- Download script
- Install mqtt-wrapper
pip install mqtt-wrapper
- Open OBS Studio
- In OBS Studio add a script (Tools -> Scripts)
- Configure script parameters (my base channel is homeassistant and my sensor name is obs, creating the path homeassistant/sensor/obs)
#!/usr/bin/fish --private | |
# !!!Security note!!! | |
# This will give any process running as your user access to your password while | |
# key has not expired (2 minutes or revocation by service, whatever comes first) | |
# Proper solution would probably be writing PAM module and transfering key | |
# straight to KeePassXC's own keyring | |
set userid (/usr/bin/id -u "$PAM_USER") | |
if test "$PAM_TYPE" = 'auth' |
# Stick this in your home directory and point your Global Git config at it by running: | |
# | |
# $ git config --global core.attributesfile ~/.gitattributes | |
# | |
# See https://tekin.co.uk/2020/10/better-git-diff-output-for-ruby-python-elixir-and-more for more details | |
*.c diff=cpp | |
*.h diff=cpp | |
*.c++ diff=cpp | |
*.h++ diff=cpp |
#!/sbin/openrc-run | |
command="/root/bin/pia-wg.sh" | |
CONFIGDIR="${CONFIGDIR:-/var/cache/pia-wg}" | |
CONFIG="${CONFIG:-/etc/pia-wg/pia-wg.conf}" | |
extra_started_commands="reload" | |
depend() { |
/* | |
* MIT License | |
* | |
* Copyright (c) 2023-2024 Fabio Lima | |
* | |
* Permission is hereby granted, free of charge, to any person obtaining a copy | |
* of this software and associated documentation files (the "Software"), to deal | |
* in the Software without restriction, including without limitation the rights | |
* to use, copy, modify, merge, publish, distribute, sublicense, and/or sell | |
* copies of the Software, and to permit persons to whom the Software is |
This is a collection of the things I believe about software development. I have worked for years building backend and data processing systems, so read the below within that context.
Agree? Disagree? Feel free to let me know at @JanStette. See also my blog at www.janvsmachine.net.
Keep it simple, stupid. You ain't gonna need it.
You will not detect APTs with this but you will weed out low hanging fruit and not too savvy pentesters :)
user_agent IN ("burp" "burpcollaborator.net" "qualys" "nexpose" "OpenVAS" "Nikto" "Meterpreter" "IceWeasel" "DirB" "Comodo" "Tripwire" "Retina" "MBSA" "ImmuniWeb" "Netsparker" "Acunetix" "Intruder" "WinHttp.WinHttpRequest" "nmap" "CVE" "base64" "eval" "ftp" "/script" "javascript" "alert" ) NOT (user_agent="google") | eval detection_description=if(like(user_agent,"%WinHttpRequest%"),"CScript or VBScript Call",detection_description) | eval detection_description=if(like(user_agent,"%Iceweasel%"),"Potentially Kali",detection_description) | eval detection_description=if(like(user_agent,"%Meterpreter%"),"Meterpreter",detection_description)
Note: This gist may be outdated, thanks to all contributors in comments.
adb
is the Android CLI tool with which you can interact with your android device, from your PC
You must enable developer mode (tap 7 times on the build version in parameters) and install adb on your PC.
Don't hesitate to read comments, there is useful tips, thanks guys for this !
query GetCurrentStaus { | |
viewer { | |
login | |
status { | |
emoji | |
message | |
} | |
} | |
} |