Skip to content

Instantly share code, notes, and snippets.

Matt ragzilla

Block or report user

Report or block ragzilla

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
View nfdump-notifier.py
#! /home/maddison/.virtualenv/nfdump-notifier/bin/python
from ipwhois import IPWhois
from ipwhois.utils import unique_addresses
from pprint import pprint
from struct import unpack, pack
import socket
import select
import sys
import string
View WoW export calendar signups
/run x = CalendarEventGetNumInvites(); for i=1,x do n,l,c,z,v = CalendarEventGetInvite(i); w,o,d,y,h,m = CalendarEventGetInviteResponseTime(i); print(n..','..l..','..c..','..v..','..o*44640+d*1440+h*60+m); end;
@ragzilla
ragzilla / dockingportalignment-applauncher.patch
Created Jul 24, 2014
DockingPortAlignmentIndicator Stock AppLauncher Patch
View dockingportalignment-applauncher.patch
diff --git a/DockingPortAlignment.cs b/DockingPortAlignment.cs
index e9aaa0d..f4a35b6 100644
--- a/DockingPortAlignment.cs
+++ b/DockingPortAlignment.cs
@@ -120,7 +120,8 @@ public class DockingPortAlignment : MonoBehaviour
private static bool toolbarAvailable = false;
private static IButton toolbarButton;
- private static CustomButton customButton;
+ private static ApplicationLauncherButton stockButton;
@ragzilla
ragzilla / pamenable.patch
Created Apr 25, 2014
Enables PAM for enable passwords in tac_plus, allows fallthrough to DEFAULT user for all(?) attributes, importantly login/enable (obviating the need for the PAM default authentication patch), and fixes a minor bug in aceclnt_fn which broke password authentication
View pamenable.patch
diff -rup tacacs+-F4.0.4.27a/aceclnt_fn.c tacacs+-F4.0.4.27a-pamenable/aceclnt_fn.c
--- tacacs+-F4.0.4.27a/aceclnt_fn.c 2012-06-28 18:37:06.000000000 -0400
+++ tacacs+-F4.0.4.27a-pamenable/aceclnt_fn.c 2014-04-25 13:30:03.272400618 -0400
@@ -193,6 +193,7 @@ aceclnt_fn(struct authen_data *data)
return(1);
}
+ data->flags = TAC_PLUS_AUTHEN_FLAG_NOECHO;
snprintf(buf, ACEBUFSZ, "Enter PASSCODE: ");
data->server_msg = tac_strdup(buf);
@ragzilla
ragzilla / bf4stats.py
Last active Dec 27, 2015
quick battlefield 4 stats fetch script
View bf4stats.py
#! /usr/bin/python
from urllib2 import Request, urlopen
from sys import exit, argv
from simplejson import loads
from pprint import pprint
if len(argv) != 2: exit(1)
h = { 'X-AjaxNavigation': '1', 'User-Agent': 'urllib/2.7 - user@email.com', }
@ragzilla
ragzilla / advertise.sh
Created Feb 20, 2013
Basic HA AnyCast DNS Resolver Configs
View advertise.sh
#! /bin/bash
IP=/sbin/ip
GREP=/bin/grep
DIG=/usr/bin/dig
LOOPSTATE=0
DIGSTATE=0
# figure out our current state
You can’t perform that action at this time.