I hereby claim:
- I am singe on github.
- I am singe (https://keybase.io/singe) on keybase.
- I have a public key whose fingerprint is A229 CE1E 1653 A30E 1B8F 4DDC 125C 4A18 B7D1 71CE
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
| diff -r f60b128afd41 src/crypto/tls/common.go | |
| --- a/src/crypto/tls/common.go Tue Nov 04 10:20:35 2014 -0800 | |
| +++ b/src/crypto/tls/common.go Mon Dec 08 14:56:25 2014 -0800 | |
| @@ -343,6 +343,8 @@ | |
| // be used. | |
| CurvePreferences []CurveID | |
| + BreakCBCPadding bool | |
| + | |
| serverInitOnce sync.Once // guards calling (*Config).serverInit |
| diff -ur hostapd-2.6/hostapd/config_file.c hostapd-2.6-mana/hostapd/config_file.c | |
| --- hostapd-2.6/hostapd/config_file.c 2016-10-02 20:51:11.000000000 +0200 | |
| +++ hostapd-2.6-mana/hostapd/config_file.c 2016-12-12 23:38:37.000000000 +0200 | |
| @@ -21,6 +21,8 @@ | |
| #include "ap/ap_config.h" | |
| #include "config_file.h" | |
| +#include <stdlib.h> | |
| + | |
| import re | |
| import clipboard | |
| import console | |
| import webbrowser | |
| import urllib | |
| import contacts | |
| import datetime | |
| import dialogs | |
| def extract_num(input): |
| brew install avrdude wget | |
| pip install pyserial | |
| git clone --recursive https://github.com/sensepost/USaBUSe | |
| cd USaBUSe | |
| wget --content-disposition "http://bbs.espressif.com/download/file.php?id=1046" | |
| unzip ESP8266_NONOS_SDK_V1.5.1_16_01_08.zip | |
| mkdir esp-vnc/firmware |
| #!/bin/sh | |
| # Super crude ping viz for debugging local network jitter | |
| upstream=$1 #The gateway of your Internet provider | |
| router=$2 #Your local gateway. This can be a MAC address, you'll need arping though | |
| avg=2 #How many points to average for the smooted graph | |
| limit=100 #The maximum number of points to show in the graph | |
| graphsize="2100,600" # width x height this works nicely on my MBP | |
| pingdelay=1 |
| #!/usr/bin/env python3 | |
| # by @singe | |
| # | |
| # Invoke it like you would tshark e.g. | |
| #./wifi-hierarchy.py -r file.pcap | |
| #./wifi-hierarchy.py -i en0 | |
| # | |
| # Dependencies, tshark in your path and python3 | |
| from subprocess import getoutput |
| #!/usr/bin/env python3 | |
| from Cryptodome.Cipher import AES | |
| from Cryptodome.Random import get_random_bytes | |
| pairwiseTransientKey = b'pairwiseTransKey' | |
| EAPOLheader = b'Unencrypted Frame Stuff' | |
| plaintext1 = b'Attack at dawn' | |
| nonce1 = get_random_bytes(11) |
| #!/usr/bin/env python3 | |
| # A simple demo of Python requests to reverse proxy | |
| # It's an intermediate between vanilla requests and Selenium | |
| # It let's you interact programatically, but still run JS in | |
| # the browser, without Selenium overhead | |
| # | |
| # This is an example of automating aspects of Facebook | |
| # | |
| # by @singe |
| git clone https://github.com/linuxkit/linuxkit | |
| cd linuxkit | |
| currdir=$(pwd) | |
| make | |
| export PATH=$PATH:$currdir/bin | |
| foo=$(grep isoEfi\ $currdir/src/cmd/linuxkit/vendor/github.com/moby/tool/src/moby/output.go|cut -d\" -f2) | |
| docker pull $foo | |
| cd examples | |
| linuxkit build --format iso-efi docker-for-mac.yml | |
| mv /Applications/Docker.app/Contents/Resources/linuxkit/docker-for-mac.iso /Applications/Docker.app/Contents/Resources/linuxkit/docker-for-mac.iso.orig |