Skip to content

Instantly share code, notes, and snippets.

View roelds's full-sized avatar
:shipit:
(╯°□°)╯︵ ┻━┻

RoelDS roelds

:shipit:
(╯°□°)╯︵ ┻━┻
  • 23:05 (UTC -05:00)
View GitHub Profile
@roelds
roelds / Python3.py
Created September 16, 2023 06:34
Various Python3 snippets
# hash checksum sha3-224
import sys
import hashlib
if sys.version_info < (3, 6):
import sha3
# initiating the "s" object to use the
# sha3_224 algorithm from the hashlib module.
s = hashlib.sha3_224()
@roelds
roelds / git_sha2.sh
Created September 16, 2023 04:06
Git sha256 in Git 2.42+
# Git 2.42+
mkdir sha256
cd sha256
git init --object-format=sha256
git config extensions.preciousObjects true
git branch -m dev
dd if=/dev/zero bs=$((1024*1024)) count=$((5*1024)) | git hash-object --stdin --literally
# verify result :
dc18ca621300c8d3cfa505a275641ebab00de189859e022a975056882d313e64
@roelds
roelds / Ascii85.ps1
Last active September 16, 2023 06:18
Various Types to Add in PowerShell
# more efficient than base64
$base85lib =
@"
using System;
using System.Text;
using System.IO;
using System.Linq;
namespace BaseN {
/// <summary>
@roelds
roelds / _openssl_keys
Last active September 9, 2023 23:52
Use openssl with ed448 keys, to sign & verify shake256 digests
# will prompt for passphrase on stdin
openssl genpkey -out skey.pem -verbose -pass stdin -aes-256-cbc -algorithm ed448
openssl ec -in skey.pem -pubout -out pub.pem
# create hash
openssl shake256 -xoflen 64 -out dgst thefile
openssl pkeyutl -sign -inkey skey.pem -rawin -in dgst -out dgst.sig
openssl pkeyutl -verify -rawin -inkey pub.pem -pubin -sigfile dgst.sig -in dgst
@roelds
roelds / build_brotli_win.md
Created January 5, 2023 00:30
HowTo Build Brotli Windows
@roelds
roelds / my_time.ps1
Created September 9, 2023 19:32
my timestamp as filename format in Linux & Windows
# my format
get-date -format "yyyy_MM_dd_HH_mm_ss"
# epoch in dec
(Get-Date).ToUniversalTime().Subtract((Get-Date "01/01/1970")).TotalSeconds
# alt format
gcim Win32_LocalTime | select Year,Quarter,Month,WeekInMonth,DayOfWeek | fl
@roelds
roelds / get_latest_release_tagname.sh
Last active September 9, 2023 18:17
Shell - Get latest release tag name from GitLab or GitHub
# for GitHub:
# use this for name:
VERNAME=$(wget -q -O- https://api.github.com/repos/roelds/litaf/releases/latest | jq -r '.name')
# or this for tag name, if jq installed:
VERTAG=$(wget -q -O- https://api.github.com/repos/roelds/litaf/releases/latest | jq -r '.tag_name')
# or if jq not installed:
curl --silent "https://api.github.com/repos/roelds/litaf/releases/latest" | grep -Po "(?<=\"tag_name\": \").*(?=\")"
# latest release tag name, for GitLab:
curl -s https://gitlab.com/gitlab-org/cli/-/releases/permalink/latest | grep -m1 -Eo "releases/[^/]+\"" | awk 'BEGIN { FS="/" } {print $2}' | rev | cut -c2- | rev
@roelds
roelds / oqsprovider_windows.cmd
Last active September 9, 2023 16:43
Use oqsprovider with openssl on Windows
:: put below in your config, usually for Win64 : C:\Program Files\Common Files\SSL\openssl.cnf
[provider_sect]
default = default_sect
oqsprovider = oqsprovider_sect
[default_sect]
activate = 1
[oqsprovider_sect]
activate = 1
@roelds
roelds / asn.sh
Last active September 9, 2023 02:47 — forked from ethack/asn
ASN/IP/Route/hostname CLI lookup tool to map any network to corresponding ASN & prefix
#!/bin/bash
if command -v whois >/dev/null 2>&1 ; then echo "whois ok..." ; else echo "install whois!" && exit ; fi
# verified on latest Ubuntu server cloudimg
############################################################################################################
# ----------------------------------------------------------------------
# ASN/IPv4/Prefix lookup tool. Uses Team Cymru's whois service for data.
# ----------------------------------------------------------------------
# example usage:
# asn <ASnumber> -- to lookup matching ASN data. Supports "as123" and "123" formats (case insensitive)
@roelds
roelds / as_admin.ps1
Created September 9, 2023 00:46
Require or Verify PowerShell Script Run As Admin
#Requires RunAsAdministrator
# put above comment at top of script to prevent running of script if it was not run as admin
# or quietly check for script run as admin:
([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] "Administrator")