Skip to content

Instantly share code, notes, and snippets.

@danrue
danrue / gist:e7aef347b36c3288183d5020ada4b7bc
Last active November 16, 2020 19:14
Reproducible Builds with TuxMake
drue@jug:~/src/linux-mainline₿ git describe
v5.10-rc4
drue@jug:~/src/linux-mainline₿ tuxmake -r podman -k tinyconfig -e "KBUILD_BUILD_TIMESTAMP='Sun May 1 12:00:00 CEST 2011'" -e "KBUILD_BUILD_USER=tuxmake" -e "KBUILD_BUILD_HOST=tuxmake"
drue@jug:~/src/linux-mainline₿ tuxmake -r podman -k tinyconfig -e "KBUILD_BUILD_TIMESTAMP='Sun May 1 12:00:00 CEST 2011'" -e "KBUILD_BUILD_USER=tuxmake" -e "KBUILD_BUILD_HOST=tuxmake"
drue@jug:~/.cache/tuxmake/builds₿ md5sum 61[56]/* | sort
2a79af3c87ecab9867dcb2b6bd78ff13 616/metadata.json
423642d413c4e35f3bfa9002d202782d 615/bzImage
423642d413c4e35f3bfa9002d202782d 616/bzImage
893d8d621204d0abec6a212a0dd62a54 615/config
893d8d621204d0abec6a212a0dd62a54 616/config
#!/usr/bin/env python
# Find the IAM username belonging to the TARGET_ACCESS_KEY
# Useful for finding IAM user corresponding to a compromised AWS credential
# Usage:
# find_iam_user AWS_ACCESS_KEY_ID
# Requirements:
#
# Environmental variables:
# AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY
# or
@erikh
erikh / hack.sh
Created March 31, 2012 07:02 — forked from DAddYE/hack.sh
OSX For Hackers
#!/usr/bin/env sh
##
# This is script with usefull tips taken from:
# https://github.com/mathiasbynens/dotfiles/blob/master/.osx
#
# install it:
# curl -sL https://raw.github.com/gist/2108403/hack.sh | sh
#