Skip to content

Instantly share code, notes, and snippets.

View GlennPegden2's full-sized avatar

Glenn Pegden GlennPegden2

View GitHub Profile
@GlennPegden2
GlennPegden2 / ghc.py
Created February 18, 2018 19:32
My handler code that sits between fauxmo and LGTV / XBox One / SkyQ to enabled Alexa to control the devices.
#!/usr/bin/python
# -*- coding: utf-8 -*-
#Must be python2 as lgtv currently doesn't work with python3
#Uses the following (make sure they are installed and set up
#Sky-Q - https://github.com/dalhundal/sky-remote-cli (NodeJS) - I also ported his node sample for the getPower code
#LGTV - https://github.com/klattimer/LGWebOSRemote (Python)
#
#Credit to Schamper for the code the xbox remote-wake code is based on - https://github.com/Schamper/xbox-remote-power
@GlennPegden2
GlennPegden2 / ect.php
Last active June 24, 2019 19:52
ECT WP HACK
<?php
/*
* Plugin Name: ECommerceTemplates in WordPress
* Plugin URI: http://to_be_confirmed/
* Description: Allows ECommerceTemplates to run inside WordPress
* Author: Glenn Pegden
* Version: 0.1
* Author URI: http://glenn.pegden.com
* Licensse: To be confirmed (assume commercial for now)
* (c) Glenn Pegden (glenn@pegden.com) Oct 2010
@GlennPegden2
GlennPegden2 / BufferOverflowRig.py
Created March 15, 2020 13:31
Test rig to help find traditional buffer overflows (reminds me of steps and acts as a skeleton for functions needed)
#!/usr/bin/python
import time, struct, sys
import socket as so
def sendPayload(cmd):
# print("Sent: %s\nSize %i\nRSize %i " % (cmd , len(cmd) , len(cmd) -(len(preCMD) +len(postCMD))))
try:
s.send(cmd)
print(repr(s.recv(1024)))
except:
@GlennPegden2
GlennPegden2 / bleledpos.py
Created November 14, 2020 17:25
Cheap BLE Lights demo (magic string and UUID based on sniff via Bluefruit using Wireshark
import asyncio
import time
import copy
import random
from bleak import discover, BleakClient
async def _discoverDevices():
devices = await discover()
return devices
@GlennPegden2
GlennPegden2 / ht.access
Created September 6, 2022 08:00
Copy of Delivery Scammers .htacess - from hxxps://evri-reschedule-unpaid.com/files/ht.access
RewriteEngine On
RewriteCond %{HTTPS} !=on
RewriteRule ^(.*)$ https://%{HTTP_HOST}%{REQUEST_URI} [L,R=301,NE]
RewriteCond %{HTTP_USER_AGENT} ^\W [OR]
RewriteCond %{HTTP_USER_AGENT} \b173\.212soso\b [NC,OR]
RewriteCond %{HTTP_USER_AGENT} \b192\.comagent\b [NC,OR]
RewriteCond %{HTTP_USER_AGENT} \b1noonbot\b [NC,OR]
RewriteCond %{HTTP_USER_AGENT} \b1on1searchbot\b [NC,OR]
RewriteCond %{HTTP_USER_AGENT} \b360Spider\b [NC,OR]
RewriteCond %{HTTP_USER_AGENT} \b3de\_search2\b [NC,OR]
Filetype: IR signals file
Version: 1
#
# Noisy Cricket. Turn your flipper into a tiny, high-powered, wide angle Nerf Laser OPs gun (yes, this is cheating)
#
# Based of the Ardruino based work of @TomSingh_
#
name: Purple
type: raw