Skip to content

Instantly share code, notes, and snippets.

Avatar

[sCRiPTz-TEAM] scriptzteam

View GitHub Profile
@godofgrunts
godofgrunts / rip-dvd-to-iso.zsh
Created Mar 21, 2019
Zsh file for ripping DVDs to isos for backup
View rip-dvd-to-iso.zsh
#!/bin/zsh
#Copyright 2019 Ryan 'GodofGrunts' Whited
#Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
#The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
#THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
@AlexanderProd
AlexanderProd / backblaze b2 backup script
Last active Aug 19, 2019 — forked from scottlinux/backblaze b2 backup script
Backup script for backblaze working with backlaze b2 command line tool
View backblaze b2 backup script
#!/usr/bin/env bash
#
# Backup selected directories to a Backblaze B2 bucket
#
# If youre encountering errors running the script you probably need Bash 4.0
#
# You need to login to your b2 account once with b2 authorize-account [<accountId>] [<applicationKey>] before running it.
#
# Example daily cron running script.sh in home directory:
# @daily /usr/local/bin/bash ~/script.sh
@pyroscope
pyroscope / commands-new-in-v097.txt
Last active Jun 17, 2018
New commands in rTorrent v0.9.7
View commands-new-in-v097.txt
d.is_meta
directory.watch.added
group.seeding.ratio.max
group.seeding.ratio.max.set
group.seeding.ratio.min
group.seeding.ratio.min.set
group.seeding.ratio.upload
group.seeding.ratio.upload.set
group.seeding.view
group.seeding.view.set
@onedr0p
onedr0p / transmission-gc.sh
Last active Mar 19, 2021
Transmission Garbage Collector
View transmission-gc.sh
#!/bin/sh
#
# INFO
#
# This works if sonarr and radarr are set up to have a Category of sonarr and radarr respectively
# If you are using other Categories to save your automated downloads, update the script where you see:
# "radarr"|"sonarr")
# This script will not touch anything outside those Categories
@donaldsteele
donaldsteele / bootstrap.sh
Created Jan 18, 2018
Install magneticod go-rewrite on a brand new scaleway ubuntu 16.04 instance
View bootstrap.sh
####
# Install magneticod go-rewrite on a brand new scaleway ubuntu 16.04 instance
####
apt-get update && apt-get -y upgrade
apt-get install -y software-properties-common python-software-properties git trickle
add-apt-repository ppa:gophers/archive
apt update
apt-get -y install golang-1.9-go
mkdir -p $HOME/go/src
cd $HOME/go/src
View NetLimiter Serial
NetLimiter 3
Registration name: Peter Raheli
Registration code: C99A2-QSSUD-2CSBG-TSRPN-A2BEB
NetLimiter 4
Registration Name: Vladimir Putin #2
Registration Code: XLEVD-PNASB-6A3BD-Z72GJ-SPAH7
https://www.netlimiter.com/download
# Netlimiter Full Netlimiter Activated Netlimiter cracked Netlimiter Full Version Netlimiter Serial Netlimiter keygen Netlimiter crack Netlimiter 4 serial Netlimiter 4 Crack Netlimiter 4 register Netlimiter 4 patch Netlimiter full Full version Netlimiter 4 Activated Netlimiter 4 Cracked Netlimiter Pro
View Wannacrypt0r-FACTSHEET.md

WannaCry|WannaDecrypt0r NSA-Cyberweapon-Powered Ransomware Worm

  • Virus Name: WannaCrypt, WannaCry, WanaCrypt0r, WCrypt, WCRY
  • Vector: All Windows versions before Windows 10 are vulnerable if not patched for MS-17-010. It uses EternalBlue MS17-010 to propagate.
  • Ransom: between $300 to $600. There is code to 'rm' (delete) files in the virus. Seems to reset if the virus crashes.
  • Backdooring: The worm loops through every RDP session on a system to run the ransomware as that user. It also installs the DOUBLEPULSAR backdoor. It corrupts shadow volumes to make recovery harder. (source: malwarebytes)
  • Kill switch: If the website www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com is up the virus exits instead of infecting the host. (source: malwarebytes). This domain has been sinkholed, stopping the spread of the worm. Will not work if proxied (source).

update: A minor variant of the viru

View rbtc-censorship.md

r/btc markets itself as a "censorship-free" sub. In reality it attempts to silence the voices of people it disagrees with.

A few screenshot examples of censorship https://imgur.com/a/rHrtC

this article was deleted when posted, which describes how the mods of r/btc are roger ver's employees at bitcoin.com https://medium.com/@WhalePanda/the-curious-relation-between-bitcoin-com-anti-segwit-propaganda-26c877249976#.4mfo9qn3e

"Exploit code for the recent BTU attack - apparently this was posted to /r/btc, and of course, got censored. :)"

@JburkeRSAC
JburkeRSAC / bitcoin_decode.php
Created Nov 2, 2016
decode bitcoin OP_RETURN
View bitcoin_decode.php
<?php
$transaction_id = $argv[1];
$url = "https://blockchain.info/tx/$transaction_id?show_adv=true&format=json";
$result = file_get_contents($url);
$resultJSON = json_decode($result, true);
function hex2str($hex) {
$str = '';
for($i=0;$i<strlen($hex);$i+=2) $str .= chr(hexdec(substr($hex,$i,2)));
return $str;
}
@JburkeRSAC
JburkeRSAC / bitcoin_decode.py
Created Nov 1, 2016
decode bitcoin OP_RETURN
View bitcoin_decode.py
import sys
import pycurl
import struct
from binascii import unhexlify, crc32
import urllib2
transaction = str(sys.argv[1])
data = urllib2.urlopen("https://blockchain.info/tx/"+transaction+"?show_adv=true")
dataout = b''
atoutput = False
for line in data: