I hereby claim:
- I am michenriksen on github.
- I am michenriksen (https://keybase.io/michenriksen) on keybase.
- I have a public key whose fingerprint is 6E84 2CEC 82F6 9A2E 0AEF D873 669F 1E2A 8DFA 5CA5
To claim this, I am signing this object:
require 'resolv' | |
require 'date' | |
unless @domain = ARGV.first | |
puts "DNS Checker\n\n" | |
puts "Performs a DNS lookup on a domain until it can be resolved.\n\n" | |
puts "USAGE:" | |
puts " ruby #{__FILE__} <domain> [<sleep>]\n\n" |
hosts=( p4fsi4ockecnea7l.onion lgttsalmpw3qo4no.onion 5jebommkgbfl6agc.onion lbkwyb2csfcgoxwa.onion ) | |
for i in "${hosts[@]}" | |
do | |
torsocks 2>&1 > /dev/null nc -w5 $i 6667 2>&1 > /dev/null && echo " ✔ $i is alive!" || echo " ✖ $i seems dead." | |
done |
function viewsource { | |
/usr/bin/curl --user-agent "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Firefox/24.0" -s "$1" | /usr/local/bin/pygmentize -g -O encoding='utf-8' | |
} |
# A Ruby script for spoofing mail directly to the destination's SMTP server. | |
# https://defuse.ca/email-spoofing-in-ruby.htm | |
# | |
# This code is in the public domain. Do whatever you want with it. | |
# | |
# Usage: mailspoof.rb <options> | |
# -t, --to ADDRESS Send mail to this email address | |
# -f, --from ADDRESS Send mail from this email address | |
# -s, --subject SUBJECT Mail subject | |
# -m, --mail FILE File containing email message |
I hereby claim:
To claim this, I am signing this object:
#!/bin/sh | |
# Put this file in /etc/pm/power.d/ and make it executable | |
case $1 in | |
true) | |
# Replace <username> with your actual username. | |
# You might need to use gnome-screensaver-command instead | |
if DISPLAY=:0.0 XAUTHORITY=/home/<username>/.Xauthority sudo -u <username> cinnamon-screensaver-command -q | egrep -q 'is active'; then | |
# Kill KeePassX | |
killall keepassx |
# Read more about the issue here: http://breizh-entropy.org/~nameless/random/posts/firechat_and_nearby_communication/ | |
require 'socket' | |
require 'openssl' | |
require 'json' | |
require 'cgi' | |
FIRECHAT_HOST = '209.237.236.194' | |
FIRECHAT_PORT = 4176 |
0 | |
01 | |
02 | |
03 | |
0_ | |
1 | |
10 | |
100 | |
101 | |
102 |
extract() { | |
if [ -f $1 ] ; then | |
case $1 in | |
*.tar.bz2) tar xvjf $1 ;; | |
*.tar.gz) tar xvzf $1 ;; | |
*.bz2) bunzip2 $1 ;; | |
*.rar) unrar x $1 ;; | |
*.gz) gunzip $1 ;; | |
*.tar) tar xvf $1 ;; | |
*.tbz2) tar xvjf $1 ;; |
<!DOCTYPE html> | |
<html> | |
<head> | |
<meta charset="utf-8"> | |
<meta name="viewport" content="width=device-width"> | |
<title>Detecting Hunchly</title> | |
</head> | |
<body> | |
<div id="canary"> | |
John Doe [email protected] 888444333 |