This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python2.7 | |
# | |
# This File should be placed next to https://github.com/lukasjapan/bt-speaker | |
# It does not permanently block the alsa device and thus works with https://github.com/badaix/snapcast | |
# | |
# A GPIO of the Raspberry is used to determine if bluetooth or snapclient should run. | |
# | |
import RPi.GPIO as GPIO | |
from bt_speaker import AutoAcceptSingleAudioAgent, config | |
from bt_manager.media import BTMedia |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
/* | |
* Listener for 433MHz "HomeWizard" signals (on a Raspi). | |
* Created as https://github.com/1technophile/NewRemoteSwitch did not work for me. | |
* License: GPLv3. | |
* | |
* _ _ | |
* '0': | |_| |_____ (T,T,T,5T) | |
* _ _ | |
* '1': | |_____| |_ (T,5T,T,T) | |
* |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/python | |
# | |
# Share a Directory via FTP, HTTP and SMB | |
# | |
# uses pyftpdlib and impacket | |
# | |
# Usage: | |
# python FileServer.py -d <folder> <listen ip> | |
# | |
# Issues: |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/env python | |
############################################################################################################### | |
## [Details]: | |
## This script is intended to be executed locally on a Windows box to enumerate basic system info and | |
## search for common privilege escalation vectors as seen here: http://www.fuzzysecurity.com/tutorials/16.html | |
## All Credit to fuzzysecurity and the author of the awesome linuxprivchecker where I borrowed all the code :) | |
##------------------------------------------------------------------------------------------------------------- | |
## [Title]: winprivchecker.py -- a Windows Privilege Escalation Check Script | |
## [Org Title]: linuxprivchecker.py -- a Linux Privilege Escalation Check Script |