Skip to content

Instantly share code, notes, and snippets.

Avatar
🎯
Focusing

neuthral neuthral

🎯
Focusing
  • finland
View GitHub Profile
@neuthral
neuthral / trackers_loop.sh
Last active Aug 8, 2022
loop through list of tracker urls and see if they are alive with NetCat
View trackers_loop.sh
#!/bin/bash
#from https://stackoverflow.com/a/6174447
#
# extract the protocol
#proto="$(echo $1 | grep :// | sed -e's,^\(.*://\).*,\1,g')"
# remove the protocol
#url="$(echo ${1/$proto/})"
# extract the user (if any)
#user="$(echo $url | grep @ | cut -d@ -f1)"
@neuthral
neuthral / encpass.sh
Created Aug 7, 2022
for using in plain text passwords
View encpass.sh
#!/bin/sh
################################################################################
# Copyright (c) 2020 Plyint, LLC <contact@plyint.com>. All Rights Reserved.
# This file is licensed under the MIT License (MIT).
# Please see LICENSE.txt for more information.
#
# DESCRIPTION:
# This script allows a user to encrypt a password (or any other secret) at
# runtime and then use it, decrypted, within a script. This prevents shoulder
# surfing passwords and avoids storing the password in plain text, which could
View tty_colors.sh
echo -en "\e]P0232323" #black
echo -en "\e]P8882B99" #darkgrey
echo -en "\e]P1D75F5F" #darkred
echo -en "\e]P9E33636" #red
echo -en "\e]P287AF5F" #darkgreen
echo -en "\e]PA98E34D" #green
echo -en "\e]P3D7AF87" #brown
echo -en "\e]PBFFD75F" #yellow
echo -en "\e]P48787AF" #darkblue
echo -en "\e]PC7373C9" #blue
View docker_keybase_cli.sh
#!/bin/sh
image_name="keybaseio/client:latest"
contname="keybase"
nodename="--hostname=${contname}"
runname="--name=${contname}"
run_rm="--rm=true"
# build_rm="--force-rm=true"
ports=""
volumes="-v ~/.keybase:/home/keybase/.config/keybase"
with_tty="--tty"
View mpv.conf
# ~/.config/mpv/mpv.conf
#The default profile which sets some recommended settings
profile=gpu-hq
#The called API
#Use "opengl" if you have compatibility issues
gpu-api=vulkan
vo=gpu #tct
#Decoding API for 8bit h264 (or whatever your CPU supports) content
#Only should be used when you get many frame drops
@neuthral
neuthral / oh-my-plugins.md
Created Aug 7, 2022
fresh install of linux oh my zsh & plugins
View oh-my-plugins.md

Oh my zsh.

Install with curl

sh -c "$(curl -fsSL https://raw.githubusercontent.com/robbyrussell/oh-my-zsh/master/tools/install.sh)"

Enabling Plugins (zsh-autosuggestions & zsh-syntax-highlighting)

  • Download zsh-autosuggestions by
@neuthral
neuthral / nc_udp.md
Created Aug 7, 2022
NetCat test UDP ports
View nc_udp.md

To test if udp port is responding, use netcat.

An example from the man page:

nc -v -u -z -w 3 example.host 20-30

Send UDP packets to ports 20-30 of example.host, and report which ones did not respond with an ICMP packet after three seconds. Of course, if a firewall is DROPing, which is normally the case when dealing with internet-faced gateways, you won't receive an ICMP response.

View newTrackon.list
udp://p4p.arenabg.com:1337/announce
udp://explodie.org:6969/announce
http://tracker1.itzmx.com:8080/announce
udp://tracker.birkenwald.de:6969/announce
udp://tracker.moeking.me:6969/announce
http://tracker.bt4g.com:2095/announce
udp://tracker.beeimg.com:6969/announce
udp://opentracker.i2p.rocks:6969/announce
http://open.acgnxtracker.com:80/announce
udp://fe.dealclub.de:6969/announce
View ipfs-public_gateways.json
[
"https://ipfs.io/ipfs/:hash",
"https://:hash.ipfs.dweb.link",
"https://gateway.ipfs.io/ipfs/:hash",
"https://ipfs.infura.io/ipfs/:hash",
"https://ninetailed.ninja/ipfs/:hash",
"https://ipfs.globalupload.io/:hash",
"https://10.via0.com/ipfs/:hash",
"https://ipfs.eternum.io/ipfs/:hash",
"https://hardbin.com/ipfs/:hash",
View keybase.md

Keybase proof

I hereby claim:

  • I am neuthral on github.
  • I am greenlion (https://keybase.io/greenlion) on keybase.
  • I have a public key ASBxkjeTDfLFboh9h35hqNAYxfJepggbh59TYgHuFc23Nwo

To claim this, I am signing this object: