To pass wireguard's traffic through a TCP tunnel by using udp2raw
For Arch linux, install udp2raw by pacman:
pacman -S udp2raw
For Debian or Ubuntu, you can use a binary release from: https://github.com/wangyu-/udp2raw/releases
To pass wireguard's traffic through a TCP tunnel by using udp2raw
For Arch linux, install udp2raw by pacman:
pacman -S udp2raw
For Debian or Ubuntu, you can use a binary release from: https://github.com/wangyu-/udp2raw/releases
| #!/usr/bin/env python | |
| # | |
| # A script to check Kimsufi server availability using OVH's API. | |
| # Typical usage: | |
| # python kimsufi.py --dump-txt --dump-json --loop --verbose 160sk1 | |
| # | |
| import sys | |
| import os.path | |
| import argparse |
| Function ConvertTo-EncryptedVNCPassword { | |
| [OutputType([byte[]])] | |
| [CmdletBinding()] | |
| param ( | |
| [Parameter(Mandatory)] | |
| [SecureString] | |
| $Password | |
| ) | |
| # This is hardcoded in VNC applications like TightVNC. |
| Install WireGuard via whatever package manager you use. For me, I use apt. | |
| $ sudo add-apt-repository ppa:wireguard/wireguard | |
| $ sudo apt-get update | |
| $ sudo apt-get install wireguard | |
| MacOS | |
| $ brew install wireguard-tools | |
| Generate key your key pairs. The key pairs are just that, key pairs. They can be |
| #!/bin/bash | |
| # ansi_colors.sh | |
| # | |
| # Wiki (ANSI CSI) https://en.wikipedia.org/wiki/ANSI_escape_code#CSI_(Control_Sequence_Introducer)_sequences | |
| # Wiki (ANSI SGR) https://en.wikipedia.org/wiki/ANSI_escape_code#SGR_(Select_Graphic_Rendition)_parameters | |
| # Parameter 030-03F (0x30–0x3F) (ASCII 0–9:;<=>?) | |
| # Intermediate 020-02F (0x20–0x2F) (ASCII space and !"#$%&'()*+,-./) | |
| # Final 040-07E (0x40–0x7E) (ASCII @A–Z[\]^_`a–z{|}~) | |
| # | |
| # _______________________________________________________________ |
| //http://www.scottklarr.com/topic/425/how-to-insert-text-into-a-textarea-where-the-cursor-is/ | |
| function insertAtCaret(areaId,text) { | |
| var txtarea = document.getElementById(areaId); | |
| var scrollPos = txtarea.scrollTop; | |
| var strPos = 0; | |
| var br = ((txtarea.selectionStart || txtarea.selectionStart == '0') ? | |
| "ff" : (document.selection ? "ie" : false ) ); | |
| if (br == "ie") { | |
| txtarea.focus(); | |
| var range = document.selection.createRange(); |
| #!/bin/bash | |
| set -eEuo pipefail | |
| # https://stackoverflow.com/questions/6928946/mysterious-lineno-in-bash-trap-err | |
| # https://stackoverflow.com/questions/64786/error-handling-in-bash | |
| # https://stackoverflow.com/questions/24398691/how-to-get-the-real-line-number-of-a-failing-bash-command | |
| # https://unix.stackexchange.com/questions/39623/trap-err-and-echoing-the-error-line | |
| # https://unix.stackexchange.com/questions/462156/how-do-i-find-the-line-number-in-bash-when-an-error-occured | |
| # https://unix.stackexchange.com/questions/365113/how-to-avoid-error-message-during-the-execution-of-a-bash-script | |
| # https://shapeshed.com/unix-exit-codes/#how-to-suppress-exit-statuses |
| # Bash getopt long options with values usage example | |
| ```sh | |
| #!/bin/bash -e | |
| ARGUMENT_LIST=( | |
| "arg-one" | |
| "arg-two" | |
| "arg-three" | |
| ) |