Skip to content

Instantly share code, notes, and snippets.

View FANGOD's full-sized avatar
💭
I may be slow to respond.

FAN-GOD FANGOD

💭
I may be slow to respond.
View GitHub Profile
@FANGOD
FANGOD / ssh_jump.py
Created September 14, 2022 02:51 — forked from tintoy/ssh_jump.py
SSH via jump-hosts using Paramiko
#!/usr/bin/env python3
import os
import paramiko
ssh_key_filename = os.getenv('HOME') + '/.ssh/id_rsa'
jumpbox_public_addr = '168.128.52.199'
jumpbox_private_addr = '10.0.5.10'
target_addr = '10.0.5.20'
@FANGOD
FANGOD / cellrecognition.py
Created September 6, 2022 08:37 — forked from huks0/cellrecognition.py
A table detection, cell recognition and text extraction algorithm to convert tables in images to excel files, using pytesseract and open cv.
import cv2
import numpy as np
import pandas as pd
import matplotlib.pyplot as plt
import csv
try:
from PIL import Image
except ImportError:
import Image
@FANGOD
FANGOD / pdf_table_with Tesseract
Created September 6, 2022 04:11 — forked from Sigmame/pdf_table_with Tesseract
Extract Data from PDF table using Python Image. Image Magick and tesseract
#Refer http://craiget.com/extracting-table-data-from-pdfs-with-ocr/
import Image, ImageOps
import subprocess, sys, os, glob
# minimum run of adjacent pixels to call something a line
H_THRESH = 300
V_THRESH = 300
def get_hlines(pix, w, h):
"""Get start/end pixels of lines containing horizontal runs of at least THRESH black pix"""
@FANGOD
FANGOD / CVE-2021-44228_IPs.csv
Created March 18, 2022 04:48 — forked from gnremy/CVE-2021-44228_IPs.csv
CVE-2021-44228 Apache Log4j RCE Attempts Dec 20th 9:27PM ET
ip tag_name
162.155.56.106 Apache Log4j RCE Attempt
223.111.180.119 Apache Log4j RCE Attempt
213.142.150.93 Apache Log4j RCE Attempt
211.154.194.21 Apache Log4j RCE Attempt
210.6.176.90 Apache Log4j RCE Attempt
199.244.51.112 Apache Log4j RCE Attempt
199.101.171.39 Apache Log4j RCE Attempt
197.246.175.186 Apache Log4j RCE Attempt
196.196.150.38 Apache Log4j RCE Attempt
@FANGOD
FANGOD / .wslconfig
Created November 19, 2021 02:22 — forked from offlinehacker/.wslconfig
WSL
[wsl2]
kernel=C:\\Users\\JAKA\\vmlinux
class PyTrieNode(object):
def __init__(self, key="", seq=[]):
self.key = key
self.end = len(seq) == 0
self.children = {}
if len(seq) > 0:
self.children[seq[0]] = PyTrieNode(seq[0], seq[1:])
def add(self, seq):
if len(seq) == 0: