Skip to content

Instantly share code, notes, and snippets.

#!/bin/bash
mitmfiles="$HOME/.mitmproxy/mitmproxy-ca.pem"
for f in $mitmfiles; do
name="$(openssl x509 -inform PEM -subject_hash_old -in $f | head -1).0"
echo Filename: $f
cp "$f" "$name"
android_file="/system/etc/security/cacerts/$name"
adb push "$name" "$android_file"
adb shell "su -c chmod 644 $android_file"
done

Keybase proof

I hereby claim:

  • I am coffeemakr on github.
  • I am muc (https://keybase.io/muc) on keybase.
  • I have a public key ASByjxVF9x7iHU2w_waWrFfRijueynos0EYLjEURS-MXjQo

To claim this, I am signing this object:

#!/usr/bin/bash
# Call ./google_play_check.sh packagelist
filename="$1"
while read -r line
do
name="$line"
curl -X HEAD -s -q -I -f "https://play.google.com/store/apps/details?id=$line" >/dev/null && echo "$name"
done < "$filename"
# Stop all container
docker ps -a -q | xargs docker stop
# Remove containers
docker ps -a -q | xargs docker rm
# Remove volumes (may delete required data)
docker volume ls -q | xargs docker volume rm
@coffeemakr
coffeemakr / findem.py
Last active August 29, 2015 14:07
Search for repetitions
from collections import OrderedDict
from math import sqrt
import re
encrypted = "Something or some thing?"
#encrypted = re.sub('[^A-Z0-9+/\']', '', encrypted)
#print(encrypted)
primes = len(encrypted)
def find_repetitions(s, ignore_space=True):
@coffeemakr
coffeemakr / bashtest.sh
Last active August 29, 2015 14:07
Bash test
#!/bin/bash
env x='() { :;}; echo "ERROR: CVE-2014-6271 vulnerable, ShellShock"' bash -c "echo -n\"\""
foo='() { echo "ERROR: CVE-2014-6278 vulnerable"; }' bash -c foo 2> /dev/null
rm -f bash_vulnerable
X='() { function a a>\' bash -c bash_vulnerable
[ -e bash_vulnerable ] && echo "ERROR: CVE-2014-7169 vulnerable"
bash -c 'true <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF' || echo "ERROR: CVE-2014-7186 vulnerable, redir_stack"
(for x in {1..200} ; do echo "for x$x in ; do :"; done; for x in {1..200} ; do echo done ; done) | bash || echo "ERROR: CVE-2014-7187 vulnerable, word_lineno"
@coffeemakr
coffeemakr / memory-info.sh
Created October 1, 2014 08:39
Memory Mon
#!/bin/sh
meminfo=`free -m | grep 'Mem:'`
used=`echo $meminfo | cut -d" " -f3`
total=`echo $meminfo | cut -d" " -f2`
cached=`echo $meminfo | cut -d" " -f7`
really_used=`expr $used - $cached`
percent=$(bc -l <<EOF
@coffeemakr
coffeemakr / version.cpp
Last active August 29, 2015 14:07
Version
#include "version.h"
#include <stdio.h>
/** \file version.cpp Version functions */
void writeVersion(char* prog, FILE* stream)
{
fprintf(stream, "%s Version "VERSION"\n", prog);
}
@coffeemakr
coffeemakr / pharmacode.py
Last active October 14, 2018 09:04
Pharmacode (Laetus) calculation script
#!/bin/env python
import sys
def pharmacode(v):
r = ''
while v:
t = 1 - ( v % 2 )
r = str(t) + r
v = (v - t) / 2
return r
#!/bin/sh
TEMP_OUTPUT_FILENAME="vdistart"
# command paths
SFDISK=`which sfdisk`
DD=`which dd`
OD=`which od`
AWK=`which awk`
GREP=`which grep`