Skip to content

Instantly share code, notes, and snippets.

💭
what does this field do?

Evan Widloski Evidlo

💭
what does this field do?
Block or report user

Report or block Evidlo

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
@Evidlo
Evidlo / bullshit.js
Created Sep 3, 2019 — forked from raydog/bullshit.js
Bullshit as a Service
View bullshit.js
var E_PREFIX_RATE = 0.25;
// All of our word lists:
var _word_lists = {
verb : [
"implement", "utilize", "integrate", "streamline", "optimize", "evolve", "transform", "embrace",
"enable", "orchestrate", "leverage", "reinvent", "aggregate", "architect", "enhance", "incentivize",
"morph", "empower", "envisioneer", "monetize", "harness", "facilitate", "seize", "disintermediate",
View client.py
##################### client ###########################
# sends a single one-line command
import socket
import time
import sys
# Create a UDS socket
sock = socket.socket(socket.AF_UNIX, socket.SOCK_STREAM)
View rehackable-resnap.sh.md

Source

resnap takes a snapshot of the current display on the reMarkable. It copies '/dev/fb0' from the reMarkable to the host machine and uses ImageMagick to convert to an image.

Dependencies

View rehackable-Home.md

Welcome to the reHackable scripts wiki!

Overview

The reHackable scripts repository provides a set of bash scripts primarily aimed to increase productivity for Linux and OSX enthusiasts that own a reMarkable tablet.

The repository provides a broad range of scripts, ranging from simple patchers meant to fix obnoxious little flaws, all the way to push and pull scripts that can transfer documents from- and to the reMarkable from the bash command line.

Host scripts

Host scripts are meant to be executed on the host device and will frequently require a connection the device either locally via USB, or wirelessly via SSH.

View ipython proposal
``` python
print('hi')
```
View ldap_minimal.py
# Evan Widloski - 2018-11-05
import ldap # this is python-ldap
import sys
import ldif
from ldap import modlist as modlist
import pprint
# set debugging level
ldap.set_option(ldap.OPT_DEBUG_LEVEL, 1)
View finch.py
#!/usr/bin/env python
# Evan Widloski - 2018-11-02
# Auto answer any call and play a prerecorded message
from __future__ import print_function
from twisted.internet import protocol
from twisted.internet import reactor
import time
import re
@Evidlo
Evidlo / keepass3_decrypt.kdbx
Created May 13, 2018
KDBX V3 decryption example. AES only. No compression or entry protection.
View keepass3_decrypt.kdbx
#!/bin/env python3
# Evan Widloski - 2018-04-11
# keepass decrypt experimentation
# only works on AES encrypted database with unprotected entries
# Useful reference: https://gist.github.com/msmuenchen/9318327
# https://framagit.org/okhin/pygcrypt/#use
# https://github.com/libkeepass/libkeepass/tree/master/libkeepass
import struct
@Evidlo
Evidlo / .muttrc
Created Apr 18, 2018
Neomutt Monokai Theme
View .muttrc
# Evan Widloski - 2018-04-18
# Neomutt Monokai Theme
#---------- Colors ----------
set my_background = "color234"
set my_gray = "color245"
set my_magenta = "color198"
set my_brightmagenta = "brightcolor198"
set my_green = "color112"
set my_brightgreen = "brightcolor112"
View changes.diff
--- a/package/Config.in
+++ b/package/Config.in
@@ -756,6 +756,7 @@ menu "External python modules"
source "package/python-docutils/Config.in"
source "package/python-dominate/Config.in"
source "package/python-dpkt/Config.in"
source "package/python-ecdsa/Config.in"
source "package/python-engineio/Config.in"
source "package/python-enum/Config.in"
@@ -765,6 +766,7 @@ menu "External python modules"
You can’t perform that action at this time.