Skip to content

Instantly share code, notes, and snippets.

View michele-tn's full-sized avatar
🎯
Focusing

michele-tn

🎯
Focusing
View GitHub Profile

πŸ› οΈ How to Create VLANs via SSH on OpenWRT Routers (e.g., GL.iNet Mango)

This README provides a step-by-step guide on how to create VLANs on OpenWRT-based routers (such as GL.iNet Mango) using the command-line interface via SSH. VLANs (Virtual LANs) enable network segmentation for enhanced security and management.


πŸ“‹ Requirements

  • OpenWRT-compatible router (e.g., GL.iNet Mango)
  • SSH access to the router

πŸš€ [#SCADA LANGUAGE] Videojet DataFlex 6420 β€” Zipher Text Communications Protocol Example

This README demonstrates how to communicate with a Videojet printer using the Zipher Text Communications Protocol, as detailed in the official documentation:

πŸ“„ Protocol PDF: Zipher Text Coms Protocol v1.21


πŸ”§ Purpose

πŸš€ Advanced Network Stress-Testing in C#

SYN Flood & UDP Flood with Random Source IP and MAC


network icon

Simulate DDoS/DoS Attacks for Penetration Testing (Linux, C#, Raw Sockets)

DNS Speed Test Script

A simple Bash script to measure and compare DNS query response times from popular public DNS servers.
Outputs aligned ASCII tables showing raw and sorted results by speed.


Tested Environment

Database Normalization: From 1NF to 6NF

Database normalization is a fundamental methodology in relational database design. Its main objectives are:

  • Reduce redundancy
  • Prevent anomalies
  • Maintain data integrity

This document provides an overview of the six normal forms, including BCNF, with practical examples.


1. Introduction and scope

Hash functions are ubiquitous in information security: they are used for integrity checks, content-addressed storage, digital signatures, password verification, and more. This document treats three families of constructions that have received the most attention in practice and in the literature: MD5 (an historical design of the MD family), SHA-2 (notably SHA-256, standardized in FIPS 180), and SHA-3 (the Keccak-based family standardized in FIPS 202). Where necessary we contrast the design principles (MerkleDamgrd vs. sponge) and explain the consequences for security. Key primary sources are cited: the MD5 specification (RFC 1321), the SHA standards (FIPS 180-4), the SHA-3 standard (FIPS 202), and major cryptanalytic work on MD5 and related constructions. citeturn0search0turn0search7turn3search2


2. Formal definitions and basic security notions

Let (H:{0,1}^* o{0,1}^n) be a deterministic function mapping binary strings of arbitrary length to fixed-length (n)-bit o

@michele-tn
michele-tn / Secure Guest SSH user creation.md
Last active October 4, 2025 21:41
Secure Guest SFTP User on Ubuntu 22.04 - test on Ubuntu 22.04.5 LTS (GNU/Linux 5.15.0-156-generic x86_64)

Secure Guest SFTP User on Ubuntu 22.04.5

Abstract

In multi-user environments, providing controlled access to file transfer services is a recurring requirement. This document describes a structured procedure for configuring a non-privileged user account on Ubuntu 22.04.5 with access restricted exclusively to SFTP. Additionally, it outlines the optional configuration of reverse TCP tunneling over SSH, intended for controlled administrative or connectivity use cases. The configuration ensures compliance with security best practices by removing administrative privileges,

<#
RustDesk Portable (x64) Auto Downloader & Configurator
-----------------------------------------------------
β€’ Downloads the latest available RustDesk Windows x64 portable client from GitHub
β€’ No installation (single .exe)
β€’ Automatically sets:
- ID server
- Key
(Relay e API non impostati)
β€’ Creates and updates a download log

RustDesk Portable Auto Downloader & Configurator (Windows x64)

This repository provides a PowerShell script that automatically downloads, configures, and launches the RustDesk Windows x64 portable client, using only your self-hosted ID server and public key.

It is ideal for:

  • πŸ”§ Mass deployment (RMM, GPO, Intune, etc.)
  • 🧰 Technicians who need a ready-to-use portable RustDesk client
  • πŸ’Ό Environments where software installation is restricted

Note