Skip to content

Instantly share code, notes, and snippets.

View emanuelduss's full-sized avatar
💭
' OR 1=1 -- "><h1>My @ {{7*7}} Status &;`id`

Emanuel Duss emanuelduss

💭
' OR 1=1 -- "><h1>My @ {{7*7}} Status &;`id`
View GitHub Profile

Keybase proof

I hereby claim:

  • I am mindfuckup on github.
  • I am emanuelduss (https://keybase.io/emanuelduss) on keybase.
  • I have a public key whose fingerprint is 63E7 364A 7180 A32A 5D7D 050D 5926 DE96 A497 5B00

To claim this, I am signing this object:

#!/usr/bin/env python
import json, sys
from urllib.request import urlopen
API='http://xisbn.worldcat.org/webservices/xid/isbn/{isbn}?method=getMetadata&format=json&fl=*'
OPT_KEYS = ['author', 'city', 'ed', 'form', 'lang', 'lccn',
'originalLang', 'publisher', 'year']
def get_metadata(isbn):
rawjson = urlopen(API.format(isbn=isbn)).readall().decode('utf-8')
### Keybase proof
I hereby claim:
* I am mindfuckup on github.
* I am emanuelduss (https://keybase.io/emanuelduss) on keybase.
* I have a public key whose fingerprint is 7994 C89B 04BD 13C0 318E 75E1 08D1 B760 6E3F ADB6
To claim this, I am signing this object:
#!/usr/bin/env bash
while true
do
echo "Testing if tickets are available..."
curl -s https://tickets.events.ccc.de/33c3/ \
| awk '/Standard Ticket/,/Supporter Ticket 120/{ print }' \
| grep UNAVAILABLE || {
mpv /home/emanuel/Daten/Fun/Soundfiles/Coin.ogg
echo "Buy your ticket now!!"
@emanuelduss
emanuelduss / fixwhatsappimages
Created September 16, 2017 12:59
Add EXIF info to WhatsApp images
for i in IMG-????????-WA????.jpg
do
YEAR=`ls $i | cut -c 5-8`
MONTH=`ls $i | cut -c 9-10`
DAY=`ls $i | cut -c 11-12`
jhead -mkexif $i
jhead -ds$YEAR:$MONTH:$DAY $i
done
@emanuelduss
emanuelduss / wpl4s0-gpn18
Created May 10, 2018 14:38
GPN18 WiFi Config
Description='GPN18 secure WPA2 802.1X config'
Interface=wlp4s0
Connection=wireless
Security=wpa-configsection
IP=dhcp
ESSID=GPN18
WPAConfigSection=(
'ssid="GPN18"'
'proto=RSN WPA'
'key_mgmt=WPA-EAP'
@emanuelduss
emanuelduss / dhcpserver.rc
Created August 21, 2019 13:38
Metasploit DHCP Server
# Metasploit DHCP Server
# Start: msfconsole -q -n -r dhcpserver.rc
use auxiliary/server/dhcp
set SRVHOST 10.5.23.1
set DHCPIPSTART 10.5.23.100
set DHCPIPEND 10.5.23.200
set NETMASK 255.255.255.0
set ROUTER 10.5.23.1
set DNSSERVER 8.8.8.8
<macro name="Card10Fun" icon="MAGIC">
<assert-service description="Ensure 42230200-2342-2342-2342-234223422342 service" uuid="42230200-2342-2342-2342-234223422342">
<assert-characteristic description="Ensure Vibra" uuid="4223020f-2342-2342-2342-234223422342">
<property name="WRITE_WITHOUT_RESPONSE" requirement="MANDATORY"/>
</assert-characteristic>
<assert-characteristic description="Ensure 42230210-2342-2342-2342-234223422342 characteristic" uuid="42230210-2342-2342-2342-234223422342">
<property name="WRITE_WITHOUT_RESPONSE" requirement="MANDATORY"/>
</assert-characteristic>
<assert-characteristic description="Ensure 42230211-2342-2342-2342-234223422342 characteristic" uuid="42230211-2342-2342-2342-234223422342">
<property name="WRITE_WITHOUT_RESPONSE" requirement="MANDATORY"/>
@emanuelduss
emanuelduss / cdf.sh
Created May 18, 2020 20:56
Shell function that can be used to jump up in the directory structure to the last directory containing the provided string
cdf(){
local path="$(pwd | rev | cut -d/ -f2- | rev | grep -o -E ".*$1[^/]*")"
echo cd -- "$path"
cd -- "$path"
}
curl -w "DNS: %{time_namelookup}\nTCP: %{time_connect}\nTLS: %{time_appconnect}\nTotal: %{time_total}\n" -o /dev/null -s https://example.net/test