Skip to content

Instantly share code, notes, and snippets.

Eating eggs from big endian

Gurkirat Singh tbhaxor

Eating eggs from big endian
View GitHub Profile
tbhaxor / bandit.txt
Last active May 31, 2018
Over The Wire Level Wise Bandit Solutions
View bandit.txt
tbhaxor / natas.txt
Created Jan 5, 2018
Over The Wire Level Wise Natas Password
View natas.txt
tbhaxor / .bashrc
Last active Jun 6, 2018
Parrot OS Like Terminal
View .bashrc
# ~/.bashrc
# git branch parser
parse_git_branch() {
echo -e "\033[1;34m$(git branch 2> /dev/null | sed -e '/^[^*]/d' -e 's/* \(.*\)/(\1)/')\033[0m"
View sort.swift
import Foundation
func sort(_ arr1: [Int], _ arr2: [Int]) -> [Int] {
var c = Array<Int>()
var arr1 = arr1
var arr2 = arr2
let c1 = arr1.count
let c2 = arr2.count
if c1 > c2 {
for _ in 0..<c2 {
View file.html
* {
outline: none;
body {
text-align: center;
background-color: #a9d7d1;
View ard.ino
#include <SoftwareSerial.h>
SoftwareSerial esp8266(8,9); //Pin 2 & 3 of Arduino as RX and TX. Connect TX and RX of ESP8266 respectively.
#define DEBUG true
#define led_pin 13 //LED is connected to Pin 11 of Arduino
void setup()
pinMode(led_pin, OUTPUT);
digitalWrite(led_pin, LOW);
tbhaxor /
Last active Jul 14, 2019
Serving VUE Js Build directory using python and flask
before execution
1. build vue app - npm run build
2. install dependencies - pip install flask flask-cors
running the server
your site will be live on http://localhost:8000
tbhaxor / tiny.php
Created Nov 9, 2018
Tinyurl Clean and custom alias maker
View tiny.php
How to execute : php tiny.php
This will help you in generating readable custom alias with enumration (if already registered)
function getURL($url, $sh)
tbhaxor / led-controller.ino
Created Dec 21, 2018
Controll LED With Button and Show on LCD
View led-controller.ino
#include <LiquidCrystal.h>
// lcd pin config
LiquidCrystal lcd(2, 3, 4, 5, 6, 7);
int selected = -1;
int high = 0;
String colors[] = {"Red", "Green", "Blue"};
void setup()
View exp.c
// This exploit uses the pokemon exploit of the dirtycow vulnerability
// as a base and automatically generates a new passwd line.
// The user will be prompted for the new password when the binary is run.
// The original /etc/passwd file is then backed up to /tmp/passwd.bak
// and overwrites the root account with the generated line.
// After running the exploit you should be able to login with the newly
// created user.
// To use this exploit modify the user values according to your needs.