Skip to content

Instantly share code, notes, and snippets.

On vacation

林果皞 limkokhole

On vacation
Block or report user

Report or block limkokhole

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
limkokhole / connect.c
Created Aug 3, 2019 — forked from skreuzer/connect.c
Make socket connection using SOCKS4/5 and HTTP tunnel
View connect.c
* connect.c -- Make socket connection using SOCKS4/5 and HTTP tunnel.
* Copyright (c) 2000-2004 Shun-ichi Goto
* Copyright (c) 2002, J. Grant (English Corrections)
* This program is free software; you can redistribute it and/or
* modify it under the terms of the GNU General Public License
* as published by the Free Software Foundation; either version 2
* of the License, or (at your option) any later version.

Detecting similar and identical images using perseptual hashes

Couple of my hobbies are travelling and photography. I love to take pictures and experiment with photography. Usually after my trips, I just copy the photos to either my iPad or couple of my external hard disks. After 10 years, I have over 200K photos distributed across several disks and machines. I had to find a way to organize these photos and create a workflow for future maintenance. In this post I want to address one of the issues I had to solve: ** finding duplicate images **.

First, I needed to find out what exactly is a duplicate image. Analysing my photos, I found couple of interesting things:

  1. Identical images: There were multiple copies of the same photo in different directories with different names.
  2. Similar images: I usually bracket (exposure compensate or flash compensate) important pictures. So I have photos that visually appear to be the same, but may be a little darker/lighter based on e
limkokhole / exec-notify.c
Created Jul 5, 2019 — forked from L-P/exec-notify.c
Watch process creation.
View exec-notify.c
/* exec-notify, so you can watch your acrobat reader or vim executing "bash -c"
* commands ;-)
* Requires some 2.6.x Linux kernel with proc connector enabled.
* $ cc -Wall -ansi -pedantic -std=c99 exec-notify.c
* (C) 2007-2010 Sebastian Krahmer <> original netlink handling
* stolen from an proc-connector example, copyright folows:
limkokhole /
Created Jul 3, 2019 — forked from htp/
Test a WebSocket using curl.
curl --include \
--no-buffer \
--header "Connection: Upgrade" \
--header "Upgrade: websocket" \
--header "Host:" \
--header "Origin:" \
--header "Sec-WebSocket-Key: SGVsbG8sIHdvcmxkIQ==" \
--header "Sec-WebSocket-Version: 13" \
limkokhole /
Created Jul 2, 2019 — forked from alco/
A translation of Python's fnmatch function into C++
#include <string>
#include "regex.h"
* Return a new string with all occurrences of 'from' replaced with 'to'
std::string replace_all(const std::string &str, const char *from, const char *to)
std::string result(str);
limkokhole /
Created Jun 21, 2019 — forked from bbengfort/
Wraps pip freeze -r requirements.txt to provide better comment handling.
#!/usr/bin/env python
# requires
# Creates a requirements.txt file using pip freeze.
# Author: Benjamin Bengfort <>
# Created: Fri Jan 22 08:50:31 2016 -0500
# Copyright (C) 2016
# For license information, see LICENSE.txt
limkokhole /
Created Jun 20, 2019 — forked from leepro/
Human readable bytes conversions
## {{{ (r15)
#!/usr/bin/env python
Bytes-to-human / human-to-bytes converter.
Based on:
Working with Python 2.x and 3.x.
Author: Giampaolo Rodola' <g.rodola [AT] gmail [DOT] com>
License: MIT
limkokhole /
Created Jun 3, 2019 — forked from LiveOverflow/
Blind GQL injection and optimised binary search - A7 ~ Gee cue elle (misc) Google CTF 2017
import requests
import string
import random
import urllib
import time
import base64
from decimal import Decimal
# Blind GQL injection and optimised binary search - A7 ~ Gee cue elle (misc) Google CTF 2017
limkokhole /
Created Jun 3, 2019 — forked from kokjo/
Solution to CRC problem from asis ctf 2017
from pwn import *
s = log.waitfor("Calculating CRC reverse lookup table")
reverse_crc = {crc.crc_32(p16(i)): p16(i) for i in range(2**16)}
e = ELF("./crcme_8416479dcf3a74133080df4f454cd0f76ec9cc8d")
r = process("./crcme_8416479dcf3a74133080df4f454cd0f76ec9cc8d")
View 22 Hacking Sites To Practice Your Hacking Skills
Taken from:
22 Hacking Sites, CTFs and Wargames To Practice Your Hacking Skills
InfoSec skills are in such high demand right now. As the world continues to turn everything into an app and connect even the most basic devices to the internet, the demand is only going to grow, so it’s no surprise everyone wants to learn hacking these days.
However, almost every day I come across a forum post where someone is asking where they should begin to learn hacking or how to practice hacking. I’ve compiled this list of some of the best hacking sites to hopefully be a valuable resource for those wondering how they can build and practice their hacking skill set. I hope you find this list helpful, and if you know of any other quality hacking sites, please let me know in the comments, so I can add them to the list.
1. CTF365
You can’t perform that action at this time.