Skip to content

Instantly share code, notes, and snippets.

Avatar

Tim Weber scy

View GitHub Profile
@scy
scy / speedlog.sh
Last active Mar 19, 2020
Log Speedtest.net results to IoTPlotter
View speedlog.sh
#!/bin/sh
# Requires the (official) Speedtest CLI app available at ./speedtest
# Get it at <https://www.speedtest.net/apps/cli>
# Usage: speedlog.sh feed_id api_key
# Get the two arguments from your IoTPlotter.com feed.
# Currently, a single server (ID 1746) is hardcoded.
# I'll make this configurable soon™.
@scy
scy / packets.txt
Last active Jan 11, 2020
Checksum of a proprietary RS485 protocol
View packets.txt
Packets with “?” may have a wrong checksum, I’m not sure about those.
Format of a packet seems to be:
1 start byte
3 bytes header (I don’t understand it yet)
1 byte payload length
n bytes payload
1 byte checksum
Interested in what else I found out? Check the project page:
@scy
scy / SuperCollider on Termux.md
Last active Sep 26, 2019
My attempt to build SuperCollider on Termux/Android
View SuperCollider on Termux.md

This was supposed to be posted on the SC forums at scsynth.org, but I ran into the spam filter and thus saved it as a Gist first. It's on the forums now: My attempt to build SuperCollider on Termux/Android

I've been thinking about using SuperCollider on my phone. There's glastonbridge/SuperCollider-Android which hasn't been touched since 2014, so I thought I'll try to build a current version from source, based on the guide for Linux. Also, since Termux provides a great Linux CLI environment, including build toolchains, directly on the device, I wanted to try building SC under Termux.

Spoiler alert: I didn't manage to do it. The main problem is not having an audio driver, since the Linux build requires libjack, and neither Android nor Termux provide it. (Termux has

@scy
scy / gw2-golang-poc.go
Last active Jan 2, 2019
Example on how to access the Guild Wars 2 Mumble Link API on Windows using Go. Not supposed to be good Go code, but it works.
View gw2-golang-poc.go
package main
import (
"fmt"
"log"
"syscall"
"time"
"unsafe"
"unicode/utf16"
"unicode/utf8"
@scy
scy / login-notify
Created Dec 7, 2017
Only allow SSH logins after a push notification to your phone has been sent
View login-notify
#!/bin/sh
# Only allow SSH logins after a push notification to your phone has been sent.
# Also sends a notification after logging out.
# This uses the Pushover service (pushover.net).
# If Pushover cannot be reached, the login will be denied!
# Add something like this to /etc/pam.d/sshd:
# session required pam_exec.so /usr/local/bin/login-notify
# For Debian, a good place is after "@include common-account".
@scy
scy / install-phantomjs.sh
Created May 21, 2014
Simple PhantomJS installer for Linux
View install-phantomjs.sh
#!/bin/sh
set -e
if [ "$(id -u)" -ne 0 ]; then
printf 'WARNING: You will most likely need to be root, but continuing anyway ...\n' >&2
fi
url="$1"
if [ -z "$url" ]; then
printf 'Please go to <http://phantomjs.org/download.html> and find the\n'
@scy
scy / utc.py
Created Apr 30, 2014
How to parse a string as UTC in Python
View utc.py
import datetime
class UTC(datetime.tzinfo):
ZERO = datetime.timedelta(0)
def utcoffset(self, dt):
return self.ZERO
def tzname(self, dt):
return 'UTC'
def dst(self, dt):
return self.ZERO
@scy
scy / keybase.md
Last active Feb 8, 2020
keybase.md
View keybase.md

Keybase proof

I hereby claim:

  • I am scy on github.
  • I am scy (https://keybase.io/scy) on keybase.
  • I have a public key ASAdsSlXz8yCDiWmbQDYVCO2FiNRysGf4rIxRieOYynBIgo

To claim this, I am signing this object:

@scy
scy / btrsnap
Last active Aug 29, 2015
a btrfs-based local snapshotting script (for timemachine-like fuckup recovery)
View btrsnap
Please see https://github.com/scy/scybtr/blob/master/btrsnap instead.
@scy
scy / README.md
Last active Aug 22, 2020
My OSX PF config for #30C3.
View README.md

My OS X “VPN only” Setup For #30C3

You should never let passwords or private data be transmitted over an untrusted network (your neighbor’s, the one at Starbucks or the company) anyway, but on a hacker congress like the #30C3, this rule is almost vital.

Hackers get bored easily, and when they’re bored, they’re starting to look for things to play with. And a network with several thousand connected users is certainly an interesting thing to play with. Some of them might start intercepting the data on the network or do other nasty things with the packets that they can get.

If these packets are encrypted, messing with them is much harder (but not impossible! – see the end of this article). So you want your packets to be always encrypted. And the best way to do that is by using a VPN.

Target audience

You can’t perform that action at this time.