Skip to content

Instantly share code, notes, and snippets.

View lukasklein's full-sized avatar
👀
Facebook is it you?

Lukas Klein lukasklein

👀
Facebook is it you?
View GitHub Profile
@lukasklein
lukasklein / output
Created April 23, 2015 16:53
PHP can't handle Moscow Time
+02:00 # Correct
+04:00 # Wrong, it has been set to UTC+3 permanently on 26 October 2014: http://sputniknews.com/russia/20141026/194606015.html
{
"page": 1,
"limit": 50,
"explicit": false,
"total": 16,
"has_more": false,
"list": [{
"id": "music",
"name": "Music",
"description": "Watch music videos, concerts, and interviews from artists in every genre, from hip-hop and rock to indie and electro. Live performances, news and exclusives."
from datetime import datetime
LINES = [
'ITLISBFAMPM',
'ACQUARTERDC',
'TWENTYFIVE<X',
'HALFBTEN<FTO',
'PASTERUNINE',
'ONESIXTHREE',
'FOURFIVE>TWO',
from django.forms.widgets import Input
class NumberInput(Input):
input_type = 'number'
alias subl="'/Applications/Sublime Text 2.app/Contents/SharedSupport/bin/subl'"
alias nano="subl"
export EDITOR="subl"
export CLICOLOR=1
export LSCOLORS=GxFxCxDxBxegedabagaced
export WORKON_HOME=$HOME/.virtualenvs
export PROJECT_HOME=$HOME/Projects/productgang
source /usr/local/bin/virtualenvwrapper.sh
import random
from sbox import FakeBinary
class IP:
def __init__(self):
self.ip = [
58,50,42,34,26,18,10,2,
60,52,44,36,28,20,12,4,
62,54,46,38,30,22,14,6,
@lukasklein
lukasklein / otp.php
Created November 4, 2012 16:01
One Time Pad PHP
<?php
function otp($text, $key) {
$text_chunks = explode(' ', $text);
$key_chunks = explode(' ', $key);
for($i = 0; $i < count($text_chunks); $i++) {
echo chr(hexdec($text_chunks[$i]) ^ hexdec($key_chunks[$i]));
}
}
otp('1C 07 7F 6F A7 86 A6 E9 E5 75 78 A9 73 B9 17 2F D6 00 25 9F B4 86 16 07 4D 07 0F 98 0F AB 0F 6C 11 10 0F 34 21 FD 2D 69 B3 0D 7F 21 96 3C', '4F 4E 3A 4F F4 C5 EE A0 A0 26 2B EC 3D 99 53 66 93 20 67 CD FD C3 50 54 0E 4F 4E DE 5B EE 41 4C 55 45 5D 77 69 DD 68 20 FD 2D 2D 6E DE 6E');
@lukasklein
lukasklein / gist:4011593
Created November 4, 2012 11:59
One Time Pad Decryption
def decrypt(crypted, key):
plaintext = ''
chars = crypted.split(' ')
keys = key.split(' ')
if len(chars) != len(keys):
raise ValueError
plaintext = ''.join([chr(int(char, 16) ^ int(key, 16)) for char, key in zip(chars, keys)])
return plaintext
import math
def find_inverse(a, mod): # uses the euklid algorithm to calculate the
# modular inverse of a mod mod
original_mod, before_mod = mod, mod
qs = []
while mod != 0:
if mod != before_mod: # skip 1st run
qs.insert(0, int(math.floor(a / mod))) # prepend rather than
BLUWXTSBMSBZVXUWZMSRWLUAZMUXZKNARSZMNHBWWRABZMA
AKTVWSRALRAYUWTVYLRQVKTZYLTWYJMZQRYLMGAVVQZAYLZ
ZJSUVRQZKQZXTVSUXKQPUJSYXKSVXILYPQXKLFZUUPYZXKY
YIRTUQPYJPYWSURTWJPOTIRXWJRUWHKXOPWJKEYTTOXYWJX
XHQSTPOXIOXVRTQSVIONSHQWVIQTVGJWNOVIJDXSSNWXVIW
WGPRSONWHNWUQSPRUHNMRGPVUHPSUFIVMNUHICWRRMVWUHV
VFOQRNMVGMVTPROQTGMLQFOUTGORTEHULMTGHBVQQLUVTGU
UENPQMLUFLUSOQNPSFLKPENTSFNQSDGTKLSFGAUPPKTUSFT
TDMOPLKTEKTRNPMOREKJODMSREMPRCFSJKREFZTOOJSTRES
SCLNOKJSDJSQMOLNQDJINCLRQDLOQBERIJQDEYSNNIRSQDR