Skip to content

Instantly share code, notes, and snippets.

View mluis's full-sized avatar
🖖
SYN ACK

Miguel Luís mluis

🖖
SYN ACK
View GitHub Profile
@mluis
mluis / howto_create_online_radio_macos_sierra.txt
Created June 16, 2019 00:03 — forked from dmpanch/howto_create_online_radio_macos_sierra.txt
How to create internet radio on MacOS Sierra 10.12
All actions are performed in Terminal.app.
1. Install Homebrew http://brew.sh/
2. Install Jack (route audio tool) http://jackaudio.org/. Current stable version from official website doesn't work with
MacOS Sierra (I use 10.12.3) so you need to download beta version from there https://yadi.sk/d/JwT10b7v3Dm5yy.
After installing reboot your computer.
3. Install Darkice (audio streamer) via brew.
@mluis
mluis / _etc_systemd_system_kodi.service
Last active November 23, 2018 00:18
RPi Kodi Media Center
[Unit]
Description = Kodi Media Center
After = systemd-user-sessions.service network.target sound.target
[Service]
User = kodi
Group = kodi
Type = simple
ExecStart = /usr/bin/kodi-standalone
Restart = always
@mluis
mluis / Blockstack
Created December 4, 2017 16:09
Blockstack
Verifying my Blockstack ID is secured with the address 1AULu6c7NwWkYGatJQLf3CSBjncE3jPHBp https://explorer.blockstack.org/address/1AULu6c7NwWkYGatJQLf3CSBjncE3jPHBp
@mluis
mluis / SimpleAuthServer.py
Created December 3, 2017 17:58 — forked from fxsjy/SimpleAuthServer.py
SimpleAuthServer: A SimpleHTTPServer with authentication
import BaseHTTPServer
from SimpleHTTPServer import SimpleHTTPRequestHandler
import sys
import base64
key = ""
class AuthHandler(SimpleHTTPRequestHandler):
''' Main class to present webpages and authentication. '''
def do_HEAD(self):
@mluis
mluis / keybase.md
Created November 23, 2017 15:23
keybase.md

Keybase proof

I hereby claim:

  • I am mluis on github.
  • I am mluis (https://keybase.io/mluis) on keybase.
  • I have a public key ASDCdeoMxaYIDuuvjoiuD170KfADgkxNtqDFBVzfcQB3dgo

To claim this, I am signing this object:

@mluis
mluis / GifJS.asm
Created November 9, 2017 14:11 — forked from cmbaughman/GifJS.asm
How to execute JavaScript from a GIF!
; a hand-made GIF containing valid JavaScript code
; abusing header to start a JavaScript comment
; inspired by Saumil Shah's Deadly Pixels presentation
; Ange Albertini, BSD Licence 2013
; yamal gifjs.asm -o img.gif
WIDTH equ 10799 ; equivalent to 2f2a, which is '/*' in ASCII, thus starting an opening comment
@mluis
mluis / share-osx-xquartz.sh
Created October 5, 2017 18:47
share osx XQuartz
brew cask install xquartz
open -a XQuartz
# In the XQuartz preferences, go to the “Security” tab and make sure you’ve got “Allow connections from network clients”
iface="en1" #Wifi
ip=$(ifconfig $iface | grep inet | awk '$1=="inet" {print $2}')
xhost + $ip
docker run -d --name firefox -e DISPLAY=$ip:0 -v /tmp/.X11-unix:/tmp/.X11-unix jess/firefox
@mluis
mluis / share-screen-osx-docker.sh
Last active October 5, 2017 18:55
Share screen between OSX and Docker
#!/usr/bin/env bash
brew install socat xquartz && open -a XQuartz
socat TCP-LISTEN:6000,reuseaddr,fork UNIX-CLIENT:\"$DISPLAY\" &
display_number=`ps -ef | grep "Xquartz :\d" | grep -v xinit | awk '{ print $9; }'`
ip=$(ifconfig en0 | grep inet | awk '$1=="inet" {print $2}')
# eg. docker ... -e DISPLAY=$ip$display_number -it <container> bash
@mluis
mluis / Dockerfile-recovery.sh
Created October 5, 2017 13:52
Script to recover Dockerfile from Docker image
#!/usr/bin/env sh
# (run)$ ./Dockerfile-recovery.sh <IMAGE ID>
docker history --no-trunc "$1" | sed -n -e 's,.*/bin/sh -c #(nop) \(MAINTAINER .*[^ ]\) *0 B,\1,p' | head -1
docker inspect --format='{{range $e := .Config.Env}}
ENV {{$e}}
{{end}}{{range $e,$v := .Config.ExposedPorts}}
EXPOSE {{$e}}
@mluis
mluis / osx-for-pentesting.sh
Created September 23, 2017 13:35 — forked from gabemarshall/osx-for-pentesting.sh
A fork of osx-for-hackers for my personal pentesting setup preferences
# OSX for Pentesting (Mavericks/Yosemite)
#
# A fork of OSX for Hackers (Original Source: https://gist.github.com/brandonb927/3195465)
#!/bin/sh
# Ask for the administrator password upfront
echo "Have you read through the script prior to running this? (y or n)"
read bcareful