Skip to content

Instantly share code, notes, and snippets.

View icio's full-sized avatar
💬
icio is typing...

Paul Scott icio

💬
icio is typing...
View GitHub Profile
<div class='blockHeader' style='padding-bottom:5px;border-bottom:1px solid #cbcbcb !important;border-top:1px solid #c8c8c8 !important;font-weight:bold;height:24px; vertical-align:top;top:-23px;position:relative; padding-left: 33px;color:#2c3434 !important;padding-top:13px;'>
<font style=' background: -webkit-gradient(linear, 0% 25%, 0% 80%, from(#707070), to(#050505) );-webkit-background-clip:text;-webkit-text-fill-color:transparent;font-size:14px;'>
Would you help company
</font>
</div>
#! /usr/bin/env php
<?php
route();
/*
* =======================================================
*/
/**
* Route the user input to the correct function.
@icio
icio / size-split.sh
Created September 24, 2011 17:56
Split (by line) a file into similarly-sized parts each less than a given size
#!/usr/bin/env bash
# Filesize limit (MiB)
limit=$(($1 * 1000**2))
shift
# Accept multiple files in the arguments
for file in $@
do
# Skip arguments that aren't regular files
@icio
icio / gist:1253244
Created September 30, 2011 09:30
Kevin Mitnick Voice Mail and Fax Exploit
http://hsgac.senate.gov/030200_mitnick.htm
8.2 Voice Mail and Fax Exploit
This exploit relies on convincing an employee at a large company to enable a voice mailbox: the intruder would call the people who administer the voice mailboxes for the target company and request a mailbox. The pretext would be that the intruder works for a different division, and would like to retrieve messages without making a toll call.
Once the intruder has access to the voice mail system, the intruder would call the receptionist, represent himself as an employee of the company, and ask that they take messages for him; last but not least, the intruder would request the fax number and ask that incoming faxes be held for pickup. This sets the stage for the call to the target division of the company.
At this point, the intruder would call the target division to initiate the fax exploit with the goal of obtaining the targeted confidential company information. During that call the intruder would identify himself as an employee of th

Welcome to Drift!

Drift is an always-already versioned, cloud-backed text editor. You can use it to take notes, and save them in the GitHub cloud.

Your gists are always saved locally, and any changes you make will get pushed to GitHub's servers.

To name a gist, touch its name in the toolbar.

You can use the share button at the top-right to copy a link to one of your gists, or view it on the web in Safari.

,,,,,,,,,,,,,;;;;;;;;:::okKXXKKKKKKKKK0KK0OolcclllclodddoloddddxxdddxxxxkOOkkkOolo;,codl:xKXXXXXXXXXKKKKKXXXXXXXXXXXXXXX0xdollllllllooooddoodddddddooooooooodddddo'.'dO00000OOOOO00000OOOOOO00OOOOOO0OOO
,,,,,,,,,,,,;;;;;;;,,,;::coOKKKKKKKKKKKKKK0xoccc:cccclooooddddddoodxxxkkOOOOOOO0kod;,;lolclllokkdlc:;,;lx0XXXXXXXXXXXXOoccllllllclooodoooddddddddddddoooooddddddoc..;x0000000OO00000000OOO00000000000000
,;;,,,,,,;;;:lc,,,,,,,,,;;:lOKXXKKKKKKKKKKK0xll;;c:',;ldxxxxxdllldOkxOOkkOKK00XXX0oo;,,:looolc:,,;::cc:;;;lxO0KKXXXKxlcloloolllloddoddddddddxxxxddddddddlodddxxlo:.,dO0000000000000000000000000000000000
;;;,,,,,,,,,;;,,,,,,,,'....':ld0KKKKKKKKKKKOooollc,'coOkdxkklcoxk0kxkOkKNNNNNNNXXXd:;,,,;;:lllllccllooooooooollloddlloddollloddddddddddddxxxxxxxxdddddddloxxxxo:o,.lO00000000O00000000000000000000000000
,,,,,,,,;;;;;;,,,,,,,,,,,,'....;kKKKXXKKKKOc;looc,,lddodlclcloodkOxxkOKXNNNNNNNNNO,''''''',;cooolloooddooododoolcclooooooddddddddddddddddxxxxxxxxxddddddloxxxxclc.:k0000000O000O000000000000000000000000
,,;;;;;;:::;,,;;;;,
@icio
icio / gist:2000445
Created March 8, 2012 11:01
Bash function for opening GHI issues in the browser
# usage: ghi | ghi-w
# usage: ghi -u icio | ghi-w
alias ghi-w="awk '{ print substr(\$1,1,length(\$1)-1), \"\n\" }' | cat | xargs -n 1 ghi -w"
@icio
icio / pwnt.sh
Created May 28, 2012 13:34 — forked from anonymous/pwnt.sh
#!/bin/bash
#
# Checks a URI for the existance of a troll link.
#
# EXAMPLE USAGE:
# ./pwnt.sh www.youtube.com/watch?v=oHg5SJYRHA0
#
# TODO:
# Realtime Feedback
# Bayesian inference
@icio
icio / delay.js
Created July 21, 2012 15:20
delay.js
var _log_start = Date.now();
/**
* Helper for logging which prepends a time-offset
*/
function log()
{
console.log.apply(console, ["["+(Date.now()-_log_start)+"]"].concat(args(arguments)));
}
@icio
icio / gist:3166670
Created July 23, 2012 22:33
Python for/else
# For and if
for module in self.modules.values():
ok = True
for f in filters:
if not f(module):
ok = False
break
if ok:
yield module