Skip to content

Instantly share code, notes, and snippets.

View JuryA's full-sized avatar

Jiří Altman JuryA

View GitHub Profile
@JuryA
JuryA / lscript-auto-install.sh
Created July 25, 2018 10:20
Kali Lazy Script auto installer
#/bin/bash
cd ~
git clone https://github.com/arismelachroinos/lscript.git
cd lscript
chmod +x install.sh
./install.sh
@JuryA
JuryA / Cisco_Anyconnect.ps1
Created December 4, 2018 20:50 — forked from jhorsman/Cisco_Anyconnect.ps1
PowerShell to automate VPN connection with Cisco AnyConnect Secure Mobility Client
#Source www.cze.cz
#This script is tested with "Cisco AnyConnect Secure Mobility Client version 3.1.00495"
# Usage: & '.\Cisco_Anyconnect.ps1' [-Server <server name or ip>] [-Group <group>] [-User <user>] [-Password <password>]
#Please change following variables
#IP address or host name of cisco vpn, Username, Group and Password as parameters
param (
[string]$Server = $( Read-Host "Input server, please" ),
@JuryA
JuryA / autoload.sh
Created January 17, 2023 10:03 — forked from sergioro9/autoload.sh
Bash autoload
# autoload bash scripts. Much faster than `source script.sh`
# usage: autoload script.sh
autoload() {
[ -f "$1" ] || { echo "Usage ${FUNCNAME[0]} <filename>"; return 1;}
filename="$1"
loadname="$(sed 's:\..*::' <<< $(basename $filename))"
if [ -z "$(eval echo \${${loadname}_loaded})" ]; then
functions=$(command grep -o "^[a-zA-Z0-9_:]* *()" $filename | sed 's/()//')
for f in $functions; do
eval "
@JuryA
JuryA / cfgutil
Created October 10, 2020 16:04 — forked from AloPress/cfgutil
Command-line iOS device management, cfgutil performs various management tasks on one or more attached iOS devices. It can be used manually and as part of automated workflows. Source: https://configautomation.com/cfgutil-man-page.html
CFGUTIL(1) BSD General Commands Manual CFGUTIL(1)
NAME
cfgutil -- Command-line iOS device management
SYNOPSIS
cfgutil [-C ] [-K ]
[-e | -f | --foreach]
[--format JSON | plist | text] [-v] command [ ...]
@JuryA
JuryA / NOTES.sh
Last active February 28, 2022 07:46
k8s cheatsheet
#!/usr/bin/env bash
# -*- coding: utf-8 -*-
# get k8s contexts
kubectl config get-contexts -o name --no-headers
# get k8s current context
kubectl config current-context
# generate self signed SSL cert - oneliner
@JuryA
JuryA / resume.json
Last active January 18, 2022 11:47
CV
{
"meta": {
"theme": "kendall"
},
"basics": {
"name": "Jiří Altman",
"label": "Senior System Engineer",
"picture": "",
"email": "altman.jiri@gmail.com",
@JuryA
JuryA / onehalf.asm
Created March 13, 2020 10:27 — forked from starenka/onehalf.asm
onehalf.3577
;Dear friends,
;some time has already passed since the great days of One Half epidemy.
;Nevertheless we still hope that a code of this popular virus inspires
;you also now. A lot of stuff has been written on the subject, so I tink,
;not many words are necessary about this little creature any more.
;And, so, here is the original source of One_Half.3577:
DOSSEG
.MODEL SMALL
.STACK 100h

Removing a Mac's Firmware Password By Reflashing EFI ROM

According to Apple, the only way to remove an unknown firmware password from a MacBook (2011 and later) is to take it to the Apple Store with the original proof-of-purchase. However, I've found that there is another way, which I've been successful with for the unibody MacBook Pro--it's essentially just modifying a couple bytes in the EFI ROM, which should be simple. What's not simple, however, is figuring out how to read and write to the EFI chip. In this post, I'll talk about the process that I figured out and what worked for me.

The Official Method

Apple's method of resetting the firmware password is not reproducible, as Apple generates an SCBO file that unlocks the EFI using their private key. You can read more about this process here. The problem with this system is that, if you are in the unfortunate situation of neither having the firmware unlock pass

@JuryA
JuryA / linkedin.clj
Created August 7, 2020 17:40 — forked from piotr-yuxuan/linkedin.clj
LinkedIn scraper to get contact infos for some compay current or former employees
(ns scraper.linkedin
"This is meant to be a very simple sktech on how to scrap some LinkedIn network with etaoin, enlive, and Google Chrome. This is by no mean the more efficient, or elegant way to do so."
(:require [scraper.utils :refer [email password some-company-id]]
[net.cgrand.enlive-html :as html]
[etaoin.api :refer :all]
[clojure.string :as str]))
(defonce driver (chrome))
(defn former-company-employees
@JuryA
JuryA / linkedin.clj
Created August 7, 2020 17:40 — forked from piotr-yuxuan/linkedin.clj
LinkedIn scraper to get contact infos for some compay current or former employees
(ns scraper.linkedin
"This is meant to be a very simple sktech on how to scrap some LinkedIn network with etaoin, enlive, and Google Chrome. This is by no mean the more efficient, or elegant way to do so."
(:require [scraper.utils :refer [email password some-company-id]]
[net.cgrand.enlive-html :as html]
[etaoin.api :refer :all]
[clojure.string :as str]))
(defonce driver (chrome))
(defn former-company-employees