homebrew (https://brew.sh/)
Standard option: iterm2
brew install iterm2
| #!/usr/bin/env python3 | |
| import http | |
| import http.server | |
| import socketserver | |
| import sys | |
| def _log(s): | |
| print(s) |
homebrew (https://brew.sh/)
Standard option: iterm2
brew install iterm2
| #! /usr/bin/env python3 | |
| """ | |
| Build to compare two outputs of this line on fairly identical executables | |
| nm --print-size --radix=d <executable> | grep ' .* .* ' | cut -d' ' -f 2-10 | |
| To just see the top symbols, can run e.g | |
| nm --print-size --size-sort --radix=d <executable> | |
| """ |
| #!/usr/bin/env python3 | |
| import argparse | |
| import os | |
| import subprocess | |
| import sys | |
| from dataclasses import dataclass | |
| @dataclass |
| #!/bin/bash | |
| usage_exit() { | |
| echo "$0 <target-url> <jrpc-method> [jrpc-params] [extra-curl-args]" | |
| exit 1 | |
| } | |
| target="$1" | |
| shift | |
| method="$1" | |
| shift | |
| if [[ -z $target ]] || [[ -z $method ]]; then |
| wt() { | |
| if [ "$#" -eq 0 ]; then | |
| local -a extra_fzf_args | |
| elif [ "$#" -eq 1 ]; then | |
| extra_fzf_args=( | |
| --query | |
| "'$1" | |
| ) | |
| else | |
| echo "Unknown arguments $@" |
| package main | |
| import ( | |
| "crypto/rand" | |
| "flag" | |
| "fmt" | |
| "math/big" | |
| ) | |
| func GenerateSecurePassword(n int, alphabet string) (string, error) { |
| #!/usr/bin/env python3 | |
| # Inspired by https://stackoverflow.com/a/19706670/37020 by @mfukar | |
| import http.server, ssl | |
| # Concatenated private key and certificate. | |
| # Sample openssl comand to generate a self-signed server.pem file: | |
| # openssl req -x509 -sha256 -newkey rsa:2048 -nodes -keyout server.pem -out server.pem -days 365 -subj '/CN=localhost' | |
| CERTFILE="server.pem" |
| # Iterated HMAC-SHA-256 password hashing homebrew | |
| # Important: avoid this. Use argon2 or scrypt instead (CPU+mem stretching) or PBKDF2 or bcrypt (just CPU) | |
| def iterated_hmacsha256(password, salt, extra_rounds): | |
| import hmac, hashlib | |
| current = salt | |
| for i in range(1 + extra_rounds): # extra rounds beyond the first | |
| current = hmac.new(key=password, msg=current, digestmod=hashlib.sha256).digest() | |
| return current | |
| # These vectors have been verified with multiple implementations |
| diff --git a/Python/random.c b/Python/random.c | |
| index 93d300d..396041d 100644 | |
| --- a/Python/random.c | |
| +++ b/Python/random.c | |
| @@ -3,6 +3,9 @@ | |
| #include <windows.h> | |
| #else | |
| #include <fcntl.h> | |
| +#if defined(HAVE_GETRANDOM) || defined(HAVE_GETENTROPY) | |
| +#include <sys/random.h> |