I hereby claim:
- I am elementalvoid on github.
- I am elementalvoid (https://keybase.io/elementalvoid) on keybase.
- I have a public key ASAC5MizJD7H1vf37_WZkXoe2wiloQqQvqy_0flxnGjmdwo To claim this, I am signing this object:
{
"body": {
"key": {
#!/bin/bash | |
wget -O assistme.dat http://control.d-imaging.sony.co.jp/GPS/assistme.dat | |
wget -O assistme.md5 http://control.d-imaging.sony.co.jp/GPS/assistme.md5 | |
checksum=$(md5sum assistme.dat | awk '{print $1}') | |
sony_checksum=$(cat assistme.md5 | awk '{print $1}') | |
if [[ ${checksum} == ${sony_checksum} ]]; then | |
echo "Okay: Checksums match." | |
echo "Place files in: <sdcard>/PRIVATE/SONY/GPS/ | |
else | |
echo "Warning: Checksums do not match!" |
# Uses the range check to avoid sending your actual password and then checks the returned list locally. | |
p0wned () { | |
read -s 'pass?Enter password: ' | |
echo | |
sum=$(echo -n "$pass" | sha1sum | cut -c1-40) | |
short=$(echo -n $sum | cut -c1-5) | |
remain=$(echo -n $sum | cut -c6-40) | |
curl -s https://api.pwnedpasswords.com/range/${short} | grep -i ${remain} | |
} |
#!/usr/bin/env python | |
import argparse | |
import re | |
from os import walk | |
from os.path import join | |
def get_patterns(patterns_dir): | |
patterns = {} |
#!/bin/bash | |
if [[ $# -lt 1 ]]; then | |
echo "usage: $(basename ${0}) <gateway>" | |
exit 1 | |
fi | |
gateway=${1} | |
shift |
#!/bin/bash | |
set -o nounset | |
########################################## | |
# Defaults | |
########################################## | |
: ${recipient:=} | |
: ${host:=localhost} | |
: ${port:=5432} | |
: ${databases:=} |
#!/usr/bin/env python | |
import sys | |
import time | |
import signal | |
from optparse import OptionParser | |
from multiprocessing import Pool | |
from subprocess import Popen, PIPE | |
class TimeoutException(Exception): | |
pass |
import javax.net.ssl.SSLSocket; | |
import javax.net.ssl.SSLSocketFactory; | |
import java.io.*; | |
/** Establish a SSL connection to a host and port, writes a byte and | |
* prints the response. See | |
* http://confluence.atlassian.com/display/JIRA/Connecting+to+SSL+services | |
*/ | |
public class SSLPoke { | |
public static void main(String[] args) { |
1 11 11 111 | |
00000000100001 100000 1000001 0001 0 | |
1 0011 00 11101 0011100 0011100 11 0 0 | |
0 10 01 0 101 0 101 101 0 | |
01 00 101 01 101 01 101 01 0 | |
01 00 101 01 101 01 101 101 10 | |
01 00 101 01 101 01 10 101 00 | |
101 00 101 01 101 01 101 101 100 | |
01 00 101 01 101 01 101 101 1101 | |
101 00 101 01 101 01 10 1011001 01 |
#!/bin/bash | |
if (( $# != 3 )); then | |
echo "Usage: $(basename $0) <username> <db-host> <db-name>" | |
exit 1 | |
fi | |
PSQL_USER=${1} | |
PSQL_HOST=${2} | |
PSQL_DB=${3} |
I hereby claim:
{
"body": {
"key": {