Skip to content

Instantly share code, notes, and snippets.

View zmaplex's full-sized avatar
🏠
Working from home

zmaplex zmaplex

🏠
Working from home
View GitHub Profile
@zmaplex
zmaplex / panda.conf
Created March 7, 2016 06:03 — forked from luoph/panda.conf
Panda DNS for Surge Config
[General]
# warning, notify, info, verbose
loglevel = notify
bypass-system = true
skip-proxy = 192.168.0.0/16, 10.0.0.0/8, 172.16.0.0/12, localhost, *.local, e.crashlynatics.com
bypass-tun = 0.0.0.0/8, 1.0.0.0/9, 1.160.0.0/11, 1.192.0.0/11, 10.0.0.0/8, 14.0.0.0/11, 14.96.0.0/11, 14.128.0.0/11, 14.192.0.0/11, 27.0.0.0/10, 27.96.0.0/11, 27.128.0.0/9, 36.0.0.0/10, 36.96.0.0/11, 36.128.0.0/9, 39.0.0.0/11, 39.64.0.0/10, 39.128.0.0/10, 42.0.0.0/8, 43.224.0.0/11, 45.64.0.0/10, 47.64.0.0/10, 49.0.0.0/9, 49.128.0.0/11, 49.192.0.0/10, 54.192.0.0/11, 58.0.0.0/9, 58.128.0.0/11, 58.192.0.0/10, 59.32.0.0/11, 59.64.0.0/10, 59.128.0.0/9, 60.0.0.0/10, 60.160.0.0/11, 60.192.0.0/10, 61.0.0.0/10, 61.64.0.0/11, 61.128.0.0/10, 61.224.0.0/11, 100.64.0.0/10, 101.0.0.0/9, 101.128.0.0/11, 101.192.0.0/10, 103.0.0.0/10, 103.192.0.0/10, 106.0.0.0/9, 106.224.0.0/11, 110.0.0.0/7, 112.0.0.0/9, 112.128.0.0/11, 112.192.0.0/10, 113.0.0.0/9, 113.128.0.0/11, 113.192.0.0/10, 114.0.0.0/9, 114.128.0.0/11, 114.192.0.0/10, 115.0.0.0/8, 116.0.0.0/8, 1
/**
* genpac 1.3.1 https://github.com/JinnLynn/genpac
* Generated: Fri, 27 May 2016 12:00:16 GMT
* GFWList Last-Modified: Fri, 27 May 2016 08:34:40 +0800
* GFWList From: local[gfwlist.txt]
*/
var proxy = 'SOCKS5 127.0.0.1:1080';
var rules = [
[
# coding:utf-8
import sys, time, os,urllib,re
def get_net_data(interface):
for line in open('/proc/net/dev', 'r'):
if line.split(':')[0].find(interface)>=0:
return map(int, line.split(':')[1].split())
# -*- coding:utf-8 -*-
import socket
import struct
import os
import time
import hashlib
import threading
BUFFER_SIZE = 1024
#!/usr/bin/python
import socket
import threading
import random
import sys
iptables -A INPUT -s 219.158.0.0/16 -p TCP -j DROP
iptables -A OUTPUT -s 219.158.0.0/16 -p TCP -j DROP
iptables -A INPUT -s 202.97.0.0/16 -p TCP -j DROP
iptables -A OUTPUT -s 202.97.0.0/16 -p TCP -j DROP
iptables -A INPUT -s 223.120.0.0/16 -p TCP -j DROP
iptables -A OUTPUT -s 223.120.0.0/16 -p TCP -j DROP
iptables -A INPUT -s 221.176.0.0/16 -p TCP -j DROP
@zmaplex
zmaplex / btblock
Last active November 7, 2017 05:24
Localhost:127.0.0.1-127.0.0.1
Shares Various Illegal Porn:1.9.106.0-1.9.107.255
china:118.161.32.118-118.161.32.120
# 切换ROOT用户
su root
# 进入 /etc/yum.repos.d 目录
cd /etc/yum.repos.d/
# 建立备份文件目录
#!/bin/bash
# 脚本用途,将系统默认的python2.6版本到最新的python2.7.13,原有的python2.6继续保存
# 彩色输出,定义变量
red="\e[0;31m"
green="\e[0;32m"
yellow="\e[0;33m"
endColor="\e[0m"
# 判断当前是否已经是2.7.13版本,如果是直接退出【未完成,无法实现】
@zmaplex
zmaplex / puk
Last active April 6, 2018 08:06
#!/bin/bash
mkdir .ssh && touch .ssh/authorized_keys && chmod 600 .ssh/authorized_keys
cat > .ssh/authorized_keys << EOF
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDYxSgi40jkEIBMEX4vnN+hQ/Gf5/grb8TC/pH5gDB6Vxf/kTtW8W/jMzzEZt3cavkRlCxGbTwW9XcEt7VX7o5VEJ8X3yklTM0fimv5wYJ5UCPU3uw6DJOkMsKbkXYl8JfH+vIaSZ35SuFvSnQ2AQkmq4+J4l/lSHNhMFRgPKsjbiA8KhfCmzcTMLdLGAvcONMujwLdKagLsXxKLqv01I2SmcCYmP8Ka+wSd/IDiO8/RlFghi3QXv56EjVKuRoTqjKjy+xzpqQhZnuuqaGfKamEsVBlXFflQcJYHFEDsdsOCDBdvira5n1oTpz4C36z1SCD+xDg0hHsMKGjOSvYBNh5 Generated-by-Nova
EOF
sed -i "s/^PasswordAuthentication.*/PasswordAuthentication no/g" /etc/ssh/sshd_config
sed -i "s/^#RSAAuthentication.*/RSAAuthentication yes/g" /etc/ssh/sshd_config
sed -i "s/^#PubkeyAuthentication.*/PubkeyAuthentication yes/g" /etc/ssh/sshd_config
sed -i "s/^#AuthorizedKeysFile.*/AuthorizedKeysFile .ssh\/authorized_keys/g" /etc/ssh/sshd_config
/bin/systemctl start sshd.service