Skip to content

Instantly share code, notes, and snippets.

View stefan2904's full-sized avatar
🚲
¯\_(ツ)_/¯

Stefan stefan2904

🚲
¯\_(ツ)_/¯
View GitHub Profile
#!/bin/bash
#updated ffmpeg progress indicator
#by Rupert Plumridge
#for updates visit www.prupert.co.uk
#Creative Commons Attribution-Non-Commercial-Share Alike 2.0 UK: England & Wales Licence
# Based on the ffmpegprogress bar from: http://handybashscripts.blogspot.com/2011/01/ffmpeg-with-progress-bar-re-work.html
# which was based on my initital progress script - circle of life and all that ;)
# version 2.0
# 07.04.2011
# now uses apparently better progress detection, based on duration of overall video and progress along the conversion

Simple Security Guidelines

Using an iDevice? (Best option)

  • Use an iPod or an iPad without a SIM card
  • Use an iPhone
  • Do not jailbreak
  • Always upgrade to new iOS versions
  • Use Brave browser

Need Secure chat?

anonymous
anonymous / blackbox
Created May 18, 2015 00:23
import socket
import random
host = "blackbox_ced7f267475a0299446fa86c26d77161.quals.shallweplayaga.me"
port = 18324
inputs = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789!\"#$%&'()*+,-./:;<=>?@[\]^_`{|}~ "
s = socket.socket()
s.connect((host, port))
anonymous
anonymous / blackbox
Created May 18, 2015 00:16
151 out = ""
152 shift = 0
153 for j in xrange(0,len(ans),4):
154 try:
155 i = j
156 out += inputs[(inputs.index(ans[i])-inputs.index(key[0])-shift)%len(inputs)]
157 shift += inputs.index(ans[i])+1
158 i = j+1
159 out += inputs[(inputs.index(ans[i])-inputs.index(key[0])-shift)%len(inputs)]
160 shift += inputs.index(ans[i])+1
clear all;
close all;
clc;
load data_logreg.mat;
isOctave = exist('OCTAVE_VERSION', 'builtin') ~= 0;
eta = 1;
options.degrees = [1 2 5 15];
@kennwhite
kennwhite / vpn_psk_bingo.md
Last active May 16, 2025 20:51
Most VPN Services are Terrible

Most VPN Services are Terrible

Short version: I strongly do not recommend using any of these providers. You are, of course, free to use whatever you like. My TL;DR advice: Roll your own and use Algo or Streisand. For messaging & voice, use Signal. For increased anonymity, use Tor for desktop (though recognize that doing so may actually put you at greater risk), and Onion Browser for mobile.

This mini-rant came on the heels of an interesting twitter discussion: https://twitter.com/kennwhite/status/591074055018582016

@twu
twu / Scratchpad
Created February 27, 2015 09:32
A more "sophisticated" approach to using the TUGBox.
#!/usr/bin/env python
import urllib2
import json
if __name__ == '__main__':
# Computer Science (557), BSc. (140), Current "Studienjahr" (1034)
# .json -> simple json
# .js -> jsonp
# webcal:// ... /exams.ical -> iCalendar
url = 'http://tugbox.herokuapp.com/tug/curriculum/557,140,1034/exams.ical'
@coruus
coruus / gnupg-defaults.patch
Created August 5, 2014 20:16
Update GnuPG defaults
I hope this patch is acceptable in something like its present form. If
so, I'll write up the documentation updates as well. (But I suspect it
may spark some discussion.)
It updates some rather outdated defaults hard-wired into GnuPG:
1. Default cipher algorithm: CAST5 -> AES256
2. Default digest algorithm: SHA1 -> SHA512
3. Default S2K hash algorithm: SHA1 -> SHA256
4. Default S2K iterations: 255 (this takes about 400ms in E2E, not
@ValdikSS
ValdikSS / gist:c13a82ca4a2d8b7e87ff
Last active December 3, 2024 23:25
TrueCrypt hack info
  • Developers have responded:

https://www.grc.com/misc/truecrypt/truecrypt.htm | https://twitter.com/stevebarnhart/status/472192457145597952

Steven Barnhart (@stevebarnhart) wrote to an eMail address he had used before and received several replies from “David.” The following snippets were taken from a twitter conversation which then took place between Steven Barnhart (@stevebarnhart) and Matthew Green (@matthew_d_green):

TrueCrypt Developer “David”: “We were happy with the audit, it didn't spark anything. We worked hard on this for 10 years, nothing lasts forever.”

Steven Barnhart: (Paraphrasing) Developer “personally” feels that fork is harmful: “The source is still available as a reference though.” >

@epixoip
epixoip / cloudflare_challenge
Last active December 2, 2023 11:53
How I obtained the private key for www.cloudflarechallenge.com
I wasn't first to get the key. Nor was I second, third, or even fourth. I'm probably not even the
10th to get it (ok, looks like I was the 8th.) But I'm happy that I was able to prove to myself
that I too could do it.
First, I have to admit I was a skeptic. Like the handful of other dissenters, I had initially
believed that it would be highly improbable under normal conditions to obtain the private key
through exploiting Heartbleed. So this was my motivation for participating in Cloudflare's
challenge. I had extracted a lot of other things with Heartbleed, but I hadn't actually set out to
extract private keys. So I wanted to see first-hand if it was possible or not.