Skip to content

Instantly share code, notes, and snippets.

View benediktkr's full-sized avatar

Ben Kristinsson benediktkr

View GitHub Profile
@benediktkr
benediktkr / appdaemon_irk.yaml
Created September 13, 2023 22:27 — forked from dgrnbrg/appdaemon_irk.yaml
Randomized key resolution for apple device tracking
tracker_test:
class: IrkTracker
module: irk_tracker
training_input_text: input_text.irk_tag
data_loc: tracker_logs/
rows_per_flush: 100
@benediktkr
benediktkr / basic_message.py
Last active April 6, 2022 13:33
slack webhook in python
import json
import requests
# this file exists on mgmt control. reading from a file avoids having to
# template the token into the script.
with open('/usr/local/etc/slack_token') as f:
token = json.loads(f.read())['slack_token']
headers = {'Content-type': 'application/json', 'Accept': 'text/plain'}
@benediktkr
benediktkr / 1.md
Created November 30, 2016 14:08 — forked from anonymous/1.md
Hacking North Korea’s Grand People’s Study House

Hacking North Korea’s Grand People’s Study House

Prologue

I've decided to post this article anonymously. As much as I would have loved to get credit for it, it is not worth putting the safety of my Korean guides at risk. They are great people, and having any connection to this (even though everything done was legal), could cause them to suffer consequences under the regime.

In the Spring of 2016 I had the chance to travel to the Democratic People’s Republic of Korea, known in the West as North Korea. The trip was very enlightening, and I’ve come away with a lot of new personal thoughts about the country. This post is not about my personal thoughts though, this post is about my love of cybersecurity and my constant want to be put on new national security lists.

Grand People’s Study House

function mae(a, b) {
return a["charAt"](b);
}
function bfQh(a, b) {
return a["charCodeAt"](b);
}
@benediktkr
benediktkr / VCL.BNF
Last active August 29, 2015 14:22
VCL.BNF
###
### Non-terminals
###
VCL ::= ACL | SUB | BACKEND | DIRECTOR | PROBE | IMPORT | CSRC
ACL ::= 'acl' identifier '{' {ACLENTRY} '}'
SUB ::= 'sub' identifier COMPOUND
BACKEND ::= 'backend' identifier '{' { ['set|backend'] BACKENDSPEC } '}'
PROBE ::= 'probe' identifier '{' PROBESPEC '}'

Keybase proof

I hereby claim:

  • I am benediktkr on github.
  • I am benediktkr (https://keybase.io/benediktkr) on keybase.
  • I have a public key whose fingerprint is B079 DAEE 3F24 BE3D AA92 A207 1A1D 77B7 89AE 827D

To claim this, I am signing this object: