Skip to content

Instantly share code, notes, and snippets.

Avatar
🏴‍☠️
Throughout my life I have always have been the hacker who hacks the (evil)hacker

wuseman wuseman

🏴‍☠️
Throughout my life I have always have been the hacker who hacks the (evil)hacker
View GitHub Profile
@wuseman
wuseman / findmalware.sh
Created July 2, 2018 02:31
Find Malware in the current and sub directories by MD5 hashes
View findmalware.sh
IFS=$'\n' && for f in `find . -type f -exec md5sum "{}" \;`; do echo $f | sed -r 's/^[^ ]+/Checking:/'; echo $f | cut -f1 -d' ' | nc hash.cymru.com 43 ; done
@wuseman
wuseman / megaspam.sh
Last active June 29, 2021 03:29
Send emails forever (until they block you for flood :))
View megaspam.sh
#!/bin/bash
while true; do echo "message here" | mutt someonesmail@gmail.com; done
@wuseman
wuseman / 51-android.rules
Created December 6, 2018 01:20
Full set of Android USB vendor ID rules for Linux
View 51-android.rules
SUBSYSTEM=="usb", ATTR{idVendor}=="0502", MODE="0666", GROUP="plugdev" #Acer
SUBSYSTEM=="usb", ATTR{idVendor}=="0b05", MODE="0666", GROUP="plugdev" #ASUS
SUBSYSTEM=="usb", ATTR{idVendor}=="413c", MODE="0666", GROUP="plugdev" #Dell
SUBSYSTEM=="usb", ATTR{idVendor}=="0489", MODE="0666", GROUP="plugdev" #Foxconn
SUBSYSTEM=="usb", ATTR{idVendor}=="04c5", MODE="0666", GROUP="plugdev" #Fujitsu
SUBSYSTEM=="usb", ATTR{idVendor}=="04c5", MODE="0666", GROUP="plugdev" #Fujitsu Toshiba
SUBSYSTEM=="usb", ATTR{idVendor}=="091e", MODE="0666", GROUP="plugdev" #Garmin-Asus
SUBSYSTEM=="usb", ATTR{idVendor}=="18d1", MODE="0666", GROUP="plugdev" #Google
SUBSYSTEM=="usb", ATTR{idVendor}=="201E", MODE="0666", GROUP="plugdev" #Haier
SUBSYSTEM=="usb", ATTR{idVendor}=="109b", MODE="0666", GROUP="plugdev" #Hisense
@wuseman
wuseman / mimetypes
Created December 6, 2018 01:21
PHP Mimetypes
View mimetypes
<?php
$mime_types = array(
'.3dm' => 'x-world/x-3dmf',
'.3dmf' => 'x-world/x-3dmf',
'.a' => 'application/octet-stream',
'.aab' => 'application/x-authorware-bin',
'.aam' => 'application/x-authorware-map',
'.aas' => 'application/x-authorware-seg',
'.abc' => 'text/vnd.abc',
'.acgi' => 'text/html',
@wuseman
wuseman / wfind-alpha.sh
Created February 7, 2019 18:56
Move all folders and sort them from a-z
View wfind-alpha.sh
#!/bin/bash
# Author: wuseman
for i in *; do I=`echo $i|cut -c 1|tr a-z A-Z`; if [ ! -d "$I" ]; then mkdir "$I"; fi; mv "$i" "$I"/"$i"; done
@wuseman
wuseman / no-youtubeads.js
Last active August 23, 2020 13:48
Remove ads on youtube without any third-party-tool.
View no-youtubeads.js
# Paste below line in your browser console window and ads are gone.
# Magic! ;-)
# Author: wuseman
document.cookie="VISITOR_INFO1_LIVE=oKckVSqvaGw; path=/; domain=.youtube.com";window.location.reload();
@wuseman
wuseman / wbadips.sh
Created June 15, 2019 04:25
Script for add ip addresses from badips.com
View wbadips.sh
#!/bin/bash
# Author: wuseman <wuseman@nr1.nu>
# Simple script for add ip addresses from badips.com
# Recommended: Add this to cron to run once a day, it wont add same ip twice..
# Another script i fixed for fun for a stranger on facebook :-)
BANNEDIPS="/root/ip-addresses.txt"
if [[ ! -f "$BANNEDIPS" ]]; then
printf "Creating $BANNEDIPS...\n"
@wuseman
wuseman / vmware-fix-gentoo.sh
Last active October 24, 2019 08:17
vmware-fix-gentoo.sh
View vmware-fix-gentoo.sh
#!/bin/bash
VMWARE_VERSION=workstation-12.5.9
TMP_FOLDER=/tmp/patch-vmware
rm -fdr $TMP_FOLDER
mkdir -p $TMP_FOLDER
cd $TMP_FOLDER
git clone https://github.com/mkubecek/vmware-host-modules.git
cd $TMP_FOLDER/vmware-host-modules
git checkout $VMWARE_VERSION
@wuseman
wuseman / BOSE-HACKING.sh
Last active February 4, 2023 02:51
BOSE-HACKING
View BOSE-HACKING.sh
Telnet to the hidden port 17000 and use the commands below for play and have fun with your bose device.
Credit's to the guy who uploaded all these on pastebin.
->help
? : ? [List available commands( same as help )]
abl
baud : abl baud <baudrate> [Sets baudrate]
key : abl key <key code> [Send the corresponding key]
mute : abl mute [int|user] [Sets the internal or user mute]
@wuseman
wuseman / uusd.p8lite.txt
Created December 3, 2019 05:39
HUAWEI_P8LiTE_UUSD_CODES
View uusd.p8lite.txt
#!/bin/bash
cat << "EOF"
--------------------------------------------------------------------------------------------------------------------------------
# UUSD CODES
--------------------------------------------------------------------------------------------------------------------------------
*#06# ## Displays IMEI number
*#*#225#*#* ## Calendar Info
*#*#426#*#* ## Google Play Services
*#*#1357946#*#* ## EMUI version, Serial Number and Product ID
*#*#2846579#*#* ## Background Settings, Veneer information, Network Information Query, Software Upgrade, Restore Factory, Battery Charge