Skip to content

Instantly share code, notes, and snippets.

View brianlechthaler's full-sized avatar
🎉
This account is now 11 years old!

Brian Lechthaler brianlechthaler

🎉
This account is now 11 years old!
View GitHub Profile
@brianlechthaler
brianlechthaler / id_rsa.pub
Created November 16, 2021 19:59
ssh-2021
ssh-rsa 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
@brianlechthaler
brianlechthaler / vqe_uccsd.qasm
Last active March 4, 2021 20:58
VQE UCCSD Ansatz in QASM 2.0
OPENQASM 2.0;
include "qelib1.inc";
qreg q[5];
creg c[5];
# Initialize Hartree Fock State
x q[0];
x q[1];
@brianlechthaler
brianlechthaler / BrianLechthaler2020December.asc
Created December 28, 2020 02:54
GPG Public Key (exported on 2020/12/27)
-----BEGIN PGP PUBLIC KEY BLOCK-----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@brianlechthaler
brianlechthaler / superposition.qasm
Created December 27, 2020 07:56
Simple Superpositioning Example (QASM2)
OPENQASM 2.0;
include "qelib1.inc";
# Initialize 1 quantum register (1 qubit)
qreg q[1];
# Initialize 1 classic register (1 bit)
creg c[1];
#Place a Hadamard gate at the beginning of the first qubit
h q[0];
Already have image (with digest): gcr.io/cloud-builders/docker
Sending build context to Docker daemon 86.53kB
Step 1/6 : FROM alpine
latest: Pulling from library/alpine
801bfaa63ef2: Pulling fs layer
801bfaa63ef2: Verifying Checksum
801bfaa63ef2: Download complete
801bfaa63ef2: Pull complete
Digest: sha256:3c7497bf0c7af93428242d6176e8f7905f2201d8fc5861f45be7a346b5f23436
Status: Downloaded newer image for alpine:latest
@brianlechthaler
brianlechthaler / grover_n2_a11.qasm
Created December 21, 2020 07:22
grover n=2 a=11 in QASM v2
OPENQASM 2.0;
include "qelib1.inc";
qreg q[2];
creg c[2];
reset q[0];
reset q[1];
h q[0];
h q[1];
@brianlechthaler
brianlechthaler / aws-provision-efs.sh
Last active November 25, 2020 23:49
Tool to automatically provision any AWS EFS attached to an EC2 instance running this script
#!/bin/sh
#Store the name of the user who invoked this script to set appropriate permissions later
export invokingUser=$(whoami)
echo "Usage: ./efs-bootstrap.sh <EFS_Filesystem_ID> <MountPoint>"
echo "Example: ./efs-bootstrap.sh fs-deadbeef /mnt/efs/fs1/"
#Ensure target directory exists
sudo mkdir -p $2
@brianlechthaler
brianlechthaler / mkramdisk.sh
Created November 25, 2020 00:01
Easily create a ramdisk on any Linux system. Example: ./mkramdisk.sh 1g /mnt/ramdisk
#!/bin/sh
export invokingUser=$(whoami)
echo "Usage: ./mkramdisk.sh <disk_size_bytes> <ramdisk_mountpoint>"
echo "Example: ./mkramdisk.sh 1G /mnt/ramdisk"
sudo mkdir -p $2
sudo chown -R $invokingUser:$invokingUser $2
sudo mount -t tmpfs -o size=$1 tmpfs $2
@brianlechthaler
brianlechthaler / LuksAutoInitGpg.sh
Created November 11, 2020 00:19
LuksAutoInitGpg.sh
#!/bin/sh
echo "USAGE: ./gpgpw.sh <number of characters> <long key ID to encrypt password to> <output file>"
echo "EXAMPLE: ./gpgpw.sh 1024 DEADBEEF0000FFFF0000FFFF0000FFFF0000FFFF /mnt/encrypted_password.asc /dev/xvdg"
export password=$(pwgen -sy $1 1)
echo $password | cryptsetup luksFormat $4 -
export password=$(echo $password | gpg --encrypt -a -r $2)
echo $password
echo $password > $3
@brianlechthaler
brianlechthaler / Markdown_XSS_Test.md
Last active September 6, 2020 05:48
Check whether a markdown parser is vulnerable to XSS in this interactive PSA

Markdown Cross-Site-Scripting (XSS) Sanitization Check

An interactive PSA by Brian Lechthaler

Proof of Concept

note: if you're viewing this on GitHub the following line willl not contain a clickable link. Thanks, GitHub security team!

Is your markdown parser vulnerable to XSS? click here to find out!