Skip to content

Instantly share code, notes, and snippets.

@4x3LDev
4x3LDev / RegexpMeta
Last active June 22, 2017 21:35
RegExp Metacharacters.
+-----------------+----------------------------------------------------------------------------------------------------------+
| Metacharacter | Description |
+-----------------+----------------------------------------------------------------------------------------------------------+
| \ | Specifies the next character as either a special character, literal, back reference, or an octal escape. |
| ^ | Matches the position at the beginning of the input string. |
| $ | Matches the position at the end of the input string. |
| * | Matches the preceding subexpression zero or more times. |
| + | Matches the preceding subexpression one or more times. |
|
Thursday, September 5, 2013
On the NSA
Let me tell you the story of my tiny brush with the biggest crypto story of the year.
A few weeks ago I received a call from a reporter at ProPublica, asking me background questions about encryption. Right off the bat I knew this was going to be an odd conversation, since this gentleman seemed convinced that the NSA had vast capabilities to defeat encryption. And not in a 'hey, d'ya think the NSA has vast capabilities to defeat encryption?' kind of way. No, he'd already established the defeating. We were just haggling over the details.
Oddness aside it was a fun (if brief) set of conversations, mostly involving hypotheticals. If the NSA could do this, how might they do it? What would the impact be? I admit that at this point one of my biggest concerns was to avoid coming off like a crank. After all, if I got quoted sounding too much like an NSA conspiracy nut, my colleagues would laugh at me. Then I might not get invited to the cool security parties.
All of this is a
From: MIT Free Group <free@mit.edu>
Date: Wed, Sep 18, 2013 at 9:07 PM
Subject: The NSA is coming to MIT!
To: MIT Free Group <free@mit.edu>
Do you think the NSA is doing a good job of spying on Americans? Come
make your voice heard! Come to 66-144 tomorrow (Thursday, 9/19) 5:30
and participate by asking pointed questions like:
@h4rm0n1c
h4rm0n1c / wheezy_bridge_ipblock.md
Last active October 15, 2016 17:43
This is a script for setting up a small, debian based device that applies IP Blocklists to your internet connection.

This is a script for setting up a small, debian based device that applies IP Blocklists to your internet connection.

This device is intended to operate transparently and quietly, entirely on your local network. it is NOT designed to be exposed to the internet. it works best plugged straight into your FIREWALLED, NATTED modem.

Plug eth0 into your router/modem/cablebox/pidgeon, eth1-3 can go to your clients. This device should require little to no config once set up. P2P style blocklists that are gzipped are downloaded, merged with any cached or local blocklists, and then swapped out with the existing lists once a day. I used Debian Wheezy (7.1) for this, it works EXTREMELY WELL.

@plentz
plentz / nginx.conf
Last active April 24, 2024 11:15
Best nginx configuration for improved security(and performance)
# to generate your dhparam.pem file, run in the terminal
openssl dhparam -out /etc/nginx/ssl/dhparam.pem 2048
@teffalump
teffalump / README.md
Last active January 4, 2023 21:17
OpenWRT adblock implementation

Others have recently developed packages for this same functionality, and done it better than anything I could do. Use the packages instead of this script:

Description

In its basic usage, this script will modify the router such that blocked addresses are null routed and unreachable. Since the address blocklist is full of advertising, malware, and tracking servers, this setup is generally a good thing. In addition, the router will update the blocklist weekly. However, the blocking is leaky, so do not expect everything to be blocked.

@grugq
grugq / gist:7713916
Created November 30, 2013 00:43
The text from: http://dee.su/uploads/baal.html On Underground Communications
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Undercover communication
It should be obvious by now, that the only way to communicate
stealthily and securely is to avoid raising suspicion to the
level at which the authorities might consider it worthwhile
to put you under active surveillance (e.g., park a van with
TEMPEST equipment by your apartment).
@keithamus
keithamus / collect-headers.js
Created December 5, 2013 20:51
A little server that I used to collect headers for https://keithamus.ghost.io/an-analysis-of-http-headers
var app = require('express')(),
fs = require('fs');
var headers = [];
app.get('/', function (req, res) {
headers.push(req.headers);
res.json(req.headers);
});
setInterval(function () {
fs.writeFileSync('headers.json', JSON.stringify(headers));
}, 10000);
@mattiaslundberg
mattiaslundberg / arch-linux-install
Last active March 29, 2024 08:38
Minimal instructions for installing arch linux on an UEFI system with full system encryption using dm-crypt and luks
# Install ARCH Linux with encrypted file-system and UEFI
# The official installation guide (https://wiki.archlinux.org/index.php/Installation_Guide) contains a more verbose description.
# Download the archiso image from https://www.archlinux.org/
# Copy to a usb-drive
dd if=archlinux.img of=/dev/sdX bs=16M && sync # on linux
# Boot from the usb. If the usb fails to boot, make sure that secure boot is disabled in the BIOS configuration.
# Set swedish keymap
@cetanu
cetanu / dnsBlacklists.txt
Last active May 30, 2018 01:07
DNS Blacklists
b.barracudacentral.org
bl.deadbeef.com
bl.emailbasura.org
bl.spamcannibal.org
bl.spamcop.net
blackholes.five-ten-sg.com
blacklist.woody.ch
bogons.cymru.com
cbl.abuseat.org
cdl.anti-spam.org.cn