Skip to content

Instantly share code, notes, and snippets.

@JosephGregg
JosephGregg / tcp_http_spoof.py
Created February 9, 2017 17:36 — forked from inaz2/tcp_http_spoof.py
TCP injection attack (HTTP redirection) using Scapy
$ sudo python tcp_http_spoof.py >&/dev/null &
[1] 3477
$ curl -vL http://www.google.com/
* Hostname was NOT found in DNS cache
* Trying 172.217.26.100...
* Connected to www.google.com (172.217.26.100) port 80 (#0)
> GET / HTTP/1.1
> User-Agent: curl/7.35.0
> Host: www.google.com

Letsrobot.tv / Run My Robot Overlay Guide

  • Both of these methods expect a PNG image with transparency to be the same size as your video feed ( 640x480 by default ). It is possible to blend images at different resolutions with alternate commands but beyond the scope of this document.

Static video overlay

  • Requires no modification to FFMPEG
  • Add overlayCommand and change the videoCommandLine in send_video.py:

staticOverlayCommand = '-f image2 -i /home/pi/runmyrobot/images/hud.png -filter_complex "[0:v]format=argb,geq=r=\'r(X,Y)\':g=\'g(X,Y)\':b=\'b(X,Y)\':a=\'0.7*alpha(X,Y)\'[overlay]; [1:v][overlay]overlay"'

#!/usr/bin/env python
"""lexconvert v0.264 - convert phonemes between different speech synthesizers etc
(c) 2007-17 Silas S. Brown. License: GPL"""
# Run without arguments for usage information
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 3 of the License, or