Skip to content

Instantly share code, notes, and snippets.

View AuthyToOtherAuthenticator.md

Generating Authy passwords on other authenticators


There is an increasing count of applications which use Authy for two-factor authentication. However many users who aren't using Authy, have their own authenticator setup up already and do not wish to use two applications for generating passwords.

Since I use 1Password for all of my password storing/generating needs, I was looking for a solution to use Authy passwords on that. I couldn't find any completely working solutions, however I stumbled upon a gist by Brian Hartvigsen. His post had a neat code with it to generate QR codes (beware, through Google) for you to use on your favorite authenticator.

His method is to extract the secret keys using Authy's Google Chrome app via Developer Tools. If this was not possible, I guess people would be reverse engineering the Android app or something like that. But when I tried that code, nothing appeared on the screen. My gues

View keybase.md

Keybase proof

I hereby claim:

  • I am fortran01 on github.
  • I am fortran01 (https://keybase.io/fortran01) on keybase.
  • I have a public key ASDAq43cA9c36E5l348wPMzQt6ML9ixXyViUGMEU1W9mGAo

To claim this, I am signing this object:

View log.sh
#!/bin/bash
logfile="my.log"
# Set up a named pipe for logging
npipe=/tmp/$$.tmp
mknod $npipe p
# Log all output to a log for error checking
tee <$npipe $logfile &
View tmux.sh
# Start new unnamed session
tmux -CC new
# Start new named session
# ???
# Re-attach to unnamed session
tmux -CC attach
# Re-attach to named session
@fortran01
fortran01 / log.sh
Created Oct 9, 2019
Log to file and see stdout
View log.sh
#!/bin/bash
logfile="my.log"
# Set up a named pipe for logging
npipe=/tmp/$$.tmp
mknod $npipe p
# Log all output to a log for error checking
tee <$npipe $logfile &
View pwpolicy.plist
<dict>
<key>policyCategoryAuthentication</key>
<array>
<dict>
<key>policyContent</key>
<string>(policyAttributeFailedAuthentications &lt; policyAttributeMaximumFailedAuthentications) OR (policyAttributeCurrentTime &gt; (policyAttributeLastFailedAuthenticationTime + autoEnableInSeconds))</string>
<key>policyIdentifier</key>
<string>Authentication Lockout</string>
<key>policyParameters</key>
<dict>
@fortran01
fortran01 / dev.c
Last active Aug 29, 2015
compatdrivers_chan_qos_frag.patch -- /usr/src/linux-source-3.18/drivers/net/wireless/rtl818x/rtl8187/dev.c from linux-source-3.18_3.18.3-1~kali4_all.deb (md5 90218f1ccc6e7d2dc9dbb70b5a2762a7)
View dev.c
/*
* Linux device driver for RTL8187
*
* Copyright 2007 Michael Wu <flamingice@sourmilk.net>
* Copyright 2007 Andrea Merello <andrea.merello@gmail.com>
*
* Based on the r8187 driver, which is:
* Copyright 2005 Andrea Merello <andrea.merello@gmail.com>, et al.
*
* The driver was extended to the RTL8187B in 2008 by:
@fortran01
fortran01 / tx.c
Last active Aug 29, 2015
Patched packet injection -- /usr/src/linux-source-3.18/net/mac80211/tx.c from linux-source-3.18_3.18.3-1~kali4_all.deb (md5 90218f1ccc6e7d2dc9dbb70b5a2762a7)
View tx.c
/*
* Copyright 2002-2005, Instant802 Networks, Inc.
* Copyright 2005-2006, Devicescape Software, Inc.
* Copyright 2006-2007 Jiri Benc <jbenc@suse.cz>
* Copyright 2007 Johannes Berg <johannes@sipsolutions.net>
* Copyright 2013-2014 Intel Mobile Communications GmbH
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License version 2 as
* published by the Free Software Foundation.
View compatdrivers_chan_qos_frag.patch
*original patch by Mathy Vanhoef
*http://www.mathyvanhoef.com/2012/09/compat-wireless-injection-patch-for.html
*fixed in offset by Devil_D
diff -r 6b71629b673d drivers/net/wireless/rtl818x/rtl8187/dev.c
--- a/drivers/net/wireless/rtl818x/rtl8187/dev.c Tue May 28 16:57:23 2013 -0400
+++ b/drivers/net/wireless/rtl818x/rtl8187/dev.c Tue May 28 17:16:15 2013 -0400
@@ -252,8 +252,18 @@ static void rtl8187_tx(struct ieee80211_
flags |= RTL818X_TX_DESC_FLAG_NO_ENC;
flags |= ieee80211_get_tx_rate(dev, info)->hw_value << 24;
View mac80211.compat08082009.wl_frag+ack_v1.patch
diff --git a/net/mac80211/tx.c b/net/mac80211/tx.c
index 0855cac..221bed6 100644
--- a/net/mac80211/tx.c
+++ b/net/mac80211/tx.c
@@ -677,11 +677,19 @@ int tid;
/*
* Packet injection may want to control the sequence
- * number, if we have no matching interface then we
- * neither assign one ourselves nor ask the driver to.