Skip to content

Instantly share code, notes, and snippets.

View Tugzrida's full-sized avatar

Cameron Steel Tugzrida

View GitHub Profile
@Tugzrida
Tugzrida / MicroPython_RTC_DST.py
Created November 23, 2019 00:15
Implementation of NTP and Australian DST in MicroPython
import time, socket
from struct import unpack
from machine import RTC
standardTimeOffset = 60 * 60 * 10 # The base TZ UTC offset in sec, AEST(UTC+10)
summerTimeDifference = 60 * 60 * 1 # The difference between the base TZ and DST TZ in sec, AEDT(UTC+11), 1 hour ahead
rtc = RTC()
lastSync = 0
@Tugzrida
Tugzrida / certspotter_acknowledge
Created November 18, 2019 01:39
Automatically acknowledge Certbot renewals on Cert Spotter
#!/usr/bin/env python
# v0.1 Created by Tugzrida(https://gist.github.com/Tugzrida)
# Dependencies: python, requests
# Add your Cert Spotter API key below, then save this script to
# /etc/letsencrypt/renewal-hooks/deploy/certspotter_acknowledge with execute permissions.
# Any certificates renewed by this instance of Certbot will then be automatically
# marked as acknowledged on Cert Spotter to reduce notifications for legitimate
@Tugzrida
Tugzrida / microview_boards.txt
Created September 22, 2019 10:53
boards.txt definition for SparkFun Microview in new Arduino IDE
uview.upload.tool=avrdude
uview.bootloader.tool=avrdude
uview.name=MicroView
uview.upload.protocol=arduino
uview.upload.maximum_size=32256
uview.upload.speed=115200
uview.bootloader.low_fuses=0xff
uview.bootloader.high_fuses=0xde
uview.bootloader.extended_fuses=0x05
uview.bootloader.file=optiboot/optiboot_atmega328.hex
@Tugzrida
Tugzrida / hashchecker
Last active December 11, 2020 06:44
Simple bash hash verification utility
#!/bin/bash
# hashchecker Created by Tugzrida(https://gist.github.com/Tugzrida)
# A simple utility that accepts a file path and expected md5, sha1 or
# sha256 hash, then verifies the file matches the expected hash.
# Hash length assumptions:
# md5 - 32 chars
# sha1 - 40 chars
# sha256 - 64 chars
@Tugzrida
Tugzrida / cloudflare_nginx_realip
Last active August 7, 2022 14:00
nginx realip updater for Cloudflare
#!/usr/bin/python3
# v0.5 Created by Tugzrida(https://gist.github.com/Tugzrida/5910e1b1a9d096e297e793890b7c5236)
# This script should be added to the root crontab (or whichever user controls nginx)
# to run perhaps once or twice a day. It will create and keep up to date
# the file /etc/nginx/conf.d/cloudflare_realip.conf which will make all of nginx
# trust and use Cloudflare's provided client IP's.
#
# After updating the file, it runs nginx -t to check the config for errors, and if
# any are found, nginx will not be restarted to avoid taking things down. You may wish
# to add your own error reporting to the handle_error function below.
@Tugzrida
Tugzrida / dns_cacher
Created January 13, 2019 00:11
Crude DNS cacher to reduce number of upstream lookups
#!/bin/bash
# Requires install of dnsutils package. Can be added to a crontab with root permissions
# for however often you want to refresh the cached IP.
host="pfclient-upload.planefinder.net"
ipaddr=$(dig +short "$host" | awk '{ print ; exit }')
grep -v "$host" /etc/hosts | tee /etc/hosts
echo "$ipaddr $host" | tee -a /etc/hosts
@Tugzrida
Tugzrida / fritzsid.py
Last active September 21, 2019 06:48
Python routine to get a session ID from a FRITZ!Box
#!/usr/bin/env python
# Simple python2/3 routine to get a SID from a FRITZ!Box as it took me forever to figure this out
# If you don't have https set up, set the urls to http and remove the two verify options
# If you do have https set up, point the two verify options to the CA cert
# (unless your FB cert is publicly signed, then remove the verify options)
from requests import get
@Tugzrida
Tugzrida / DNS leak test CLI.md
Last active February 12, 2023 18:13
Python CLI for dnsleaktest.com

DNS leak test CLI

A simple python-based CLI front end for dnsleaktest.com

Usage details available with -h

Should run on most platforms as all modules are included in the standard python install

How dnsleaktest.com works

When you visit dnsleaktest.com and run a test, your browser attempts to load resources from randomly generated subdomains of test.dnsleaktest.com.

Keybase proof

I hereby claim:

  • I am tugzrida on github.
  • I am tugzrida (https://keybase.io/tugzrida) on keybase.
  • I have a public key whose fingerprint is 4D61 B752 B355 94DC CB7E 61C3 CE91 5A0B C269 4D91

To claim this, I am signing this object: