View 1_encrypt.py
import jose
from json import dumps
from Crypto.PublicKey import RSA
key = RSA.generate(2048)
private_key = key.exportKey('PEM').decode('utf-8')
public_key = key.publickey().exportKey('PEM').decode('utf-8')
from jwcrypto import jwk, jwe
from jwcrypto.common import json_encode
View Deflate (python).py
import base64
import zlib
compressed = base64.b64encode(zlib.compress(decompressed))
View wifibot.py
#!/usr/bin/python
# Wifibot: Read station dumps from a router and shows new/dropped wifi clients in a matrix channel
# by john & matthias
import re
import sys
import time
import subprocess
import requests # pip install requests
from threading import Thread
View gist:6b41291bb1eef8f9720fa5344c4d8600
# Route local connections to the remote target to localhost port 4440:
iptables -t nat -A OUTPUT -p tcp --dport 443 -d [REMOTE_HOST] -j DNAT --to-destination 127.0.0.1:4440
# Route local connections to port 4441 to the original target:
iptables -t nat -A OUTPUT -p tcp --dport 4441 -d 127.0.0.1 -j DNAT --to-destination [REMOTE_HOST]:443
# Use sslsplit to proxy connections inbetween and save plaintext contents:
sslsplit -D -l connections.log -S logs -k ca.key -c ca.crt https 127.0.0.1 4440 127.0.0.1 4441
View gist:674598e9ac66a1df6948d03488480b17
// immutable object assignment:
const initialState = { products: {} };
export default function reducer(state = initialState, action = {}) {
switch (action.type) {
case PUT_PRODUCT:
return { ...state, products: { ...state.products, [action.product.id]: action.product } };
default:
return state;
}
}
View bintest.js
'use strict';
const mongoose = require('mongoose');
const Schema = mongoose.Schema;
const ObjectId = Schema.Types.ObjectId;
const MongooseBuffer = mongoose.Types.Buffer;
const uuid = require('node-uuid');
const db = require('../lib/database');
View gist:3e2243d3b9d57079ac2b
foo = {
'nested': {
'dict': 42
}
}
query = 'nested.dict'
# reduce:
from functools import reduce
View keybase.md

Keybase proof

I hereby claim:

  • I am 4poc on github.
  • I am apoc (https://keybase.io/apoc) on keybase.
  • I have a public key whose fingerprint is 6FCC 1EF0 3B42 A155 CE89 4962 C6E6 8A99 721F BC1E

To claim this, I am signing this object:

View gist:9c67a8ff27b429559986
/**
* Simplex noise algorithm.
*
* This is a port of the public domain java implementation (see
* original header) and is public domain aswell.
* ported by Matthias Hecker <apoc.cc>.
* Links:
* http://webstaff.itn.liu.se/~stegu/simplexnoise/
* http://stackoverflow.com/a/18516731
*/
View gist:5d90091db803f52b618d
package main
import (
"bufio"
"crypto/tls"
"fmt"
"io"
"net"
"reflect"
"regexp"