Skip to content

Instantly share code, notes, and snippets.

icio is typing...

Paul Scott icio

icio is typing...
View GitHub Profile
View gist:901431
<div class='blockHeader' style='padding-bottom:5px;border-bottom:1px solid #cbcbcb !important;border-top:1px solid #c8c8c8 !important;font-weight:bold;height:24px; vertical-align:top;top:-23px;position:relative; padding-left: 33px;color:#2c3434 !important;padding-top:13px;'>
<font style=' background: -webkit-gradient(linear, 0% 25%, 0% 80%, from(#707070), to(#050505) );-webkit-background-clip:text;-webkit-text-fill-color:transparent;font-size:14px;'>
Would you help company
View cli-router.php
#! /usr/bin/env php
* =======================================================
* Route the user input to the correct function.
icio /
Created Sep 24, 2011
Split (by line) a file into similarly-sized parts each less than a given size
#!/usr/bin/env bash
# Filesize limit (MiB)
limit=$(($1 * 1000**2))
# Accept multiple files in the arguments
for file in $@
# Skip arguments that aren't regular files
icio / gist:1253244
Created Sep 30, 2011
Kevin Mitnick Voice Mail and Fax Exploit
View gist:1253244
8.2 Voice Mail and Fax Exploit
This exploit relies on convincing an employee at a large company to enable a voice mailbox: the intruder would call the people who administer the voice mailboxes for the target company and request a mailbox. The pretext would be that the intruder works for a different division, and would like to retrieve messages without making a toll call.
Once the intruder has access to the voice mail system, the intruder would call the receptionist, represent himself as an employee of the company, and ask that they take messages for him; last but not least, the intruder would request the fax number and ask that incoming faxes be held for pickup. This sets the stage for the call to the target division of the company.
At this point, the intruder would call the target division to initiate the fax exploit with the goal of obtaining the targeted confidential company information. During that call the intruder would identify himself as an employee of th

Welcome to Drift!

Drift is an always-already versioned, cloud-backed text editor. You can use it to take notes, and save them in the GitHub cloud.

Your gists are always saved locally, and any changes you make will get pushed to GitHub's servers.

To name a gist, touch its name in the toolbar.

You can use the share button at the top-right to copy a link to one of your gists, or view it on the web in Safari.

View gist:1705922
icio / gist:2000445
Created Mar 8, 2012
Bash function for opening GHI issues in the browser
View gist:2000445
# usage: ghi | ghi-w
# usage: ghi -u icio | ghi-w
alias ghi-w="awk '{ print substr(\$1,1,length(\$1)-1), \"\n\" }' | cat | xargs -n 1 ghi -w"
# Checks a URI for the existance of a troll link.
# ./
# Realtime Feedback
# Bayesian inference
View delay.js
var _log_start =;
* Helper for logging which prepends a time-offset
function log()
console.log.apply(console, ["["+("]"].concat(args(arguments)));
icio / gist:3166670
Created Jul 23, 2012
Python for/else
View gist:3166670
# For and if
for module in self.modules.values():
ok = True
for f in filters:
if not f(module):
ok = False
if ok:
yield module