Skip to content

Instantly share code, notes, and snippets.

View lp1dev's full-sized avatar

Jérémie lp1dev

View GitHub Profile
#!/usr/bin/env python3
"""
SRT Translator using Ollama with conversation context
Translates subtitle files using message history for context
Writes each translated line immediately to the output file
"""
import ollama
import argparse
import re
#!/usr/bin/env bash
MUST_SKIP=false
TEXT=""
OUTPUT_TEXT=""
while read p; do
LEN=${#p}
if [ "$LEN" -eq "0" ];then
echo "Text OK, translating $TEXT"
@lp1dev
lp1dev / netwave_exploit.sh
Created February 4, 2022 13:22
Netwave Cameras - Unauthenticated Credentials Dump Exploit (Including CVE-2018-11653)
#!/bin/bash
## Exploit Title: Netwave
## Google Dork: "Netwave security camera" "Live feed"
## Date: 04/02/2022
## Exploit Author: Jeremie Amsellem <jeremie(a)fenrir.pro>
## Version: No version specified by the vendor
## Tested on: Kali Linux
##
## Written by lp1 <jeremie(a)fenrir.pro>
@lp1dev
lp1dev / gist:3ccd962c54dc1a442cc0d458ae71932c
Created December 13, 2021 10:59
Hades canyon proxmox gpu passthrough

Hades Canyon NUC GPU Passthrough via QEMU/KVM

/etc/defaults/grub

# If you change this file, run 'update-grub' afterwards to update
# /boot/grub/grub.cfg.
# For full documentation of the options in this file, see:
#   info -f grub -n 'Simple configuration'
@lp1dev
lp1dev / send-magic-packet.sh
Last active June 23, 2021 19:42 — forked from SteveMarshall/send-magic-packet.sh
Wake-On-Lan Magic Packet using netcat in bash
#!/usr/bin/env ash
mac_address=$1
# Strip colons from the MAC address
mac_address=$(echo $mac_address | sed 's/://g')
broadcast=$2
port=4343
# Magic packets consist of 12*`f` followed by 16 repetitions of the MAC address
#!/bin/sh
APK=$1
echo "Extracting "$APK
echo "N" | unzip $APK -d "$APK""_extract"
cd "$APK""_extract"
FIREBASE_URL=`grep -oE 'https:\/\/[a-zA-Z0-9\-]+\.firebaseio.com' -a ./resources.arsc`
RESPONSE=`curl "$FIREBASE_URL/.json" 2>/dev/null`
if echo $RESPONSE | grep "Permission denied";then
echo "$FIREBASE_URL: KO"
@lp1dev
lp1dev / clone.py
Created March 23, 2019 14:36
NFC automatic clone script w/ 16x2 LCD
#!/usr/bin/python
import time
import subprocess
import Adafruit_CharLCD as LCD
import gpiozero
# Raspberry Pi pin configuration:
lcd_rs = 26
lcd_en = 19
lcd_d4 = 13
### Keybase proof
I hereby claim:
* I am lp1dev on github.
* I am lp1 (https://keybase.io/lp1) on keybase.
* I have a public key ASBtgPjCGX97xm-1lE9C-jZ5vRArO7xgmZjA84SOyMRlAQo
To claim this, I am signing this object:
# Configuration file for dnsmasq.
#
# Format is one option per line, legal options are the same
# as the long options legal on the command line. See
# "/usr/sbin/dnsmasq --help" or "man 8 dnsmasq" for details.
# Listen on this specific port instead of the standard DNS port
# (53). Setting this to zero completely disables DNS function,
# leaving only DHCP and/or TFTP.
#port=5353
driver=nl80211
auth_algs=1
wpa_key_mgmt=WPA-PSK
ssid=DebugWiFi
channel=1
hw_mode=g
wpa_passphrase=ThisIsObviouslyAPlaceholder
interface=YOUR_INTERFACE_NAME
wpa=1
wpa_pairwise=TKIP