Skip to content

Instantly share code, notes, and snippets.

View xros's full-sized avatar
🎯
Focusing

Songhua Liu xros

🎯
Focusing
View GitHub Profile
@lzjluzijie
lzjluzijie / warp.js
Created February 25, 2024 07:55
Cloudflare Warp 24PB key generator
# See https://halu.lu/%E6%9D%82%E8%B0%88/cloudflare-warp/
# Depolyed at https://warp.halu.lu/
// Change keys if needed
const keys = [
"9WO41D5p-6OP8xj27-36gQG75D",
"R65K12Up-aU907O2e-4nuvD581",
"06LM94EJ-1nl0V2d7-V847va5y",
]
@MartinRGB
MartinRGB / esp32_hello_world_arduino.md
Created September 29, 2023 06:33
ESP32 Hello World

init...

@InvalidLenni
InvalidLenni / official-discord-domains-list.md
Created January 6, 2022 17:48
All (If I have forgotten a URL here, then please just let me know :)!) official Discord domains (Discord Domain List)

Official Discord Domains, let's reduce the scams!

Domain Description
dis.gd Discord's URL shorter (I like .gd as top-level domain)
discord.co Admin panel, this means not for us! (Not discord administrators / maybe staffs)
discord.com The domain is for e.g the homepage or message links etc
discord.design Dribbble profile shortlink
discord.dev Developer site shortlinks
discord.gg Invite shortlinks
List of all AWS servers
AWS (Amazon Web Services) - this company provides PUBG servers. Not all of them uses in a game, but there is full Server - IP list. Maybe this info can be useful for you:
US EAST - North Virginia
us-east-1 - 23.23.255.255
us-east-1 - 34.192.0.54
us-east-1 - 34.224.0.252
us-east-1 - 50.17.255.254
us-east-1 - 50.19.255.254
us-east-1 - 52.1.255.254
@guycalledseven
guycalledseven / manual-uninstall-paragon-ntfs.sh
Last active February 7, 2025 03:30
Manually remove Paragon NTFS v15 leftovers MacOS
# after appcleaner does his magic, do this
sudo rm -rf "/Library/Application Support/Paragon Software/"
sudo rm /Library/LaunchDaemons/com.paragon-software.installer.plist
sudo rm /Library/LaunchDaemons/com.paragon-software.ntfs.loader.plist
sudo rm /Library/LaunchDaemons/com.paragon-software.ntfsd.plist
sudo rm /Library/LaunchAgents/com.paragon-software.ntfs.notification-agent.plist
sudo rm -rf /Library/Filesystems/ufsd_NTFS.fs/
sudo rm -rf /Library/PrivilegedHelperTools/com.paragon-software.installer
sudo rm -rf /Library/Extensions/ufsd_NTFS.kext/
# retrieve webelement
input = driver.find_element_by_xpath("//*[@name='fieldname']")
# set attribute from js script referencing webelement found in python code
driver.execute_script("arguments[0].setAttribute('value', 'new value!')", input);
# or
driver.execute_script("arguments[0].setAttribute('value', arguments[1])", input, 'new value!');
# Code for File Upload
file_input = driver.find_element_by_id("uploadBtn")
file_input.send_keys("/absolute/path/to/file")
@chrisRedwine
chrisRedwine / pip_install
Created July 20, 2016 18:00
Pip install a specific github repo tag or branch
# From https://coderwall.com/p/-wbo5q/pip-install-a-specific-github-repo-tag-or-branch
pip install -e git://github.com/{ username }/{ reponame }.git@{ tag name }#egg={ desired egg name }
@xros
xros / crEAP.py
Created July 1, 2016 20:57 — forked from interference-security/crEAP.py
crEAP is a utility which will identify WPA Enterprise Mode Encryption types and if #insecure protocols are in use, crEAP will harvest Radius usernames and handshakes. (https://github.com/Shellntel/scripts/blob/master/crEAP.py)
#!/usr/bin/python
#crEAP is a utility which will identify WPA Enterprise Mode Encryption types and if
#insecure protocols are in use, crEAP will harvest Radius usernames and handshakes.
#Author: Snizz
#Requirements: Should be run as root/sudo.
#
# Python Scapy Community (scapy-com) - Dev version of Scapy which supports additional
@Lewiscowles1986
Lewiscowles1986 / rPi3-ap-setup.sh
Last active March 31, 2025 15:46
Raspberry Pi 3 access-point-setup
#!/bin/bash
#
# This version uses September 2017 august stretch image, please use this image
#
if [ "$EUID" -ne 0 ]
then echo "Must be root"
exit
fi
@xros
xros / jail.local
Last active October 24, 2020 07:04 — forked from Swop/jail.local
Adds Nginx DOS detection to Fail2ban
# /etc/fail2ban/jail.local
# [...]
[nginx-dos]
# Based on apache-badbots but a simple IP check (any IP requesting more than
# 240 pages in 60 seconds, or 4p/s average, is suspicious)
# Block for two full days.
# @author xros
enabled = true