Skip to content

Instantly share code, notes, and snippets.

#! /bin/bash
set -euo pipefail
# This script will remove automatic association for all networks not listed in the whitelist
# passed as the first argument. Passwords will NOT be removed from the Keychain.
#
# Alternatively, you can untick "Remember networks" in Network Preferences > Wi-Fi > Advanced,
# but then you won't be able to auto-join networks even temporarily, and you might already
# have a long list to go through.
#
@v1m
v1m / documentation-tips.md
Last active January 14, 2020 02:51
Document that 0-day vulnerability you are debugging

Hey vulnerability-researcher,

Here are some tips for documenting the reversing work you are doing.

` version 1 Jan 19, 2016.

version 2 Feb 23, 2016. `

@paragonie-scott
paragonie-scott / crypto-wrong-answers.md
Last active April 21, 2024 23:48
An Open Letter to Developers Everywhere (About Cryptography)
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
<plist version="1.0">
<array>
<dict>
<key>shortcut</key>
<string>:smile:</string>
<key>phrase</key>
<string>😄</string>
</dict>
@yann2192
yann2192 / hardening_usbarmory.md
Last active November 22, 2023 11:36
Hardening USB Armory

Hardening the USB Armory

As a good crypto nerd, I usually use an entirely encrypted linux FS: / but also /boot using grub LUKS support. It's a good setup but it's not perfect, the BIOS and the bootloader are not protected.

I recently got a USBArmory and I wanted to apply the same (or a better) setup.

I found some useful links but no clear howto. So this is my setup.

@atcuno
atcuno / gist:3425484ac5cce5298932
Last active March 25, 2024 13:55
HowTo: Privacy & Security Conscious Browsing

The purpose of this document is to make recommendations on how to browse in a privacy and security conscious manner. This information is compiled from a number of sources, which are referenced throughout the document, as well as my own experiences with the described technologies.

I welcome contributions and comments on the information contained. Please see the How to Contribute section for information on contributing your own knowledge.

Table of Contents

@bnagy
bnagy / gpgmutt.md
Last active June 14, 2024 16:56
Mutt, Gmail and GPG

GPG / Mutt / Gmail

About

This is a collection of snippets, not a comprehensive guide. I suggest you start with Operational PGP.

Here is an incomplete list of things that are different from other approaches:

  • I don't use keyservers. Ever.
  • Yes, I use Gmail instead of some bespoke hipster freedom service
@thebestsophist
thebestsophist / styleguide.md
Last active December 30, 2016 15:07
A style guide for digital scholarship. Comments are in {!-- Curly brackets with comment markings --}

{!-- The style guide is meant to be more than a reference for practical advice, stylistic rules, and examples of good practice. I am also trying to present an argument for the importance of digital scholarship in the form of apps, dissertations, webapps, and blogs. While aimed mostly at writing, I think it will eventually expand to include videos, audio, presentation slides, and such (oh my goodness, academics seriously need help with their slides).

The hard part is finding the right balance of argument and advice. It will presented as a website with its design/layout as an example template. It’s intended to be extremely opinionated, but modular, so others can pick pieces they wish to use as a foundation for their own style guides. (This is sort of a precursor to a modular pattern library for assembling style guides I’ve been wanting to build for content strategy work.)

I haven’t put in many of the citations and annotations, but they’re currently in {curly brackets}. --}

The essence of writing for digital

@timhops
timhops / 1_Intro.md
Last active February 27, 2022 23:01
Social Media Strategy

#Social Media Strategy

##About the Project

This was inspired by the Tiny Content Framework that focuses on “goals, messages, and branding.”

The Social Media Strategy collection is aimed at helping companies get started in planning their approach to social media. This is a bit of a template, and sprinkled with examples in each category. It should be a good starting point before a business dives head-first into whatever fancy social media outlet may be hot at the moment. (Tip: Find out what medium/outlet is best suited for your audiences before blindly signing up for accounts for whatever is the most popular at the moment. We used to think MySpace was going to rule the Earth for a while, until it faded into the background and gave way to Twitter, Facebook and the rest of the photo-sharing ones.)

##Contribute

@robinsloan
robinsloan / langoliers.rb
Last active April 7, 2024 13:22
The Langoliers, a tweet deletion script
require "rubygems"
require "twitter"
require "json"
# things you must configure
TWITTER_USER = "your_username"
MAX_AGE_IN_DAYS = 1 # anything older than this is deleted
# get these from dev.twitter.com
CONSUMER_KEY = "your_consumer_key"