157.4l62.9-34.9 12.2-96.9z" fill="url(#pattern3)" />
<path id="left" d="M9.8 36.2L21 133.1l62 34.4V10.1L9.8 36.2z" fill="url(#pattern1)" />
<text id="firstLetter" fill="url(#pattern2)" transform="rotate(-15.009 53.647 79.167)">
<tspan x="30.144" y="105.167">J</tspan>
</text>
<text id="lastLetter" fill="url(#pattern4)" transform="rotate(8.681 121.284 79.735)">
@l1kw1d
l1kw1d / README.md
Created January 24, 2021 22:21 — forked from smarek/README.md
Inflate gzdeflate contents / decode eIDAS SAMLRequest param

Run like

> decode_saml_request.sh sample_data
This file has been truncated, but you can view the full file.
https://d100ggybbo5zc3.cloudfront.net/robots.txt
https://d100hbaejziaau.cloudfront.net/html/ni/v2/index.html
https://d100hbaejziaau.cloudfront.net/robots.txt
https://d101vc9winf8ln.cloudfront.net/robots.txt
https://d102h21jdrkqfz.cloudfront.net/catalog/ONEHOPE-Wine_Fall-Winter-Catalog-2017.pdf
https://d102h21jdrkqfz.cloudfront.net/robots.txt
https://d104a587fp2c6l.cloudfront.net/Guias/GUIA-GeneroYDeporte_web%20final.pdf
https://d104a587fp2c6l.cloudfront.net/Guias/Guia_Web_final.pdf
https://d104a587fp2c6l.cloudfront.net/robots.txt
https://d104elra3nttvm.cloudfront.net/robots.txt
@l1kw1d
l1kw1d / wordpress-setup-attack.sh
Created November 9, 2019 00:01 — forked from valorin/wordpress-setup-attack.sh
Proof of concept WordPress setup script attack - sets up a new WP installation and injects a simple shell into /wp-content/themes/twentynineteen/404.php and /wp-hello.php.
#!/bin/bash
#
# WordPress Setup Attack Script
#
# Created by Stephen Rees-Carter (https://stephenreescarter.net/)
#
# This script injects a remote shell into a fresh copy of WordPress that hasn't been set up yet.
# Once the shells have been set up, it removes the config file with the custom database connection to reset the site back to a fresh install.
#

Keybase proof

I hereby claim:

  • I am l1kw1d on github.
  • I am jprovost (https://keybase.io/jprovost) on keybase.
  • I have a public key ASBuWDYe58vespQmbdyDS0EAJoOkDdLCvfJCZgAL2J2iqgo

To claim this, I am signing this object:

@l1kw1d
l1kw1d / impossible-triangle-animation.markdown
Created September 15, 2017 07:45
Impossible triangle animation
echo 'export PATH=$HOME/local/bin:$PATH' >> ~/.bashrc
. ~/.bashrc
mkdir ~/local
mkdir ~/node-latest-install
cd ~/node-latest-install
curl http://nodejs.org/dist/node-latest.tar.gz | tar xz --strip-components=1
./configure --prefix=~/local
make install # ok, fine, this step probably takes more than 30 seconds...
curl https://www.npmjs.org/install.sh | sh
#!/usr/bin/env node
var program = require('commander');
var request = require('request');
var chalk = require('chalk');
program
.version('0.0.1')
.usage('[options] <keywords>')
.option('-o, --owner [name]', 'Filter by the repositories owner')
@l1kw1d
l1kw1d / index.js
Created May 26, 2014 06:44 — forked from max-mapper/index.js
requirebin sketch
var insertCSS = require('insert-css')
var domify = require('domify')
var css = ".button { display: inline-block; font-family: Arial; background-color: papayawhip; padding: 10px; border: 1px solid salmon; }"
var html = '<div class="button">BUTTON</div>'
// inserts new <style> tag into the <head>
insertCSS(css)
// append the html elements that domify returns to the <body>
@l1kw1d
l1kw1d / index.js
Created May 26, 2014 06:41
requirebin sketch
// example using the raf module from npm. try changing some values!
var requestAnimationFrame = require("raf")
var canvas = document.createElement("canvas")
canvas.width = 500
canvas.height = 500
document.body.appendChild(canvas)
var context = canvas.getContext("2d")