I hereby claim:
- I am michenriksen on github.
- I am michenriksen (https://keybase.io/michenriksen) on keybase.
- I have a public key whose fingerprint is 6E84 2CEC 82F6 9A2E 0AEF D873 669F 1E2A 8DFA 5CA5
To claim this, I am signing this object:
| require 'resolv' | |
| require 'date' | |
| unless @domain = ARGV.first | |
| puts "DNS Checker\n\n" | |
| puts "Performs a DNS lookup on a domain until it can be resolved.\n\n" | |
| puts "USAGE:" | |
| puts " ruby #{__FILE__} <domain> [<sleep>]\n\n" |
| hosts=( p4fsi4ockecnea7l.onion lgttsalmpw3qo4no.onion 5jebommkgbfl6agc.onion lbkwyb2csfcgoxwa.onion ) | |
| for i in "${hosts[@]}" | |
| do | |
| torsocks 2>&1 > /dev/null nc -w5 $i 6667 2>&1 > /dev/null && echo " ✔ $i is alive!" || echo " ✖ $i seems dead." | |
| done |
| function viewsource { | |
| /usr/bin/curl --user-agent "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Firefox/24.0" -s "$1" | /usr/local/bin/pygmentize -g -O encoding='utf-8' | |
| } |
| # A Ruby script for spoofing mail directly to the destination's SMTP server. | |
| # https://defuse.ca/email-spoofing-in-ruby.htm | |
| # | |
| # This code is in the public domain. Do whatever you want with it. | |
| # | |
| # Usage: mailspoof.rb <options> | |
| # -t, --to ADDRESS Send mail to this email address | |
| # -f, --from ADDRESS Send mail from this email address | |
| # -s, --subject SUBJECT Mail subject | |
| # -m, --mail FILE File containing email message |
I hereby claim:
To claim this, I am signing this object:
| #!/bin/sh | |
| # Put this file in /etc/pm/power.d/ and make it executable | |
| case $1 in | |
| true) | |
| # Replace <username> with your actual username. | |
| # You might need to use gnome-screensaver-command instead | |
| if DISPLAY=:0.0 XAUTHORITY=/home/<username>/.Xauthority sudo -u <username> cinnamon-screensaver-command -q | egrep -q 'is active'; then | |
| # Kill KeePassX | |
| killall keepassx |
| # Read more about the issue here: http://breizh-entropy.org/~nameless/random/posts/firechat_and_nearby_communication/ | |
| require 'socket' | |
| require 'openssl' | |
| require 'json' | |
| require 'cgi' | |
| FIRECHAT_HOST = '209.237.236.194' | |
| FIRECHAT_PORT = 4176 |
| 0 | |
| 01 | |
| 02 | |
| 03 | |
| 0_ | |
| 1 | |
| 10 | |
| 100 | |
| 101 | |
| 102 |
| extract() { | |
| if [ -f $1 ] ; then | |
| case $1 in | |
| *.tar.bz2) tar xvjf $1 ;; | |
| *.tar.gz) tar xvzf $1 ;; | |
| *.bz2) bunzip2 $1 ;; | |
| *.rar) unrar x $1 ;; | |
| *.gz) gunzip $1 ;; | |
| *.tar) tar xvf $1 ;; | |
| *.tbz2) tar xvjf $1 ;; |
| <!DOCTYPE html> | |
| <html> | |
| <head> | |
| <meta charset="utf-8"> | |
| <meta name="viewport" content="width=device-width"> | |
| <title>Detecting Hunchly</title> | |
| </head> | |
| <body> | |
| <div id="canary"> | |
| John Doe [email protected] 888444333 |