Skip to content

Instantly share code, notes, and snippets.

View avilum's full-sized avatar

Avi Lumelsky avilum

  • Israel
View GitHub Profile
@avilum
avilum / Running netron on colab and open IFrame
Created May 11, 2023 14:46
Visualizing model inside google Colab.
import IPython
import threading
import time
import os
def display_netron(path):
os.system(f'netron {path}')
thread = threading.Thread(target=display_netron, args=(output_path,))
thread.start()
TOOLKIT_CUDA_VERSION=cu114 pip install torch torchvision torchaudio --extra-index-url https://download.pytorch.org/whl/$TOOLKIT_CUDA_VERSION
alias locate='find / -name $!'
@avilum
avilum / whoami.sh
Created July 4, 2021 12:07
Who Am I ? (Whois on my public IP - ISP level)
wget -qO- "http://ipwhois.app/json/$(wget -qO- http://checkip.amazonaws.com)"
# Optionally - pipe the JSON output to jq:
# wget -qO- "http://ipwhois.app/json/$(wget -qO- http://checkip.amazonaws.com)" | jq
@avilum
avilum / bruteforce_wordpress_users.sh
Last active May 25, 2021 09:52
Bruteforce Wordpress Website Using WP-JSON Users API, With 1000 With Top Common Passwords
#
# This file can be saved as 'bruteforce_wordpress_users.sh'
#
# Requirements:
# - python2 (with requests)
# - jq
# - wget
# - WPForce
# 1. Cloning WPForce:
# git clone https://github.com/n00py/WPForce.git && cd ./WPForce
python -c 'import redis; print(redis.Redis().flushall())'
@avilum
avilum / invalid_ssh_logins_usernames.sh
Created March 9, 2020 09:11
Print the names of the users that failed to connect to a machine using ssh
cat /var/log/auth.log | grep -i -e "disconnected from invalid user" | awk -F' ' '{print $10}' | sort | uniq # INVALID LOGINS USERNAMES (for bash autocompletion and reverse-i search)