I hereby claim:
- I am coffeemakr on github.
- I am muc (https://keybase.io/muc) on keybase.
- I have a public key ASByjxVF9x7iHU2w_waWrFfRijueynos0EYLjEURS-MXjQo
To claim this, I am signing this object:
| #!/bin/bash | |
| mitmfiles="$HOME/.mitmproxy/mitmproxy-ca.pem" | |
| for f in $mitmfiles; do | |
| name="$(openssl x509 -inform PEM -subject_hash_old -in $f | head -1).0" | |
| echo Filename: $f | |
| cp "$f" "$name" | |
| android_file="/system/etc/security/cacerts/$name" | |
| adb push "$name" "$android_file" | |
| adb shell "su -c chmod 644 $android_file" | |
| done |
I hereby claim:
To claim this, I am signing this object:
| #!/usr/bin/bash | |
| # Call ./google_play_check.sh packagelist | |
| filename="$1" | |
| while read -r line | |
| do | |
| name="$line" | |
| curl -X HEAD -s -q -I -f "https://play.google.com/store/apps/details?id=$line" >/dev/null && echo "$name" | |
| done < "$filename" |
| # Stop all container | |
| docker ps -a -q | xargs docker stop | |
| # Remove containers | |
| docker ps -a -q | xargs docker rm | |
| # Remove volumes (may delete required data) | |
| docker volume ls -q | xargs docker volume rm |
| from collections import OrderedDict | |
| from math import sqrt | |
| import re | |
| encrypted = "Something or some thing?" | |
| #encrypted = re.sub('[^A-Z0-9+/\']', '', encrypted) | |
| #print(encrypted) | |
| primes = len(encrypted) | |
| def find_repetitions(s, ignore_space=True): |
| #!/bin/bash | |
| env x='() { :;}; echo "ERROR: CVE-2014-6271 vulnerable, ShellShock"' bash -c "echo -n\"\"" | |
| foo='() { echo "ERROR: CVE-2014-6278 vulnerable"; }' bash -c foo 2> /dev/null | |
| rm -f bash_vulnerable | |
| X='() { function a a>\' bash -c bash_vulnerable | |
| [ -e bash_vulnerable ] && echo "ERROR: CVE-2014-7169 vulnerable" | |
| bash -c 'true <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF' || echo "ERROR: CVE-2014-7186 vulnerable, redir_stack" | |
| (for x in {1..200} ; do echo "for x$x in ; do :"; done; for x in {1..200} ; do echo done ; done) | bash || echo "ERROR: CVE-2014-7187 vulnerable, word_lineno" |
| #!/bin/sh | |
| meminfo=`free -m | grep 'Mem:'` | |
| used=`echo $meminfo | cut -d" " -f3` | |
| total=`echo $meminfo | cut -d" " -f2` | |
| cached=`echo $meminfo | cut -d" " -f7` | |
| really_used=`expr $used - $cached` | |
| percent=$(bc -l <<EOF |
| #include "version.h" | |
| #include <stdio.h> | |
| /** \file version.cpp Version functions */ | |
| void writeVersion(char* prog, FILE* stream) | |
| { | |
| fprintf(stream, "%s Version "VERSION"\n", prog); | |
| } | |
| #!/bin/env python | |
| import sys | |
| def pharmacode(v): | |
| r = '' | |
| while v: | |
| t = 1 - ( v % 2 ) | |
| r = str(t) + r | |
| v = (v - t) / 2 | |
| return r |
| #!/bin/sh | |
| TEMP_OUTPUT_FILENAME="vdistart" | |
| # command paths | |
| SFDISK=`which sfdisk` | |
| DD=`which dd` | |
| OD=`which od` | |
| AWK=`which awk` | |
| GREP=`which grep` |