I hereby claim:
- I am singe on github.
- I am singe (https://keybase.io/singe) on keybase.
- I have a public key whose fingerprint is A229 CE1E 1653 A30E 1B8F 4DDC 125C 4A18 B7D1 71CE
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
diff -r f60b128afd41 src/crypto/tls/common.go | |
--- a/src/crypto/tls/common.go Tue Nov 04 10:20:35 2014 -0800 | |
+++ b/src/crypto/tls/common.go Mon Dec 08 14:56:25 2014 -0800 | |
@@ -343,6 +343,8 @@ | |
// be used. | |
CurvePreferences []CurveID | |
+ BreakCBCPadding bool | |
+ | |
serverInitOnce sync.Once // guards calling (*Config).serverInit |
diff -ur hostapd-2.6/hostapd/config_file.c hostapd-2.6-mana/hostapd/config_file.c | |
--- hostapd-2.6/hostapd/config_file.c 2016-10-02 20:51:11.000000000 +0200 | |
+++ hostapd-2.6-mana/hostapd/config_file.c 2016-12-12 23:38:37.000000000 +0200 | |
@@ -21,6 +21,8 @@ | |
#include "ap/ap_config.h" | |
#include "config_file.h" | |
+#include <stdlib.h> | |
+ | |
import re | |
import clipboard | |
import console | |
import webbrowser | |
import urllib | |
import contacts | |
import datetime | |
import dialogs | |
def extract_num(input): |
brew install avrdude wget | |
pip install pyserial | |
git clone --recursive https://github.com/sensepost/USaBUSe | |
cd USaBUSe | |
wget --content-disposition "http://bbs.espressif.com/download/file.php?id=1046" | |
unzip ESP8266_NONOS_SDK_V1.5.1_16_01_08.zip | |
mkdir esp-vnc/firmware |
#!/bin/sh | |
# Super crude ping viz for debugging local network jitter | |
upstream=$1 #The gateway of your Internet provider | |
router=$2 #Your local gateway. This can be a MAC address, you'll need arping though | |
avg=2 #How many points to average for the smooted graph | |
limit=100 #The maximum number of points to show in the graph | |
graphsize="2100,600" # width x height this works nicely on my MBP | |
pingdelay=1 |
#!/usr/bin/env python3 | |
# by @singe | |
# | |
# Invoke it like you would tshark e.g. | |
#./wifi-hierarchy.py -r file.pcap | |
#./wifi-hierarchy.py -i en0 | |
# | |
# Dependencies, tshark in your path and python3 | |
from subprocess import getoutput |
#!/usr/bin/env python3 | |
from Cryptodome.Cipher import AES | |
from Cryptodome.Random import get_random_bytes | |
pairwiseTransientKey = b'pairwiseTransKey' | |
EAPOLheader = b'Unencrypted Frame Stuff' | |
plaintext1 = b'Attack at dawn' | |
nonce1 = get_random_bytes(11) |
#!/usr/bin/env python3 | |
# A simple demo of Python requests to reverse proxy | |
# It's an intermediate between vanilla requests and Selenium | |
# It let's you interact programatically, but still run JS in | |
# the browser, without Selenium overhead | |
# | |
# This is an example of automating aspects of Facebook | |
# | |
# by @singe |
git clone https://github.com/linuxkit/linuxkit | |
cd linuxkit | |
currdir=$(pwd) | |
make | |
export PATH=$PATH:$currdir/bin | |
foo=$(grep isoEfi\ $currdir/src/cmd/linuxkit/vendor/github.com/moby/tool/src/moby/output.go|cut -d\" -f2) | |
docker pull $foo | |
cd examples | |
linuxkit build --format iso-efi docker-for-mac.yml | |
mv /Applications/Docker.app/Contents/Resources/linuxkit/docker-for-mac.iso /Applications/Docker.app/Contents/Resources/linuxkit/docker-for-mac.iso.orig |