Skip to content

Instantly share code, notes, and snippets.

View gen0cide's full-sized avatar
🇺🇦
Slava Ukraini

Alex Levinson gen0cide

🇺🇦
Slava Ukraini
View GitHub Profile
@gen0cide
gen0cide / hack.sh
Created April 17, 2012 23:01 — forked from erikh/hack.sh
OSX For Hackers
#!/usr/bin/env sh
##
# This is script with usefull tips taken from:
# https://github.com/mathiasbynens/dotfiles/blob/master/.osx
#
# install it:
# curl -sL https://raw.github.com/gist/2108403/hack.sh | sh
#
@gen0cide
gen0cide / checker.rb
Created September 4, 2012 17:19 — forked from jc00ke/checker.rb
Ruby script to find password in LinkedIn leak, if present.
#!/usr/bin/env ruby
require 'digest/sha1'
if ARGV[0].nil?
puts "Usage: checker [password]"
puts "Checks the LinkedIn password file for a SHA-1 match of the provided password."
exit 1
end
## Sploit Watch
## Player Tracking and Reporting
##
## Copyright (C) 2012 iSight Security, Inc.
##
## This program is free software: you can redistribute it and/or modify
## it under the terms of the GNU General Public License as published by
## the Free Software Foundation, either version 3 of the License, or
## (at your option) any later version.
##
awk -F"," -v k="text" '{
gsub(/{|}/,"")
for(i=1;i<=NF;i++){
if ( $i ~ k ){
print $i
}
}
}'

Keybase proof

I hereby claim:

  • I am gen0cide- on github.
  • I am alexlevinson (https://keybase.io/alexlevinson) on keybase.
  • I have a public key whose fingerprint is 2A7C A2F5 13C7 4BEB D027 DD7A EC13 29EE 5C34 7828

To claim this, I am signing this object:

@gen0cide
gen0cide / keybase.md
Created December 24, 2014 01:07
keybase.md

Keybase proof

I hereby claim:

  • I am gen0cide- on github.
  • I am alexlevinson (https://keybase.io/alexlevinson) on keybase.
  • I have a public key whose fingerprint is 393F E95C 9B6E 8DFE 5932 281D B95C 2373 45F0 3362

To claim this, I am signing this object:

@gen0cide
gen0cide / .pgpass
Created June 3, 2016 00:43 — forked from davehughes/.pgpass
psql connection aliasing/management
# alias:northwind
db1.example.com:5432:northwind:postgres:hunter2
# alias:mainframe
db1.example.com:5432:mainframe:dave:password123
db1.example.com:5432:unaliased:postgres:
@gen0cide
gen0cide / README.md
Created September 16, 2016 19:01 — forked from davehughes/README.md
.mfa

Setup:

  • Add TOTP keys to a yaml file in ~/.mfa. For example:
aws: k4ur lrri br6f mbzo l6dv gyx5 u2yg cd7n
google: 25gq xtax hzoz wsxe c7pd 34pf 44dq abzl
  • Copy the mfa.py script to ~/bin (or elsewhere, adjusting your alias appropriately).
  • Create the alias alias mfa="~/bin/mfa.py --config=~/.mfa" in ~/.bashrc, ~/.zshrc, or wherever it can be sourced conveniently.
$Searcher = New-Object -ComObject Microsoft.Update.Searcher
$RemoveCollection = New-Object -ComObject Microsoft.Update.UpdateColl
$SearchResult = $Searcher.Search("IsInstalled=1")
$SearchResult.Updates | % { $RemoveCollection.Add($_) }
if ($RemoveCollection.Count -gt 0) {
$Installer = New-Object -ComObject Microsoft.Update.Installer
$Installer.Updates = $RemoveCollection
$Installer.Uninstall()
} else {}

Keybase proof

I hereby claim:

  • I am gen0cide on github.
  • I am alexlevinson (https://keybase.io/alexlevinson) on keybase.
  • I have a public key ASDtinyE_oBpdPNH-kzSWv3fshnW1QYX8gVNE8BBTw2oJQo

To claim this, I am signing this object: