Skip to content

Instantly share code, notes, and snippets.

@vanroy86
vanroy86 / extract_exif_gps.py
Created July 7, 2016 03:29 — forked from urschrei/extract_exif_gps.py
Extract GPS data from jpg files, and write it to a CSV. Requires the PIL. Tested (haha) on Python 2.7.x
"""
Extract GPS coordinates and filename, output to CSV file
Run this file from the same directory the images are in
run using ./process_exif.py or python process_exif.py, or
%run process_exif.py from an IPython instance
Ensure you have PIL installed
refer to http://www.exiv2.org/tags.html for a full detailed tag listing
This is what the GPSInfo dict looks like for an iPhone 5 jpg:
@vanroy86
vanroy86 / How to download streaming video
Created July 29, 2016 06:25 — forked from danfinlay/How to download streaming video.md
How to download a streaming video with Google Chrome
#How to download streaming video
Streaming just means a download that they don't want you to keep. But Chrome's developer tools make it easy to access what's really going on under the hood.
##Open Developer Tools
From the page where you want to download some things, go into your chrome menu to open the developer tools. You can either:
1. (On a mac): Command-option-J
2. (On a PC): Control-alt-J
@vanroy86
vanroy86 / exif.php
Created October 1, 2016 10:54
CLI PHP Script that gets EXIF data for jpeg and tiff files. Can easily be adapted to run on web page.
#!/usr/bin/php -q
<?php
/*
* exif.php
* This script gets meta headers from image files.
*
* (For use with command line)
* Usage Usage: php exif.php <image>
* Example: php exif.php beach.jpg
@vanroy86
vanroy86 / download_flickr_image.py
Created January 31, 2019 10:18 — forked from yunjey/download_flickr_image.py
downloading images from flickr using python-flickr
# First, you should install flickrapi
# pip install flickrapi
import flickrapi
import urllib
from PIL import Image
# Flickr api access key
flickr=flickrapi.FlickrAPI('c6a2c45591d4973ff525042472446ca2', '202ffe6f387ce29b', cache=True)

WannaCry|WannaDecrypt0r NSA-Cyberweapon-Powered Ransomware Worm

  • Virus Name: WannaCrypt, WannaCry, WanaCrypt0r, WCrypt, WCRY
  • Vector: All Windows versions before Windows 10 are vulnerable if not patched for MS-17-010. It uses EternalBlue MS17-010 to propagate.
  • Ransom: between $300 to $600. There is code to 'rm' (delete) files in the virus. Seems to reset if the virus crashes.
  • Backdooring: The worm loops through every RDP session on a system to run the ransomware as that user. It also installs the DOUBLEPULSAR backdoor. It corrupts shadow volumes to make recovery harder. (source: malwarebytes)
  • Kill switch: If the website www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com is up the virus exits instead of infecting the host. (source: malwarebytes). This domain has been sinkholed, stopping the spread of the worm. Will not work if proxied (source).

update: A minor variant of the viru

@vanroy86
vanroy86 / gist:17777ce069f655cb76e194a2552f14fa
Created March 14, 2019 10:44
/etc/apache2/sites-enabled/000-default.conf
<VirtualHost *:80>
# The ServerName directive sets the request scheme, hostname and port that
# the server uses to identify itself. This is used when creating
# redirection URLs. In the context of virtual hosts, the ServerName
# specifies what hostname must appear in the request's Host: header to
# match this virtual host. For the default virtual host (this file) this
# value is not decisive as it is used as a last resort host regardless.
# However, you must set it for any further virtual host explicitly.
#ServerName www.example.com
@vanroy86
vanroy86 / Dockerfile
Created April 1, 2019 09:56 — forked from znz/Dockerfile
ruby 2.1.2 with libressl
FROM ubuntu:14.04
ADD sources.list /etc/apt/sources.list
RUN apt-get update
RUN apt-get -y install wget autoconf bison build-essential libyaml-dev libreadline6 libreadline6-dev zlib1g zlib1g-dev
RUN cd /usr/local/src && wget -N http://ftp.jaist.ac.jp/pub/OpenBSD/LibreSSL/libressl-2.0.3.tar.gz && tar xvf libressl-2.0.3.tar.gz
RUN cd /usr/local/src/libressl-2.0.3 && ./configure && make check && make install
RUN /sbin/ldconfig
RUN cd /usr/local/src && wget -N http://cache.ruby-lang.org/pub/ruby/2.1/ruby-2.1.2.tar.gz && tar xvf ruby-2.1.2.tar.gz
RUN cd /usr/local/src/ruby-2.1.2 && ./configure --disable-install-doc && make install
@vanroy86
vanroy86 / bootstrap3-input-file.html
Created April 1, 2019 09:56 — forked from znz/bootstrap3-input-file.html
bootstrap3 input file test
<!DOCTYPE html>
<html>
<head>
<meta charset="utf-8">
<meta http-equiv="X-UA-Compatible" content="IE=edge">
<meta name="viewport" content="width=device-width, initial-scale=1">
<title>bootstrap3のinput[file]のテスト</title>
<link rel="stylesheet" href="https://maxcdn.bootstrapcdn.com/bootstrap/3.3.0/css/bootstrap.min.css">
</head>
<body>
@vanroy86
vanroy86 / README.md
Created April 1, 2019 11:26 — forked from mrbar42/README.md
bash scripts to create VOD HLS stream with ffmpeg almighty (tested on Linux and OS X)

running:

bash create-vod-hls.sh beach.mkv

will produce:

    beach/
      |- playlist.m3u8
 |- 360p.m3u8
@vanroy86
vanroy86 / slack_webhook_post.py
Created June 22, 2019 17:22 — forked from devStepsize/slack_webhook_post.py
POST a JSON payload to a Slack Incoming Webhook using Python requests
'''
This is an example of how to send data to Slack webhooks in Python with the
requests module.
Detailed documentation of Slack Incoming Webhooks:
https://api.slack.com/incoming-webhooks
'''
import json
import requests