Skip to content

Instantly share code, notes, and snippets.

View numberwhun's full-sized avatar

Jefferson Kirkland numberwhun

View GitHub Profile
@numberwhun
numberwhun / .gitattributes
Created October 20, 2020 03:50 — forked from tekin/.gitattributes
An example .gitattributes file that will configure custom hunk header patterns for some common languages and file formats. Raw
*.c diff=cpp
*.h diff=cpp
*.c++ diff=cpp
*.h++ diff=cpp
*.cpp diff=cpp
*.hpp diff=cpp
*.cc diff=cpp
*.hh diff=cpp
*.cs diff=csharp
*.css diff=css
def extract_values(obj, key):
"""Recursively pull values of specified key from nested JSON."""
arr = []
def extract(obj, arr, key):
"""Return all matching values in an object."""
if isinstance(obj, dict):
for k, v in obj.items():
if isinstance(v, (dict, list)):
extract(v, arr, key)

Download Audio from YouTube

-i - ignore errors

-c - continue

-t - use video title as file name

--extract-audio - extract audio track

@numberwhun
numberwhun / Virtual Box Host Only Static IP.md
Created March 24, 2017 18:35 — forked from pjdietz/Virtual Box Host Only Static IP.md
VirtualBox Host-Only Adapter with Static IP

VirtualBox Host-Only Static IP

My typical setup for a development box in VirtualBox uses two NICs. The first uses NAT to allow the box to communicate with the outside world through my host computer’s network connection. (NAT is the default, so shouldn't require any setup.) The second is a "host-only" connection that allows my host and guest to interact.

To create a host-only connection in VirtualBox, start by opening the preferences in VirtualBox. Go to the "Network" tab, and addd a Host-only Network. Modify the host-only network, and disable DHCP. Make a note of the IP address. (Feel free to set the IP address as well, if you like.)

Next, assign this host-only adapter to the virtual machine. Select the VM and press "Settings". Go to the "Network" tab, and select "Adpater 2". Enable the adapter, set it to a "Host-only Adapter", and select the adpater you created above.

Temporary

@numberwhun
numberwhun / dataset_analysis_advice
Created November 18, 2016 13:30
dataset_analysis_advice
From: http://www.unofficialgoogledatascience.com/2016/10/practical-advice-for-analysis-of-large.html
Practical advice for analysis of large, complex data sets
By Amir Najmi - October 31, 2016
By PATRICK RILEY
For a number of years, I led the data science team for Google Search logs. We were often asked to make sense of confusing results, measure new phenomena from logged behavior, validate analyses done by others, and interpret metrics of user behavior. Some people seemed to be naturally good at doing this kind of high quality data analysis. These engineers and analysts were often described as “careful” and “methodical”. But what do those adjectives actually mean? What actions earn you these labels?
To answer those questions, I put together a document shared Google-wide which I optimistically and simply titled “Good Data Analysis.” To my surprise, this document has been read more than anything else I’ve done at Google over the last eleven years. Even four years after the last major update, I find that
@numberwhun
numberwhun / osi_model
Created November 16, 2016 00:04
osi_model
What is OSI model?
The OSI model (Open System Interconnection) model defines a computer networking framework to implement protocols in seven layers. A protocol in the networking terms is a kind of negotiation and rule in between two networking entities.
Layers of OSI model:
Physical layer
The Physical layer is also called as the Layer 1. Here are the basic functionalities of the Physical layer:
Responsible for electrical signals, light signal, radio signals etc.
Hardware layer of the OSI layer
@numberwhun
numberwhun / caesar-cipher.sh
Created November 15, 2016 18:24 — forked from IQAndreas/caesar-cipher.sh
A really simple Caesar Cipher in Bash (or Shell) using `tr`, can also easily be adjusted to encrypt/decrypt ROT13 instead.
# Caesar cipher encoding
echo "THE QUICK BROWN FOX JUMPS OVER THE LAZY DOG" | tr '[A-Z]' '[X-ZA-W]'
# output: QEB NRFZH YOLTK CLU GRJMP LSBO QEB IXWV ALD
# Caesar cipher decoding
echo "QEB NRFZH YOLTK CLU GRJMP LSBO QEB IXWV ALD" | tr '[X-ZA-W]' '[A-Z]'
# output: THE QUICK BROWN FOX JUMPS OVER THE LAZY DOG
# Can also be adjusted to ROT13 instead
@numberwhun
numberwhun / OpenSSH Config File Examples
Created October 17, 2016 00:40
OpenSSH Config File Examples
Taken from: http://www.cyberciti.biz/faq/create-ssh-config-file-on-linux-unix/
System-wide SSH client configuration files
/etc/ssh/ssh_config : This files set the default configuration for all users of OpenSSH clients on that desktop/laptop and it must be readable by all users on the system.
User-specific SSH client configuration files
~/.ssh/config or $HOME/.ssh/config : This is user’s own configuration file which, overrides the settings in the global client configuration file, /etc/ssh/ssh_config.
~/.ssh/config file rules
@numberwhun
numberwhun / Virtual Environments Guide
Created October 4, 2016 18:07
Virtual Environments Guide
Borrowed from: http://docs.python-guide.org/en/latest/dev/virtualenvs/
------------------------------------
Virtual Environments
A Virtual Environment is a tool to keep the dependencies required by different projects in separate places, by creating virtual Python environments for them. It solves the “Project X depends on version 1.x but, Project Y needs 4.x” dilemma, and keeps your global site-packages directory clean and manageable.
For example, you can work on a project which requires Django 1.3 while also maintaining a project which requires Django 1.0.
virtualenv
virtualenv is a tool to create isolated Python environments. virtualenv creates a folder which contains all the necessary executables to use the packages that a Python project would need.
@numberwhun
numberwhun / Top 10 vulnerability scanners for hackers to find flaws, holes and bugs
Created July 18, 2016 02:44
Top 10 vulnerability scanners for hackers to find flaws, holes and bugs
Top 10 vulnerability scanners for hackers to find flaws, holes and bugs
Hacking is an art of finding bugs and flaws in a perfect software which will allow cyber criminals to exploit it for their own malicious gains. Hackers are mostly able to spot the flaws and bugs on their own but sometimes it is worthwhile to use a automated software to find these bugs and holes. A vulnerability scanner is such a automated software which has specifically been written to find such flaw.
Vulnerability Scanner is a specialised software build with a sole purpose of helping security researchers, hackers, system admins and developers to find faults in a particular software, computer system, network and servers. A hacker or security researcher is complemented in his manual testing of software or computer by using such vulnerability scanner making the hackers assessment efficient.
This article brings out such top 10 vulnerability scanner tools available to help hackers and security researchers in their security testing mission.