Skip to content

Instantly share code, notes, and snippets.

v3l0c1r4pt0r

Block or report user

Report or block v3l0c1r4pt0r

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
@v3l0c1r4pt0r
v3l0c1r4pt0r / bmp.py
Created Jan 30, 2019
Quick and dirty bitmap format support using makeelf classes
View bmp.py
from makeelf.type.uint16 import uint16
from makeelf.type.uint32 import uint32
## \class BITMAPFILEHEADER
# \brief Bitmap main header
# \see https://docs.microsoft.com/en-us/windows/desktop/api/wingdi/ns-wingdi-bitmapfileheader
class BITMAPFILEHEADER:
def __init__(self, bfType=0x4d42, bfSize=0, bfReserved1=0, bfReserved2=0,
bfOffBits=0, little=False):
@v3l0c1r4pt0r
v3l0c1r4pt0r / droidwall-start.sh
Created Nov 25, 2018
Custom droidwall script to fix few things
View droidwall-start.sh
# nobody uid - tethering
$IPTABLES -A droidwall-wifi -j RETURN -m owner --uid-owner 9999
# orbot - diffefent user
$IPTABLES -A droidwall -j RETURN -m owner --uid-owner <PIDOF-ORBOT>
# system - wifi check
$IPTABLES A droidwal-wifi -j RETURN -m owner --uid-owner 1000 -p tcp -d connectivitycheck.gstatic.com --dport 80
@v3l0c1r4pt0r
v3l0c1r4pt0r / luks.bluray.sh
Created Jul 22, 2018
Cheat sheet for burning LUKS-encrypted BluRay Discs
View luks.bluray.sh
# create image
truncate -s 25025314816 image.iso
sudo losetup /dev/loop1 image.iso
sudo cryptsetup luksFormat /dev/loop1
sudo cryptsetup luksOpen /dev/loop1 volume1
sudo mkudffs --label='disc label' -b 2048 /dev/mapper/volume1
sudo mount -t udf /dev/mapper/volume1 /mnt/iso/
# unmount
sudo umount /dev/mapper/volume1
@v3l0c1r4pt0r
v3l0c1r4pt0r / gentestpage.py
Created May 23, 2018
Script for generating test pages for line printers (dot-matrix) for sake of charset identification
View gentestpage.py
#!/usr/bin/env python3
# generate test page for printer
import os
a = b''
for c in range(32,256):
a +=bytes([c])
t = []
for i in range(0,16):
@v3l0c1r4pt0r
v3l0c1r4pt0r / Win10_1709_Polish_x64.iso.hash
Created Mar 24, 2018
Skróty Windows 10 Fall Creators Update
View Win10_1709_Polish_x64.iso.hash
MD5 93432f1acef0a47ff0eb11b988cd9bde Win10_1709_Polish_x64.iso
SHA1 567ec71d491a461dd85c75c0d1c1703de0ad0982 Win10_1709_Polish_x64.iso
SHA224 53889c6ec508a472bb870c76fcfe90a1c38318a4e3ecafdaf89d3a0a Win10_1709_Polish_x64.iso
SHA256 324f914c0267aec3edb8112a44e4104604eb0a20ab8a8ddf5e247f4ab5474c50 Win10_1709_Polish_x64.iso
SHA384 3f1c96859527086f5554dd83ffb027a31dc919309b60d3e4dc4fe8801fbb65ed4a74d57ffc862537d95f1ea8090174d8 Win10_1709_Polish_x64.iso
SHA512 2e0eec24ebd1368806b761ad1071a1ec5a2b5cc7e692d5388542f2cf4d649d48974767ead207fba09ba62f1f9d258cbd4d3008d16ead9d0270d346f49a9ed8dc Win10_1709_Polish_x64.iso
@v3l0c1r4pt0r
v3l0c1r4pt0r / colorme.sh
Created Mar 15, 2018
Make your prompt colorful
View colorme.sh
#!/bin/bash
#usage: source colorme.sh [color]
color='37'
if [ $# -ge 1 ]; then
color="$1"
fi;
export PS1="\[\033[1;${color}m\][\u@\h \W]\$ \[\033[0m\]"
@v3l0c1r4pt0r
v3l0c1r4pt0r / colorify.vim
Created Feb 21, 2018
Vim script to insert ANSi escape codes
View colorify.vim
function! Icolorify(color)
normal `>a
execute "normal `<i\<C-V>\<C-[>[" . a:color . "m"
endfunction
" Foreground
command! -range CBlack call Icolorify(30)
command! -range CRed call Icolorify(31)
command! -range CGreen call Icolorify(32)
command! -range CYellow call Icolorify(33)
@v3l0c1r4pt0r
v3l0c1r4pt0r / vim2html.css
Created Feb 19, 2018
CSS stylesheet for including with :TOhtml output
View vim2html.css
/** vim2html.css
* This file consists of full CSS needed to color every default highlighting
* group of Vim syntax on :TOhtml command output
*/
.Operator { color: #ff6060; }
/*.Ignore { color: #000000; }*/
.Error { color: #ffffff; background-color: #ff6060; padding-bottom: 1px; }
.Underlined { color: #5fd7ff; text-decoration: underline; }
.Type { color: #87ffaf; }
.Todo { color: #000000; background-color: #ffff00; padding-bottom: 1px; }
View keybase.md

Keybase proof

I hereby claim:

  • I am v3l0c1r4pt0r on github.
  • I am v3l0c1r4pt0r (https://keybase.io/v3l0c1r4pt0r) on keybase.
  • I have a public key whose fingerprint is 4461 2E7B 00AB 975E 7803 B22A DCBA 7CDE 5B11 097D

To claim this, I am signing this object:

@v3l0c1r4pt0r
v3l0c1r4pt0r / update-hekko.sh
Last active May 21, 2019
Script to regenerate Let's Encrypt certificate and update hekko.pl via DirectAdmin and certbot
View update-hekko.sh
#!/bin/sh
# Update hekko.pl SSL certificate page automatically with Let's Encrypt cert
# Provide $login and $pass to your environment to disable manual login page
# Outputs will be generated in CWD !
domain='example.com'
chain='chain.crt'
ca='isrgrootx1.pem'
useragent='Mozilla/5.0 (X11; Linux x86_64; rv:49.0) Gecko/20100101 Firefox/49.0'
cookiefile='.cookies'
You can’t perform that action at this time.