Skip to content

Instantly share code, notes, and snippets.

💭
on the lookout.

mxs iflowfor8hours

💭
on the lookout.
Block or report user

Report or block iflowfor8hours

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
@iflowfor8hours
iflowfor8hours / nastyerror.txt
Created Sep 2, 2018
I thougth you would enjoy the condesencion in the tone of this error message.
View nastyerror.txt
matt@laststand:~$ usermod -aG sudo matt
Command 'usermod' is available in '/usr/sbin/usermod'
The command could not be located because '/usr/sbin' is not included in the PATH environment variable.
This is most likely caused by the lack of administrative privileges associated with your user account.
usermod: command not found
matt@laststand:~$ sudo usermod -aG su
@iflowfor8hours
iflowfor8hours / disable.sh
Created Jul 13, 2018 — forked from pwnsdx/disable.sh
Disable bunch of #$!@ in Sierra (Version 2.1)
View disable.sh
#!/bin/bash
# IMPORTANT: You will need to disable SIP aka Rootless in order to fully execute this script, you can reenable it after.
# WARNING: It might disable things that you may not like. Please double check the services in the TODISABLE vars.
# Get active services: launchctl list | grep -v "\-\t0"
# Find a service: grep -lR [service] /System/Library/Launch* /Library/Launch* ~/Library/LaunchAgents
# Agents to disable
TODISABLE=('com.apple.security.keychainsyncingoveridsproxy' 'com.apple.personad' 'com.apple.passd' 'com.apple.screensharing.MessagesAgent' 'com.apple.CommCenter-osx' 'com.apple.Maps.mapspushd' 'com.apple.Maps.pushdaemon' 'com.apple.photoanalysisd' 'com.apple.telephonyutilities.callservicesd' 'com.apple.AirPlayUIAgent' 'com.apple.AirPortBaseStationAgent' 'com.apple.CalendarAgent' 'com.apple.DictationIM' 'com.apple.iCloudUserNotifications' 'com.apple.familycircled' 'com.apple.familycontrols.useragent' 'com.apple.familynotificationd' 'com.apple.gamed' 'com.apple.icloud.findmydeviced.findmydevi
@iflowfor8hours
iflowfor8hours / default.conf
Last active May 8, 2018
Nginx config for prometheus
View default.conf
server {
listen 80;
server_name localhost;
location / {
proxy_pass http://bnrdevmonitoringmetrics.marathon.l4lb.thisdcos.directory:9090/;
sub_filter_types text/html;
sub_filter_once off;
sub_filter '="/' '="/bnr/dev/service/prometheus/';
sub_filter 'var PATH_PREFIX = "";' 'var PATH_PREFIX = "/bnr/dev/service/prometheus";';
@iflowfor8hours
iflowfor8hours / default.conf
Last active May 8, 2018
default.conf for Nginx on mesos
View default.conf
server {
listen 3000;
server_name localhost;
location / {
proxy_pass http://bnrdevmonitoringmetrics.marathon.l4lb.thisdcos.directory:3000/;
}
}
View termux-themer.sh
#!/bin/bash
# USAGE:
# curl -o termux-themer.sh https://gist.githubusercontent.com/iflowfor8hours/eb56ce57ec886f5e14676d081ba616d0/raw/4a7ca295538262ef579d121ffefd4eb5ee27de68/termux-themer.sh
# chmod +x termux-themer.sh
# ./termux-themer base16-monokai-dark
function jsonValue() {
KEY=$1
num=$2
@iflowfor8hours
iflowfor8hours / ardunio-tomfoolery.sh
Created Jan 18, 2018
Shell output from getting the pro micro to go to bootstrap mode
View ardunio-tomfoolery.sh
slide ~/src/6112884-pro-micro-controller $ virtualenv venv
New python executable in /home/matt/src/6112884-pro-micro-controller/venv/bin/python2.7
Also creating executable in /home/matt/src/6112884-pro-micro-controller/venv/bin/python
Installing setuptools, pip, wheel...done.
slide ~/src/6112884-pro-micro-controller $ python --version
Python 2.7.14
slide ~/src/6112884-pro-micro-controller $ pip install -r requirements.txt
Collecting pyserial==2.7 (from -r requirements.txt (line 1))
Installing collected packages: pyserial
Found existing installation: pyserial 3.4
@iflowfor8hours
iflowfor8hours / ingress-and-service.yaml
Created May 8, 2017
external services using k8s and traefik
View ingress-and-service.yaml
---
apiVersion: extensions/v1beta1
kind: Ingress
metadata:
name: testlanding
namespace: landingpages
annotations:
kubernetes.io/ingress.class: traefik
traefik.frontend.passHostHeader: "false"
spec:
View keybase.md

Keybase proof

I hereby claim:

  • I am iflowfor8hours on github.
  • I am iflowfor8hours (https://keybase.io/iflowfor8hours) on keybase.
  • I have a public key whose fingerprint is C5C7 1FA8 104A A6D1 1C97 850B 40DA F6FD DF8A AEA5

To claim this, I am signing this object:

View gist:e140d142855ad465b1f6
notify { $app_artifact_name: }
thing::install_app { $app_artifact_name:
config_filename => $app_artifact_name,
}
{
"config_artifact_url": "http://192.168.57.18:8081/nexus/service/local/repositories/goartifacts/content/marketplace/configuration/configuration.zip",
"artifact_repository_base_url": "http://192.168.57.18:8081/nexus/service/local/repositories/goartifacts/content/marketplace",
"app_artifact_name": "webservice",
View gist:5faaf0891f5853f06b34
Over the last week or so the community has been a bit worried about the security of Tor. The reason for this is Operation Onymous that in a concentrated crackdown took down a number of illegal or problematic dark web sites, all of which were hidden behind Tor Hidden Services. In this article I want to quickly talk about whether Tor is broken or not.
First the facts. As far as we know, only 17 persons have been arrested or indicted in this action. The amount of Dark sites taken down were first reported as around 400, but later we have seen that it is more in the range of 27 actual web sites that were taken control of - but many more hidden service addresses, since these sites all presumably ran a large number of hidden services.
The big question is whether it is possible that law enforcement agencies have used a weakness in Tor to find the real location of these servers and taking them down. This is of course not at all impossible. There are some known weaknesses that could have been used for this, althoug
You can’t perform that action at this time.