Skip to content

Instantly share code, notes, and snippets.


Block or report user

Report or block mkol5222

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
mkol5222 / Run Visual Studio Code for Linux from
Created Dec 6, 2018 — forked from fedme/Run Visual Studio Code for Linux from
Run Visual Studio Code for Linux from WSL on Windows 10
View Run Visual Studio Code for Linux from

Run Visual Studio Code for Linux from WSL

Thanks a lot to mredbishop and others for their insturctions posted here. This is just a recap of what they figured out.

This process was tested on WSL Ubuntu 18.04.

Install VcXsrv on Windows

  1. Dowload the VcXsrv installer from
  2. Install the software on Windows

Add VS Code repositories

mkol5222 / puckLight.js
Created Nov 15, 2018 — forked from navio/puckLight.js
PuckJS - Light switch
View puckLight.js
const LEDS = [LED1,LED2,LED3];
const onBtnClick =
(fn)=> setWatch(fn, BTN, {edge:"rising", debounce:50, repeat:true});
const turnOn = (el) => {
const turnOff = (el) => {
mkol5222 /
Created Jul 13, 2018 — forked from hfs/
Query NetworkManager via DBUS in Python: Get the SSID of the active wireless connection
#!/usr/bin/env python
import dbus
NM = 'org.freedesktop.NetworkManager'
NMCA = NM + '.Connection.Active'
NMDW = NM + '.Device.Wireless'
NMAP = NM + '.AccessPoint'
DBUS_PROPS = 'org.freedesktop.DBus.Properties'
mkol5222 / dbusnetwatch.go
Created Jul 13, 2018 — forked from wiless/dbusnetwatch.go
Monitor for change of SSID/Connection
View dbusnetwatch.go
package main
import (
// dbus-monitor --system "type='signal',sender='org.freedesktop.NetworkManager',interface='org.freedesktop.NetworkManager'"
mkol5222 /
Created Jul 12, 2018 — forked from davidbradway/
Set Up Docker On Raspberry Pi Raspbian Stretch Lite
./ "${@}" &
timeout 10 bash -c "until </dev/tcp/localhost/3000; do sleep 1; done"
curl -s -H "Content-Type: application/json" \
-XPOST http://admin:admin@localhost:3000/api/datasources \
-d @- <<EOF
"name": "influx",
for dash in $(curl -s -k "${BASEURL}/api/search" | jq -r '.[].title'); do
curl -k "${BASEURL}/api/dashboards/db/${dash}" > "${dash}.json"
mkol5222 / gist:36825d63a8965f3c3de77c2fd3039bf2
Created Sep 5, 2017 — forked from felmoltor/gist:01e732dd1375f96114ed
Automatic malware download from and upload to and
View gist:36825d63a8965f3c3de77c2fd3039bf2
# With this two lines of bash you will donwload the last malware samples extracted from the public lists of
# and you'll submit automatically the alive samples (check if the response was an executable or not) to (contribute to
# the community) and obtain the detection rate of the sample # from Virus Total (
# As a result you'll get a bunch of executable files and their detection rate in the log "output.virustotal.txt"
# Download all the samples detected and listed in the public CSV of
$ curl -s | awk 'BEGIN {FS="\",\""} {print $2}' | strings -n 3 | grep -E "\.exe$|\.so$|\.bin$|\.src$|\.pdf$|\.docx$|\.vb$|\.sh$" | xargs -I% bash -c 'echo "Downloading: %" && curl -s -O %' | tee $(date +%Y%m%d_%H%M)_malware_download.log
# Upload the downloaded samples to and query with it MD5 checksum to obtain the detection ratio
$ ls *_malware_download.log -ltr | tail -n1 | cat $(awk '{pr
You can’t perform that action at this time.