View video-player.js
function getIP(json) { | |
console.log("Your public IP address is: ", json.ip); | |
}; | |
var script = document.createElement('script'); | |
script.async = true; | |
script.src = "https://api.ipify.org?format=jsonp&callback=getIP"; | |
document.head.appendChild(script); | |
(function() { | |
stream = (url) => { |
View auto-remove-sublime3-license-popup.py
#! /usr/bin/env python2 | |
# -*- coding: utf-8 -*- | |
# forked from egel/auto-remove-sublime-license-popup | |
# https://gist.github.com/egel/b7beba6f962110596660 | |
from commands import getoutput as cl | |
from threading import Event, Thread | |
from sublime_plugin import EventListener |
View json_ip-app.py
#! /usr/bin/env python | |
from flask import Flask, jsonify, request | |
app = Flask(__name__) | |
@app.route("/.json", methods=["GET"]) | |
def remote_ip(): | |
try: |
View chk_iptables_rules.perl
#!/usr/bin/perl | |
use strict; | |
use warnings; | |
my @types = qw/nat mangle filter/; | |
$SIG{INT} = sub{print "\e[?25h\e[u"; exit}; | |
print "\e[40;37m\e[2J\e[?25l"; | |
while (1) { | |
print "\e[0;0H"; | |
my %output = map {$_ => scalar `iptables -t $_ -L -v -Z`} @types; | |
foreach my $type (@types) { |
View fsu.php
<?php | |
/* | |
FuckShitUp Multi Vulnerabilities Scanner 0.1 | |
MultiBrtuer requirements (php5): | |
php5-mysql - for mysql connections | |
php5-pgsql - for postgresql connections | |
libssh2-php - for ssh connections |