Product: Sagitta Brutalis Titan X (PN S3480-GTX-TITANX)
Software: cudaHashcat 1.36, ForceWare 346.59
Accelerator: 8x Nvidia GTX Titan X reference design
| const makeBot = require('node-telegram-bot-api'); | |
| const mailListener = require("mail-listener2"); | |
| const config = { | |
| // First get your telegram bot | |
| telegramToken: 'Obtain your token talking to BotFather on telegram', | |
| // Send a message to the bot and paste here your chat id (the response) | |
| // TODO: login to avoid this step and allow multiple users | |
| chatID = 'Chat ID', | |
| // Gmail or Gsuite settings |
| #!/bin/bash | |
| # Remove merged git branches locally and on remote(s) | |
| set -e | |
| # Script constants | |
| BRANCH_WHITELIST="(\*|master|other-special-branches)" | |
| REMOTES="origin" # Add more remotes here as space-separated list | |
| echo "Deleting merged branches locally" |
| #!/bin/sh | |
| # /etc/NetworkManager/dispatcher.d/pre-up.d/randomize-mac-addresses.sh | |
| # INSTALL | |
| # | |
| # > curl -L 'https://gist.github.com/paulfurley/46e0547ce5c5ea7eabeaef50dbacef3f/raw/56ee5dd5f40dec93b8f7438cbdeda5475ea3b5d2/randomize-mac-addresses.sh' |sudo tee /etc/NetworkManager/dispatcher.d/pre-up.d/randomize-mac-addresses.sh | |
| # > sudo chmod +x /etc/NetworkManager/dispatcher.d/pre-up.d/randomize-mac-addresses.sh | |
| # Configure every saved WiFi connection in NetworkManager with a spoofed MAC |
| Run the following: | |
| iptables -A INPUT -m pkttype --pkt-type multicast -j ACCEPT | |
| iptables -A FORWARD -m pkttype --pkt-type multicast -j ACCEPT | |
| iptables -A OUTPUT -m pkttype --pkt-type multicast -j ACCEPT | |
| Or: | |
| iptables -A INPUT -s 224.0.0.0/4 -j ACCEPT | |
| iptables -A FORWARD -s 224.0.0.0/4 -d 224.0.0.0/4 -j ACCEPT |
Product: Sagitta Brutalis Titan X (PN S3480-GTX-TITANX)
Software: cudaHashcat 1.36, ForceWare 346.59
Accelerator: 8x Nvidia GTX Titan X reference design
| #!/usr/bin/env python2 | |
| # Usage: $0 proxy.pac url | |
| import pacparser | |
| import sys | |
| import urlparse | |
| pacfile, url = sys.argv[1:] |
In August 2007 a hacker found a way to expose the PHP source code on facebook.com. He retrieved two files and then emailed them to me, and I wrote about the issue:
http://techcrunch.com/2007/08/11/facebook-source-code-leaked/
It became a big deal:
http://www.techmeme.com/070812/p1#a070812p1
The two files are index.php (the homepage) and search.php (the search page)
| #!/bin/sh | |
| # | |
| # ******************************************* | |
| # WARNING: this does *not* handle 3-way merges properly. | |
| # Anything modified on the local branch since the common base will get ignored. | |
| # | |
| # FOR ANYONE LANDING HERE: | |
| # This script is now updated as part of the git-whistles gem. | |
| # https://github.com/mezis/git-whistles | |
| # ******************************************* |
| import sys | |
| from gi.repository import Gtk, Gdk, WebKit | |
| class BrowserTab(Gtk.VBox): | |
| def __init__(self, *args, **kwargs): | |
| super(BrowserTab, self).__init__(*args, **kwargs) | |
| go_button = Gtk.Button("go to...") | |
| go_button.connect("clicked", self._load_url) | |
| self.url_bar = Gtk.Entry() |
| <?php | |
| // http://www.elasticsearch.com/docs/elasticsearch/rest_api/ | |
| class ElasticSearch { | |
| public $index; | |
| function __construct($server = 'http://localhost:9200'){ | |
| $this->server = $server; | |
| } |