Skip to content

Instantly share code, notes, and snippets.

View gen0cide's full-sized avatar
🇺🇦
Slava Ukraini

Alex Levinson gen0cide

🇺🇦
Slava Ukraini
View GitHub Profile
@gen0cide
gen0cide / reclaimWindows10.ps1
Created July 28, 2018 20:30 — forked from alirobe/reclaimWindows10.ps1
This Windows 10 Setup Script turns off a bunch of unnecessary Windows 10 telemetery, bloatware, & privacy things. Not guaranteed to catch everything. Review and tweak before running. Reboot after running. Scripts for reversing are included and commented. Fork of https://github.com/Disassembler0/Win10-Initial-Setup-Script (different defaults). N.…
##########
# Tweaked Win10 Initial Setup Script
# Primary Author: Disassembler <disassembler@dasm.cz>
# Modified by: alirobe <alirobe@alirobe.com> based on my personal preferences.
# Version: 2.20.1, 2018-07-23
# Primary Author Source: https://github.com/Disassembler0/Win10-Initial-Setup-Script
# Tweaked Source: https://gist.github.com/alirobe/7f3b34ad89a159e6daa1/
# Tweak difference:
#
# @alirobe's version is a subset focused on safely disabling telemetry, some 'smart' features and 3rd party bloat ...
@gen0cide
gen0cide / README.md
Created September 16, 2016 19:01 — forked from davehughes/README.md
.mfa

Setup:

  • Add TOTP keys to a yaml file in ~/.mfa. For example:
aws: k4ur lrri br6f mbzo l6dv gyx5 u2yg cd7n
google: 25gq xtax hzoz wsxe c7pd 34pf 44dq abzl
  • Copy the mfa.py script to ~/bin (or elsewhere, adjusting your alias appropriately).
  • Create the alias alias mfa="~/bin/mfa.py --config=~/.mfa" in ~/.bashrc, ~/.zshrc, or wherever it can be sourced conveniently.
@gen0cide
gen0cide / .pgpass
Created June 3, 2016 00:43 — forked from davehughes/.pgpass
psql connection aliasing/management
# alias:northwind
db1.example.com:5432:northwind:postgres:hunter2
# alias:mainframe
db1.example.com:5432:mainframe:dave:password123
db1.example.com:5432:unaliased:postgres:
@gen0cide
gen0cide / checker.rb
Created September 4, 2012 17:19 — forked from jc00ke/checker.rb
Ruby script to find password in LinkedIn leak, if present.
#!/usr/bin/env ruby
require 'digest/sha1'
if ARGV[0].nil?
puts "Usage: checker [password]"
puts "Checks the LinkedIn password file for a SHA-1 match of the provided password."
exit 1
end
@gen0cide
gen0cide / hack.sh
Created April 17, 2012 23:01 — forked from erikh/hack.sh
OSX For Hackers
#!/usr/bin/env sh
##
# This is script with usefull tips taken from:
# https://github.com/mathiasbynens/dotfiles/blob/master/.osx
#
# install it:
# curl -sL https://raw.github.com/gist/2108403/hack.sh | sh
#