Skip to content

Instantly share code, notes, and snippets.

View wirehack7's full-sized avatar
🏠
Working from home

Markus F. wirehack7

🏠
Working from home
View GitHub Profile
@wirehack7
wirehack7 / docker-compose.yaml
Last active April 28, 2025 21:53
Radarr, Sonarr, Jellyseerr, Emby. SABnzbd and Prowlarr via VPN (Gluetun). EDIT THE VOLUME MOUNTS!! Mostly that config is based on eweka
version: "3.8"
services:
gluetun:
image: qmcgaw/gluetun
container_name: gluetun
cap_add:
- NET_ADMIN
devices:
- /dev/net/tun
# This file has been auto-generated by i3-config-wizard(1).
# It will not be overwritten, so edit it as you like.
#
# Should you change your keyboard layout some time, delete
# this file and re-run i3-config-wizard(1).
#
# i3 config file (v4)
#
# Please see https://i3wm.org/docs/userguide.html for a complete reference!
@wirehack7
wirehack7 / Virustotal.class.php
Last active September 5, 2015 18:18
Simpe VT API 2.0 PHP class
<?php
/*
* VirusTotal API 2.0 class
* by @wirehack7
*
* License:
* GNU GENERAL PUBLIC LICENSE
* Version 3, 29 June 2007
*
@wirehack7
wirehack7 / gist:15d903ab18f0357e359d
Last active August 29, 2015 14:23
Color prompt for LInux (Debian)
User:
export PS1="\[\e[00;33m\]\d\[\e[0m\]\[\e[00;37m\] \[\e[0m\]\[\e[00;36m\]\@\[\e[0m\]\[\e[00;37m\] > \[\e[0m\]\[\e[00;32m\]\u\[\e[0m\]\[\e[00;37m\]@\[\e[0m\]\[\e[00;34m\]\H\[\e[0m\]\[\e[00;37m\] [\w]\[\e[0m\]\[\e[00;35m\]\\$\[\e[0m\]\[\e[00;37m\]: \[\e[0m\]"
Root:
export PS1="\[\e[00;33m\]\d\[\e[0m\]\[\e[00;37m\] \[\e[0m\]\[\e[00;36m\]\@\[\e[0m\]\[\e[00;37m\] > \[\e[0m\]\[\e[01;31m\]\u\[\e[0m\]\[\e[00;37m\]@\[\e[0m\]\[\e[00;34m\]\H\[\e[0m\]\[\e[00;37m\] [\w]\[\e[0m\]\[\e[00;35m\]\\$\[\e[0m\]\[\e[00;37m\]: \[\e[0m\]"
I wasn't first to get the key. Nor was I second, third, or even fourth. I'm probably not even the
10th to get it (ok, looks like I was the 7th.) But I'm happy that I was able to prove to myself
that I too could do it.
First, I have to admit I was a skeptic. Like the handful of other dissenters, I had initially
believed that it would be highly improbable under normal conditions to obtain the private key
through exploiting Heartbleed. So this was my motivation for participating in Cloudflare's
challenge. I had extracted a lot of other things with Heartbleed, but I hadn't actually set out to
extract private keys. So I wanted to see first-hand if it was possible or not.
package com.deviant.security.shield;
public final class BuildConfig {
public static final String BUILD_TYPE = "debug";
public static final boolean DEBUG;
public static final String FLAVOR = "";
public static final String PACKAGE_NAME = "com.deviant.security.shield";
public static final int VERSION_CODE = 4;
public static final String VERSION_NAME = "2.2";
@wirehack7
wirehack7 / geoip_googlemaps.sh
Last active January 3, 2016 18:58
Little script to get a Google Maps link for a given IP, based on GeoIP. Requires dnsutils
#!/bin/bash
function valid_ip()
{
local ip=$1
local stat=1
if [[ $ip =~ ^[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}$ ]]; then
OIFS=$IFS