Skip to content

Instantly share code, notes, and snippets.


Block or report user

Report or block Atavic

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
4x3LDev / RegexpMeta
Last active Jun 22, 2017
RegExp Metacharacters.
View RegexpMeta
| Metacharacter | Description |
| \ | Specifies the next character as either a special character, literal, back reference, or an octal escape. |
| ^ | Matches the position at the beginning of the input string. |
| $ | Matches the position at the end of the input string. |
| * | Matches the preceding subexpression zero or more times. |
| + | Matches the preceding subexpression one or more times. |
View gist:6507065
Thursday, September 5, 2013
On the NSA
Let me tell you the story of my tiny brush with the biggest crypto story of the year.
A few weeks ago I received a call from a reporter at ProPublica, asking me background questions about encryption. Right off the bat I knew this was going to be an odd conversation, since this gentleman seemed convinced that the NSA had vast capabilities to defeat encryption. And not in a 'hey, d'ya think the NSA has vast capabilities to defeat encryption?' kind of way. No, he'd already established the defeating. We were just haggling over the details.
Oddness aside it was a fun (if brief) set of conversations, mostly involving hypotheticals. If the NSA could do this, how might they do it? What would the impact be? I admit that at this point one of my biggest concerns was to avoid coming off like a crank. After all, if I got quoted sounding too much like an NSA conspiracy nut, my colleagues would laugh at me. Then I might not get invited to the cool security parties.
All of this is a
View gist:6627769
From: MIT Free Group <>
Date: Wed, Sep 18, 2013 at 9:07 PM
Subject: The NSA is coming to MIT!
To: MIT Free Group <>
Do you think the NSA is doing a good job of spying on Americans? Come
make your voice heard! Come to 66-144 tomorrow (Thursday, 9/19) 5:30
and participate by asking pointed questions like:
h4rm0n1c /
Last active Oct 15, 2016
This is a script for setting up a small, debian based device that applies IP Blocklists to your internet connection.

This is a script for setting up a small, debian based device that applies IP Blocklists to your internet connection.

This device is intended to operate transparently and quietly, entirely on your local network. it is NOT designed to be exposed to the internet. it works best plugged straight into your FIREWALLED, NATTED modem.

Plug eth0 into your router/modem/cablebox/pidgeon, eth1-3 can go to your clients. This device should require little to no config once set up. P2P style blocklists that are gzipped are downloaded, merged with any cached or local blocklists, and then swapped out with the existing lists once a day. I used Debian Wheezy (7.1) for this, it works EXTREMELY WELL.

plentz / nginx.conf
Last active Jan 25, 2020
Best nginx configuration for improved security(and performance). Complete blog post here
View nginx.conf
# to generate your dhparam.pem file, run in the terminal
openssl dhparam -out /etc/nginx/ssl/dhparam.pem 2048
teffalump /
Last active Jan 16, 2020
OpenWRT adblock implementation

Others have recently developed packages for this same functionality, and done it better than anything I could do. Use the packages instead of this script:


In its basic usage, this script will modify the router such that blocked addresses are null routed and unreachable. Since the address blocklist is full of advertising, malware, and tracking servers, this setup is generally a good thing. In addition, the router will update the blocklist weekly. However, the blocking is leaky, so do not expect everything to be blocked.

grugq / gist:7713916
Created Nov 30, 2013
The text from: On Underground Communications
View gist:7713916
Hash: SHA512
Undercover communication
It should be obvious by now, that the only way to communicate
stealthily and securely is to avoid raising suspicion to the
level at which the authorities might consider it worthwhile
to put you under active surveillance (e.g., park a van with
TEMPEST equipment by your apartment).
View collect-headers.js
var app = require('express')(),
fs = require('fs');
var headers = [];
app.get('/', function (req, res) {
setInterval(function () {
fs.writeFileSync('headers.json', JSON.stringify(headers));
}, 10000);
mattiaslundberg / arch-linux-install
Last active Jan 25, 2020
Minimal instructions for installing arch linux on an UEFI system with full system encryption using dm-crypt and luks
View arch-linux-install
# Install ARCH Linux with encrypted file-system and UEFI
# The official installation guide ( contains a more verbose description.
# Download the archiso image from
# Copy to a usb-drive
dd if=archlinux.img of=/dev/sdX bs=16M && sync # on linux
# Boot from the usb. If the usb fails to boot, make sure that secure boot is disabled in the BIOS configuration.
# Set swedish keymap
cetanu / dnsBlacklists.txt
Last active May 30, 2018
DNS Blacklists
View dnsBlacklists.txt
You can’t perform that action at this time.