Skip to content

Instantly share code, notes, and snippets.

View RecoFu's full-sized avatar

Reco RecoFu

View GitHub Profile
@dstreefkerk
dstreefkerk / Schedule-ChocoUpgradeAll.ps1
Last active March 8, 2022 20:52
PowerShell script to create a scheduled task that runs a choco upgrade all at machine startup
# See if choco.exe is available. If not, stop execution
$chocoCmd = Get-Command -Name 'choco' -ErrorAction SilentlyContinue -WarningAction SilentlyContinue | Select-Object -ExpandProperty Source
if ($chocoCmd -eq $null) { break }
# Settings for the scheduled task
$taskAction = New-ScheduledTaskAction –Execute $chocoCmd -Argument 'upgrade all -y'
$taskTrigger = New-ScheduledTaskTrigger -AtStartup
$taskUserPrincipal = New-ScheduledTaskPrincipal -UserId 'SYSTEM'
$taskSettings = New-ScheduledTaskSettingsSet -Compatibility Win8
@tylerni7
tylerni7 / rant
Created July 22, 2014 16:55
Rant on 0day sales
I don't think people understand what vulnerability sellers really do. They invest thousands of man and computer hours into finding bugs which people are willing to pay lots of money for. As a business, they want to keep their customer base happy, which means allowing their customers (yes, presumably the NSA/FBI/etc.) to use their exploits rather than selling them to Tails OS maintainers. Yes, it's probably the case that these exploits don't just go to nabbing child pornographers or drug traffickers, they also probably try to catch the next Snowden, which not everyone agrees is The Right Thing To Do. But for what it's worth, I'd still trust the US government (even with all its faults) far more than the Russians or Chinese.
But let's be honest here, Tails OS maintainers probably couldn't afford the same price that Exodus's customers will happily pay. Even if Exodus were happy to sell it to the Tails folks, that is certainly going to be a loss of money.
The arguments I'm used to hearing go something like "but
@scturtle
scturtle / feedly.py
Last active March 9, 2022 00:13
python scripts for feedly
import re
import json
import requests
URL_TO_SAVE = ('https://feedly.com/v3/streams/contents?'
'streamId=user%2F{}%2Ftag%2Fglobal.saved&count=100')
HEADERS = dict(l.strip().split(': ') for l in open('headers.txt').readlines()
if len(l.strip()))
USERID = re.search(r'"feedlyId":"([^"]+)"', HEADERS['Cookie']).group(1)