Skip to content

Instantly share code, notes, and snippets.

# You will need root access for this commands
# These things shown here are not correct according to some RFCs (e.g. IPv6 NAT), but I will do them anyway, because I can not guarantee, that my pi will get a whole /64 subnet as it should from the upstream router
# I assume, that you did not change anything in iptables. If you did, you should be able to set the settings correctly for IPv6 on your own.
# USE CAUTION: I DID NOT SECURE ANYTHING IN THIS SETUP! I AM NOT RESPONSIBLE FOR ANY DAMAGES CREATED BY THIS SCRIPT! USE IT AT YOUR OWN RISK! I USED A SECOND SCRIPT FOR SECURING THE PI, WHICH IS NOT PROVIDED HERE!
# I will use fc72:4444:26dd:98c9::1 as address for the pi
# use your own settings:
export IPV6_SUBNET="fc72:4444:26dd:98c9::"
export IPV6_SIZE="/64"
@TheCataliasTNT2k
TheCataliasTNT2k / bresser_flashforge.py
Last active February 3, 2022 00:11
This script watches your "Bresser REX" or "Flashforge Adventurer 3" for loss of temperature. Happend to me a few times, printer does not recognise it on it's own. This script will pause the printer when this happens. The most part is copied from here: https://github.com/01F0/flashforge-finder-api Caution: Untested yet, because this happens rarely.
import datetime
import re
import socket
import time
from enum import Enum, auto
from os import system
PORT = 8899
HOST = ""
BUFFER_SIZE = 1024
@TheCataliasTNT2k
TheCataliasTNT2k / bresser_flashforge.py
Created February 2, 2022 17:51
This script watches you "Bresser REX" or "Flashforge Adventurer 3" for loss of temperature.Happend to me a few times,
import datetime
import re
import socket
import time
from enum import Enum, auto
from os import system
PORT = 8899
HOST = ""
BUFFER_SIZE = 1024
@TheCataliasTNT2k
TheCataliasTNT2k / corona-vaccination-reader.py
Created June 27, 2021 00:32
Corona vaccination reader (decodes vaccination qr code) all dependencies can be found on pypi
from datetime import datetime
from zlib import decompress
from base45 import b45decode
from cbor2 import loads
from prettytable import PrettyTable
data = loads(loads(decompress(b45decode(input("QR String eingeben: ").removeprefix("HC1:")))).value[2])
body = data[-260][1]