Skip to content

Instantly share code, notes, and snippets.

Atavic

Block or report user

Report or block Atavic

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
@4x3LDev
4x3LDev / RegexpMeta
Last active Jun 22, 2017
RegExp Metacharacters.
View RegexpMeta
+-----------------+----------------------------------------------------------------------------------------------------------+
| Metacharacter | Description |
+-----------------+----------------------------------------------------------------------------------------------------------+
| \ | Specifies the next character as either a special character, literal, back reference, or an octal escape. |
| ^ | Matches the position at the beginning of the input string. |
| $ | Matches the position at the end of the input string. |
| * | Matches the preceding subexpression zero or more times. |
| + | Matches the preceding subexpression one or more times. |
|
View gist:6507065
Thursday, September 5, 2013
On the NSA
Let me tell you the story of my tiny brush with the biggest crypto story of the year.
A few weeks ago I received a call from a reporter at ProPublica, asking me background questions about encryption. Right off the bat I knew this was going to be an odd conversation, since this gentleman seemed convinced that the NSA had vast capabilities to defeat encryption. And not in a 'hey, d'ya think the NSA has vast capabilities to defeat encryption?' kind of way. No, he'd already established the defeating. We were just haggling over the details.
Oddness aside it was a fun (if brief) set of conversations, mostly involving hypotheticals. If the NSA could do this, how might they do it? What would the impact be? I admit that at this point one of my biggest concerns was to avoid coming off like a crank. After all, if I got quoted sounding too much like an NSA conspiracy nut, my colleagues would laugh at me. Then I might not get invited to the cool security parties.
All of this is a
View gist:6627769
From: MIT Free Group <free@mit.edu>
Date: Wed, Sep 18, 2013 at 9:07 PM
Subject: The NSA is coming to MIT!
To: MIT Free Group <free@mit.edu>
Do you think the NSA is doing a good job of spying on Americans? Come
make your voice heard! Come to 66-144 tomorrow (Thursday, 9/19) 5:30
and participate by asking pointed questions like:
@h4rm0n1c
h4rm0n1c / wheezy_bridge_ipblock.md
Last active Oct 15, 2016
This is a script for setting up a small, debian based device that applies IP Blocklists to your internet connection.
View wheezy_bridge_ipblock.md

This is a script for setting up a small, debian based device that applies IP Blocklists to your internet connection.

This device is intended to operate transparently and quietly, entirely on your local network. it is NOT designed to be exposed to the internet. it works best plugged straight into your FIREWALLED, NATTED modem.

Plug eth0 into your router/modem/cablebox/pidgeon, eth1-3 can go to your clients. This device should require little to no config once set up. P2P style blocklists that are gzipped are downloaded, merged with any cached or local blocklists, and then swapped out with the existing lists once a day. I used Debian Wheezy (7.1) for this, it works EXTREMELY WELL.

@plentz
plentz / nginx.conf
Last active Jan 25, 2020
Best nginx configuration for improved security(and performance). Complete blog post here http://tautt.com/best-nginx-configuration-for-security/
View nginx.conf
# to generate your dhparam.pem file, run in the terminal
openssl dhparam -out /etc/nginx/ssl/dhparam.pem 2048
@teffalump
teffalump / README.md
Last active Jan 16, 2020
OpenWRT adblock implementation
View README.md

Others have recently developed packages for this same functionality, and done it better than anything I could do. Use the packages instead of this script:

Description

In its basic usage, this script will modify the router such that blocked addresses are null routed and unreachable. Since the address blocklist is full of advertising, malware, and tracking servers, this setup is generally a good thing. In addition, the router will update the blocklist weekly. However, the blocking is leaky, so do not expect everything to be blocked.

@grugq
grugq / gist:7713916
Created Nov 30, 2013
The text from: http://dee.su/uploads/baal.html On Underground Communications
View gist:7713916
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Undercover communication
It should be obvious by now, that the only way to communicate
stealthily and securely is to avoid raising suspicion to the
level at which the authorities might consider it worthwhile
to put you under active surveillance (e.g., park a van with
TEMPEST equipment by your apartment).
View collect-headers.js
var app = require('express')(),
fs = require('fs');
var headers = [];
app.get('/', function (req, res) {
headers.push(req.headers);
res.json(req.headers);
});
setInterval(function () {
fs.writeFileSync('headers.json', JSON.stringify(headers));
}, 10000);
@mattiaslundberg
mattiaslundberg / arch-linux-install
Last active Jan 25, 2020
Minimal instructions for installing arch linux on an UEFI system with full system encryption using dm-crypt and luks
View arch-linux-install
# Install ARCH Linux with encrypted file-system and UEFI
# The official installation guide (https://wiki.archlinux.org/index.php/Installation_Guide) contains a more verbose description.
# Download the archiso image from https://www.archlinux.org/
# Copy to a usb-drive
dd if=archlinux.img of=/dev/sdX bs=16M && sync # on linux
# Boot from the usb. If the usb fails to boot, make sure that secure boot is disabled in the BIOS configuration.
# Set swedish keymap
@cetanu
cetanu / dnsBlacklists.txt
Last active May 30, 2018
DNS Blacklists
View dnsBlacklists.txt
b.barracudacentral.org
bl.deadbeef.com
bl.emailbasura.org
bl.spamcannibal.org
bl.spamcop.net
blackholes.five-ten-sg.com
blacklist.woody.ch
bogons.cymru.com
cbl.abuseat.org
cdl.anti-spam.org.cn
You can’t perform that action at this time.