Skip to content

Instantly share code, notes, and snippets.

View cemeyer's full-sized avatar

Conrad Meyer cemeyer

  • Seattle, Washington
View GitHub Profile
@dlenski
dlenski / fakeserver.py
Last active May 10, 2022 21:17
Fake server for RSA SecurID token generation (see https://github.com/dlenski/rsa_ct_kip#fake-server)
#!/usr/bin/env python3
# Needs: Python 3.5+, Flask, PyCryptoDome
# server.pem, rsapubkey.pem + rsaprivkey.pem (1024-bit) in the current directory
#
# What it does:
# Pretends to be the "CT-KIP" web service (https://tools.ietf.org/html/rfc3948) that
# RSA SecurID Token for Windows v5.0.x talks to to set up a new token, using an
# authentication code.
#
@tdwalton
tdwalton / 1passwordpwnedcheck.sh
Last active May 26, 2024 18:25
Check 1Password passwords against havibeenpwned.com password database.
#!/bin/bash
########################################################################################
# 1passwordpwnedcheck.sh - script to check 1password entries against known compromised
# passwords from haveibeenpwned.com
#
# Requirements:
# 1password CLI tool - https://app-updates.agilebits.com/product_history/CLI
# jq json parser - https://stedolan.github.io/jq/
#
@jart
jart / lolc.sh
Last active June 7, 2023 15:44
Run C code in Bash
#!/bin/bash
# lolc.sh - run c code in bash
# by justine tunney <jtunney@gmail.com>
# licensed mit or apache 2.0
runc() {
local bin=$(mktemp -u)
gcc -xc -o ${bin} /dev/stdin || return
chmod u+x ${bin}
${bin} "$@"
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.