Do not use this guide. The dnscrypt protocol and dnscrypt-proxy configuration file have changed a lot since I wrote this gist. Check the following links for help:
- Install DNSMasq
$ brew install dnsmasq
#!/usr/bin/env python3 | |
# -*- coding: utf-8 -*- | |
# Author: Damien Garaud | |
# Date: 2014-2015 | |
# License: Simplified BSD | |
"""Allow you to pipe command results into an Emacs buffer. Suppose you have an | |
Emacs server since you launch 'emacsclient'. |
#!/bin/bash | |
#no PATH, no way to accidently run any programs | |
PATH='' | |
#useful variables | |
term_height=0 | |
term_width=0 | |
term_scroll_height=0 | |
status_line_row=0 |
#!/usr/bin/env python | |
import pynvim, os, re, sys, time | |
# Get a list of buffers that haven't been deleted. `nvim.buffers` includes | |
# buffers that have had `:bdelete` called on them and aren't in the buffer | |
# list, so we have to filter those out. | |
def get_listed_buffers(nvim): | |
return set(buf.number for buf in nvim.buffers \ | |
if nvim.eval('buflisted(%d)' % buf.number)) |
package main | |
import ( | |
"encoding/json" | |
"fmt" | |
"log" | |
"net/http" | |
"github.com/gorilla/mux" | |
"github.com/jinzhu/gorm" |
This Gist is created in 2014, and it's highliy outdated now, according to one of mitmproxy
's manjor contributor (check his comment below). Thanks for letting us know, @mhils!
Modern applications usually make use of back-end API servers to provide their services. With a non-transparent HTTPs proxy, which intercepts the communication between clients and servers (aka the man-in-the-middle scheme), you can easily manipulate both API requests and responses.
--- src/main.c~ 2012-10-23 12:35:34.000000000 +0900 | |
+++ src/main.c 2012-12-04 18:42:25.000000000 +0900 | |
@@ -2315,6 +2315,7 @@ | |
mch_errmsg("\"\n"); | |
mch_exit(2); | |
} | |
+ setvbuf(scriptout, NULL, _IONBF, 0); | |
break; | |
#ifdef FEAT_GUI_W32 |
#!/bin/bash | |
# btrfs-undelete | |
# Copyright (C) 2013 Jörg Walter <info@syntax-k.de> | |
# This program is free software; you can redistribute it and/or modify it under | |
# the term of the GNU General Public License as published by the Free Software | |
# Foundation; either version 2 of the License, or any later version. | |
if [ ! -b "$1" -o -z "$2" -o -z "$3" ]; then | |
echo "Usage: $0 <dev> <file/dir> <dest>" 1>&2 | |
echo |
------------------------------------------------------------------- | |
--Hammerspoon config to replace Cinch & Size-up (Microsoft Windows style) window management for free | |
--By Jayden Pearse (spartanatreyu) | |
--Sort of messy, forgive me. Never scripted in lua before | |
------------------------------------------------------------------- | |
------------------------------------------------------------------- | |
--Options, feel free to edit these | |
------------------------------------------------------------------- |
##Weechat+Arch Linux+Tor ###A Quick Guide for Anonymous and Pseudonymous irc I'm going to assume you know what irc is, and generally how it works. If you haven't gotten that far watch a youtube video and try out some of the commands on an irc webclient somewhere. On Arch Linux to install Weechat you can run sudo pacman -S weechat or you can download it from the official website at http://weechat.net/download/.
You can also install Tor from the official repositories, but If you are going to be making multiple connections to irc networks and you want to keep your identities seperate, I would recommend installing the Tor Browser Bundle as well. This should be done from the Tor website, and you should check the GnuPG signature on the package before running it. The key they have been using to sign the packages with for the months that I have been verifying it i