Add the code below to .sh file.
# Optional:
# exec 1<&- # Close STDOUT file descriptor
# exec 2<&- # Close STDERR FD
parent_path=$( cd "$(dirname "${BASH_SOURCE[0]}")" ; pwd -P )
LOG_FILE=$parent_path'/error.log' #log file name
cat urls.txt | httpx -json -store-response -output httpx.json | |
cat httpx.json | jq -r '"\(.stored_response_path) \(.path | ltrimstr("/"))"' | xargs -n 2 sh -c 'mkdir -p "$(dirname $2)" && cp $1 $2' sh |
#!/usr/bin/env bash | |
PATH=/bin:/sbin:/usr/bin:/usr/sbin:/usr/local/bin:/usr/local/sbin:~/bin | |
export PATH | |
# Description: Auto test download & I/O speed script | |
# Thanks: LookBack <[email protected]>; Nils Steinger; Teddysun | |
# Toyo: https://doub.io | |
# H2YTech: https://minecloud.asia | |
# For https://VPS.BEST | |
RED='\033[0;31m' && GREEN='\033[0;32m' && YELLOW='\033[0;33m' && PLAIN='\033[0m' |
PARALLEL=7 | |
TARGET=http://127.0.0.1:8080/ | |
N=$(seq 1 ${PARALLEL:?}) && while :; do printf "${TARGET:?}\n%.s" ${N} | xargs -P"${PARALLEL:?}" -I{} curl -sS {} -o /dev/null -w "response_code:%{response_code}\ttime_total:%{time_total}\n"; done | tee /tmp/loadtest_$(date +%Y%m%d_%H%M%S).log |
/interface list | |
add comment=defconf name=WAN | |
add comment=defconf name=LAN | |
/interface list member | |
add interface=ether1 list=WAN | |
/ip firewall address-list | |
add address=192.168.0.0/16 list=Bogon | |
add address=10.0.0.0/8 list=Bogon |
Add the code below to .sh file.
# Optional:
# exec 1<&- # Close STDOUT file descriptor
# exec 2<&- # Close STDERR FD
parent_path=$( cd "$(dirname "${BASH_SOURCE[0]}")" ; pwd -P )
LOG_FILE=$parent_path'/error.log' #log file name
THIS GIST WON'T BE UPDATED ANY MORE (24/10/18)
Follow the progress of this project here 3os.org Raspberry Pi 3 TOR Access Point Router Project
Network: Router RJ45 <--> Ethernet Port on Raspberry <--> TOR <--> Raspberry WIFI AC <--> WIFI CLIENT
# -- Download Rasbian Strech Lite from: https://www.raspberrypi.org/downloads/raspbian/
On the device to be discovered:
chmod +x /usr/bin/ip-discovery
sudo systemctl daemon-reload && sudo systemctl start ip-discovery
On the device wanting to discover the device to be discovered:
. ~/ip-discover
$ echo -n -e "\x3c\x97\x0e\x1d\x3f\x07\xf8\x32\xe4\xc0\x48\xab\x00\x02\x61\x62" | sudo socat -t 1 -lu -x -d -d -d -d - SOCKET-SENDTO:17:3:0:x0003x02000000x0000x00x06x3c970e1d3f070000 | |
2020/06/22 04:34:56.306263 socat[762494] D getpid() | |
2020/06/22 04:34:56.306315 socat[762494] D getpid() -> 762494 | |
2020/06/22 04:34:56.306322 socat[762494] D setenv("SOCAT_PID", "762494", 1) | |
2020/06/22 04:34:56.306329 socat[762494] D setenv() -> 0 | |
2020/06/22 04:34:56.306332 socat[762494] D setenv("SOCAT_PPID", "762494", 1) | |
2020/06/22 04:34:56.306337 socat[762494] D setenv() -> 0 | |
2020/06/22 04:34:56.306341 socat[762494] I socat by Gerhard Rieger and contributors - see www.dest-unreach.org | |
2020/06/22 04:34:56.306345 socat[762494] I This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/) | |
2020/06/22 04:34:56.306349 socat[762494] I This product includes software written by Tim Hudson ([email protected]) |
#!/bin/bash | |
#Usage: ./stun.sh [email protected] [Destination port] [Local port (optional)] | |
DESTINATION=$1 | |
DEST_PORT=$2 | |
PROXY_PORT=$((RANDOM%10000+10000)) | |
#Set local port to same as remote if unset |
socat TCP-LISTEN:<localport> SOCKS4A:localhost:<host>:<remoteport>,socksport=9050 | |
# for example, to ssh into secret.shell.server.org via tor, do: | |
$ socat TCP-LISTEN:22222 SOCKS4A:localhost:secret.shell.server.org:22,socksport=9050 & | |
$ ssh localhost -p 22222 |