Skip to content

Instantly share code, notes, and snippets.

@holydevil
holydevil / ymail-wpt
Created January 31, 2014 02:51
wpt script for yahoo mail logged in user
logData 0
// bring up the login screen
navigate https://mail.yahoo.com/
logData 1
// log in
setValue name=login loginid
setValue name=passwd password
@holydevil
holydevil / keybase.md
Created October 31, 2014 17:44
keybase.md

Keybase proof

I hereby claim:

  • I am holydevil on github.
  • I am holydevil (https://keybase.io/holydevil) on keybase.
  • I have a public key whose fingerprint is D3A5 5736 D89A 160B 15FE 9C52 7365 3624 0838 61E0

To claim this, I am signing this object:

$ curl -IL http://me.yahoo.com/
HTTP/1.1 302 Found
Date: Sat, 01 Nov 2014 17:39:02 GMT
P3P: policyref="http://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Location: https://me.yahoo.com/
Cache-Control: private
Vary: Accept-Encoding
Content-Type: text/html
Age: 0
Connection: close
@holydevil
holydevil / hack.sh
Created August 21, 2012 14:20 — forked from erikh/hack.sh
OSX For Hackers
#!/usr/bin/env sh
##
# This is script with usefull tips taken from:
# https://github.com/mathiasbynens/dotfiles/blob/master/.osx
#
# install it:
# curl -sL https://raw.github.com/gist/2108403/hack.sh | sh
#
@holydevil
holydevil / ssh_tips
Created March 31, 2013 11:21
Fix for "Too many authentication failures for <username>" on hostgator
ssh -o PubkeyAuthentication=no user@hostname
@holydevil
holydevil / chrome-settings
Created April 1, 2013 10:19
Chrome hacks
chrome://histograms/DNS
@holydevil
holydevil / gist:5390174
Created April 15, 2013 18:24
Curl request data log
curl --trace-ascii data.log --trace-time <url>
$ git commit --amend --reset-author (Changes the most recent commit message + author in this case)
@holydevil
holydevil / gist:7312372
Created November 5, 2013 01:28
tcpdump to list HTTP requests source: http://stackoverflow.com/a/16610385
man tcpdump | less -Ip examples
# tcpdump filter for HTTP GET
sudo tcpdump -s 0 -A 'tcp[((tcp[12:1] & 0xf0) >> 2):4] = 0x47455420'
# tcpdump filter for HTTP POST
sudo tcpdump -s 0 -A 'tcp dst port 80 and (tcp[((tcp[12:1] & 0xf0) >> 2):4] = 0x504f5354)'
# monitor HTTP traffic including request and response headers and message body
# cf. https://sites.google.com/site/jimmyxu101/testing/use-tcpdump-to-monitor-http-traffic