Product: Sagitta Brutalis Titan X (PN S3480-GTX-TITANX)
Software: cudaHashcat 1.36, ForceWare 346.59
Accelerator: 8x Nvidia GTX Titan X reference design
const makeBot = require('node-telegram-bot-api'); | |
const mailListener = require("mail-listener2"); | |
const config = { | |
// First get your telegram bot | |
telegramToken: 'Obtain your token talking to BotFather on telegram', | |
// Send a message to the bot and paste here your chat id (the response) | |
// TODO: login to avoid this step and allow multiple users | |
chatID = 'Chat ID', | |
// Gmail or Gsuite settings |
#!/bin/bash | |
# Remove merged git branches locally and on remote(s) | |
set -e | |
# Script constants | |
BRANCH_WHITELIST="(\*|master|other-special-branches)" | |
REMOTES="origin" # Add more remotes here as space-separated list | |
echo "Deleting merged branches locally" |
#!/bin/sh | |
# /etc/NetworkManager/dispatcher.d/pre-up.d/randomize-mac-addresses.sh | |
# INSTALL | |
# | |
# > curl -L 'https://gist.github.com/paulfurley/46e0547ce5c5ea7eabeaef50dbacef3f/raw/56ee5dd5f40dec93b8f7438cbdeda5475ea3b5d2/randomize-mac-addresses.sh' |sudo tee /etc/NetworkManager/dispatcher.d/pre-up.d/randomize-mac-addresses.sh | |
# > sudo chmod +x /etc/NetworkManager/dispatcher.d/pre-up.d/randomize-mac-addresses.sh | |
# Configure every saved WiFi connection in NetworkManager with a spoofed MAC |
Run the following: | |
iptables -A INPUT -m pkttype --pkt-type multicast -j ACCEPT | |
iptables -A FORWARD -m pkttype --pkt-type multicast -j ACCEPT | |
iptables -A OUTPUT -m pkttype --pkt-type multicast -j ACCEPT | |
Or: | |
iptables -A INPUT -s 224.0.0.0/4 -j ACCEPT | |
iptables -A FORWARD -s 224.0.0.0/4 -d 224.0.0.0/4 -j ACCEPT |
Product: Sagitta Brutalis Titan X (PN S3480-GTX-TITANX)
Software: cudaHashcat 1.36, ForceWare 346.59
Accelerator: 8x Nvidia GTX Titan X reference design
#!/usr/bin/env python2 | |
# Usage: $0 proxy.pac url | |
import pacparser | |
import sys | |
import urlparse | |
pacfile, url = sys.argv[1:] |
In August 2007 a hacker found a way to expose the PHP source code on facebook.com. He retrieved two files and then emailed them to me, and I wrote about the issue:
http://techcrunch.com/2007/08/11/facebook-source-code-leaked/
It became a big deal:
http://www.techmeme.com/070812/p1#a070812p1
The two files are index.php (the homepage) and search.php (the search page)
#!/bin/sh | |
# | |
# ******************************************* | |
# WARNING: this does *not* handle 3-way merges properly. | |
# Anything modified on the local branch since the common base will get ignored. | |
# | |
# FOR ANYONE LANDING HERE: | |
# This script is now updated as part of the git-whistles gem. | |
# https://github.com/mezis/git-whistles | |
# ******************************************* |
import sys | |
from gi.repository import Gtk, Gdk, WebKit | |
class BrowserTab(Gtk.VBox): | |
def __init__(self, *args, **kwargs): | |
super(BrowserTab, self).__init__(*args, **kwargs) | |
go_button = Gtk.Button("go to...") | |
go_button.connect("clicked", self._load_url) | |
self.url_bar = Gtk.Entry() |
<?php | |
// http://www.elasticsearch.com/docs/elasticsearch/rest_api/ | |
class ElasticSearch { | |
public $index; | |
function __construct($server = 'http://localhost:9200'){ | |
$this->server = $server; | |
} |