ffmpeg -i vitrine.mp4 -vf scale=1024:-1 -q:vscale 0 vitrine.avi
ffmpeg -f concat -i repeat.txt -c copy vitrine2.mp4
file 'file1.avi'
file 'file2.avi'
#!/usr/bin/env bash | |
# wwg.sh | |
# a wrapper script for wg/wg-quick/systemctl wireguard operations | |
# The idea is you create your wireguard config file (eg, `wg0.conf`), | |
# then run `wwg.sh enc wg0.conf` to encrypt it. Then, you can use `wwg.sh up wg0.conf` | |
# which will temporarily decrypt the file, run `wg-quick up` for that interface with | |
# the decrypted config file, then shred it so the plaintext version doesn't remain on | |
# disk for longer than the time the `wg-quick` operation takes. |
# with user-agent | |
# credits @fo0_ | |
wordgrab() { | |
url=$1 | |
tmpfile="$(date "+%s")" | |
curl -sLk -m 3 -A "Mozilla/5.0 (X11; Linux; rv:74.0) Gecko/20100101 Firefox/74.0" https://$url | html2text | egrep -io "[0-9a-zA-Z\-]+" | tr '[:upper:]' '[:lower:]' | sed -r "s/^[^a-z]+//g" | sed -r "s/[^a-z0-9]+$//g" | sed -r '/.{2,}/!d' | sort -fu | tee -a $tmpfile | tr '-' '.' | tee -a $tmpfile | tr "." "\n" >> $tmpfile | |
cat $tmpfile | sort -fu | |
rm $tmpfile | |
} |
#!/usr/bin/python3 | |
import sys, re | |
f = open(sys.argv[1],'r') | |
text = f.read() | |
ips = [] | |
regex = re.findall(r'\b(?:\d{1,3}\.){3}\d{1,3}\b',text) | |
if regex is not None: | |
for match in regex: | |
if match not in ips: |
::================================================================================= | |
:: | |
:: Change the Region and Language to Italian (Formats, Location and Keyboard) | |
:: Change the TimeZoneInformation to W. Europe Standard Time | |
:: | |
:: Version 0.2 - Changelog: | |
:: | |
:: 0.1 - Initial version | |
:: 0.2 - Changed the charset (now Windows-1252) to supported the euro symbol | |
:: |
#! /usr/bin/env ruby | |
# This script can be used to parse and dump the information from | |
# the 'html/contact_info.htm' file in a Facebook user data ZIP download. | |
# | |
# It dumps all cell phone call + SMS message + MMS records, plus a summary of each. | |
# | |
# Place this script inside the extracted Facebook data download folder | |
# alongside the 'html' folder. | |
# |
FM - https://gist.github.com/cryptolok/6f899b1a1047fab90c13b6dde9e8f384 | |
AM - https://gist.github.com/cryptolok/58f2b781b80d02714d685a2fc09e81b8 |
#!/bin/bash | |
# small tool to retreive vk.com (vkontakte) users hidden metadata (state, access, dates, counts, etc) anonymously (without login) | |
# sudo apt install curl | |
parse(){ | |
local IFS=\> | |
read -d \< CELL VALUE | |
} |
ID | Host | IP Address | Year | Month | Day | Implant | Version | OS | |
---|---|---|---|---|---|---|---|---|---|
PITCHIMPAIR | ns1.youngdong.ac.kr | 202.30.58.5 | 1969 | 12 | 31 | INCISION | 1.1.2.1 | hppa2.0w-hp-hpux11.00 | |
INTONATION | tx.micro.net.pk | 203.135.2.194 | 2000 | 8 | 17 | JACKLADDER | 2.0 | sparc-sun-solaris2.7 | |
INTONATION | hakuba.janis.or.jp | 210.232.42.3 | 2000 | 8 | 22 | JACKLADDER | 2.0 | sparc-sun-solaris2.6 | |
INTONATION | mail.interq.or.jp | 210.157.0.87 | 2000 | 8 | 24 | JACKLADDER | 2.0 | sparc-sun-solaris2.6 | |
INTONATION | mx1.freemail.ne.jp | 210.235.164.21 | 2000 | 8 | 28 | JACKLADDER | ? | i386-pc-solaris2.7 | |
INTONATION | webnetra.entelnet.bo | 166.114.10.28 | 2000 | 8 | 30 | JACKLADDER | 2.0 | sparc-sun-solaris2.6 | |
INTONATION | opcwdns.opcw.nl | 195.193.177.150 | 2000 | 9 | 6 | JACKLADDER | 2.0 | sparc-sun-solaris2.6 | |
INTONATION | rayo.pereira.multi.net.co | 206.49.164.2 | 2000 | 9 | 20 | JACKLADDER | 2.0 | sparc-sun-solaris2.6 | |
INTONATION | most.cob.net.ba | 195.222.48.5 | 2000 | 9 | 21 | JACKLADDER | 2.0 | sparc-sun-solaris2.6 |
#!/usr/bin/python | |
''' | |
InFB - Information Facebook | |
Usage: infb.py user@domain.tld password | |
infb.py | |
http://ruel.me |