Skip to content

Instantly share code, notes, and snippets.

text_sensor:
- platform: version
id: esphome_device_version
internal: true
hide_timestamp: true
on_value:
- lambda: id(esphome_device_update_available).state = id(esphome_device_version).state != id(esphome_server_version).state;
- platform: homeassistant
entity_id: update.esphome_update
internal: true
hashcat (v6.2.3) starting in benchmark mode
Benchmarking uses hand-optimized kernel code by default.
You can use it in your cracking session by setting the -O option.
Note: Using optimized kernel code limits the maximum supported password length.
To disable the optimized kernel code in benchmark mode, use the -w option.
CUDA API (CUDA 11.5)
====================
* Device #1: Quadro P600, 1969/2000 MB, 3MCU
cd /D %~dp0
cd C:\KeePassUnlocker
ProtectedLauncher.exe
export SSH_AUTH_SOCK=$HOME/.ssh/agent.sock
ss -a | grep -q $SSH_AUTH_SOCK
if [ $? -ne 0 ]; then
rm -f $SSH_AUTH_SOCK
( setsid socat UNIX-LISTEN:$SSH_AUTH_SOCK,fork EXEC:"$HOME/.ssh/npiperelay.exe -ei -s //./pipe/openssh-ssh-agent",nofork & ) >/dev/null 2>&1
fi
supernet = {}
if SERVER then
AddCSLuaFile()
util.AddNetworkString("SuperNet_MSG")
end
local table = table
local net = net
local util = util
@Doridian
Doridian / ppp_connect.py
Last active January 6, 2021 05:21
ppp_connect.py
#!/usr/bin/python
import sys, tty, termios
#fh = open('/tmp/chatlog', 'a')
tty.setraw(sys.stdin.fileno())
str = ''
while True:
hashcat (v6.1.1) starting in benchmark mode...
Benchmarking uses hand-optimized kernel code by default.
You can use it in your cracking session by setting the -O option.
Note: Using optimized kernel code limits the maximum supported password length.
To disable the optimized kernel code in benchmark mode, use the -w option.
* Device #1: WARNING! Kernel exec timeout is not disabled.
This may cause "CL_OUT_OF_RESOURCES" or related errors.
To disable the timeout, see: https://hashcat.net/q/timeoutpatch
#!/bin/sh
set -eu
make_aten_header() {
printf 'ATEN\1\0'
}
run_aes() {
openssl aes-256-cbc "$1" -in "$2" -out "$3" -k CKSAM1SUCKSAM1SUASMUCIKSASMUCIKS -md md5
from scapy.all import *
import json
Ether.payload_guess = [({"type": 0x800}, IP)]
IP.payload_guess = [({"frag": 0, "proto": 0x06}, TCP)]
TCP.payload_guess = [({"dport": 6379}, Raw), ({"sport": 6379}, Raw)]
INSTANT_READY = True
def sniffOpen():
return PcapReader("big.pcap")
#include "z3++.h"
#include <random>
using namespace z3;
using namespace std;
int _main() {
context ctx;
expr c = ctx.bv_const("c", 32);
//expr m = ctx.int_const("m");