Skip to content

Instantly share code, notes, and snippets.

@nonsleepr
nonsleepr / officepy_repl.py
Created September 6, 2023 16:10
OfficePy REPL
import requests
from io import BytesIO
import sys
import json
OFFICEPY_HOST = "service-preview-p1-eastus2.officepy.microsoftusercontent.com"
USER_AGENT = "Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.16827; Pro)"
GREEN = '\033[32m'
@nonsleepr
nonsleepr / flake.nix
Created September 22, 2024 13:31
LXD container for AdGuardHome capable running with cgroups v1
# Install with:
# incus image import --alias nixos/adguard-home \
# $(nix build .#nixosConfigurations.adguard-home.config.system.build.metadata --print-out-paths)/tarball/nixos-system-x86_64-linux.tar.xz \
# $(nix build .#nixosConfigurations.adguard-home.config.system.build.tarball --print-out-paths)/tarball/nixos-system-x86_64-linux.tar.xz
{
description = "AdGuardHome Container";
inputs = {
nixpkgs.url = "github:nixos/nixpkgs/nixos-23.11"; # The systemd supporting cgroups v1
nixpkgs-unstable.url = "github:nixos/nixpkgs/nixpkgs-unstable";
};
@nonsleepr
nonsleepr / docker-compose.yml
Last active September 24, 2024 22:41
Piped on Tailscale
services:
piped-frontend:
image: 1337kavin/piped-frontend:latest
restart: unless-stopped
depends_on:
- piped-backend
container_name: piped-frontend
entrypoint: ""
command:
- /bin/sh
{
"$schema": "https://raw.githubusercontent.com/jsonresume/resume-schema/v1.0.0/schema.json",
"basics": {
"name": "Alexander Bason",
"label": "Red Team Operator",
"image": "",
"email": "[email protected]",
"phone": "(530) 675-4199",
"url": "https://nonsleepr.github.io/",
"summary": "Highly skilled Red Team Operator and Security Researcher with demonstrated\nexpertise in advanced persistent threat emulation and critical\nvulnerability discovery, backed by close to 20 years of software\nengineering experience. Track record of discovering multiple high-impact\nCVEs and successfully compromising complex enterprise environments through\ncustom exploit development, Active Directory attacks, and cloud\ninfrastructure exploitation. Proven ability to develop offensive tooling,\nautomate attack frameworks, and deliver technical mentorship to engineering\nteams. Combines deep technical knowledge in both offensive security and\nsoftware development to identify and exploit vulnerabiliti
@nonsleepr
nonsleepr / mcp_searxng.py
Last active May 5, 2025 22:03
SearXNG MCP
# /// script
# requires-python = ">=3.13"
# dependencies = [
# "fastmcp",
# "httpx",
# "pydantic",
# ]
# ///
## Usage:
# SEARXNG_INSTANCE_URL=https://path.to.your.searxng uv run https://gist.github.com/nonsleepr/4e504cddca5e158c4682217346ad460f/raw/64674a60383087dc36ad19f658ccb8ff486727bd/mcp_searxng.py