Skip to content

Instantly share code, notes, and snippets.

Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
#!/usr/bin/env python3
# -*- coding: utf-8 -*-
import requests
from lxml import html
def load_doc():
doc= requests.get('http://www.spiegel.de/kultur/literatur/spiegel-bestseller-taschenbuecher-a-1025518.html')
@p3t3r67x0
p3t3r67x0 / sshd_deattack_exploit.md
Created March 2, 2019 02:07
SSHD deattack exploit. By Dvorak with Code from teso (http://www.team-teso.net)

SSHD deattack exploit

First you need to download it from here. Then you must extract it.

tar zxvf 349.tgz
cd ssh
@p3t3r67x0
p3t3r67x0 / README.md
Last active March 20, 2019 18:02
Simple programm to encrypt or decrypt a vigenere cipher text. See README.md how to run this programm.

vigenere.py

usage: vigenere.py [-h] [-d, --decrypt] [-e, --encrypt] -k, --key KEY
                   [-i, --in [INPUT]] [-o, --out [OUTPUT]]

Encrypt or decrypt a vigenere cipher text

optional arguments:

LibreELEC

Set wifi password by ssh connection

connmanctl
agent on
scan wifi
services
connect wifi_blah <= tab autocomplete works here
@p3t3r67x0
p3t3r67x0 / ssh_banner.md
Created December 10, 2019 01:58
This is a list I extracted from https://purplepee.co/dns