aly / twitter-discord-lists.py
0 likes
0 forks
1 files
Last active
https://github.com/blha303/Twitter-IRC-lists 2: electric boogaloo
| 1 | #!/usr/bin/env python3 |
| 2 | from requests import post |
| 3 | import twitter # pip install python-twitter |
| 4 | from json import load |
| 5 | |
| 6 | with open("twitter.json") as f: |
| 7 | api = twitter.Api(**load(f)) |
| 8 | |
| 9 | with open(".bottoken") as f: |
| 10 | token = f.read().strip() |
aly / bandersnatch.md
0 likes
0 forks
3 files
Last active
Code to make your own Black Mirror: Bandersnatch
Bandersnatch Maker
This is a program I wrote on a live stream on the 14th (and 15th) of June 2019. https://www.twitch.tv/videos/438871676
You'll need some things.
- The movie (complete, with all clips, should be 05:12:14). See https://mehotkhan.github.io/BandersnatchInteractive/ for info on that.
- Some data from BandersnatchInteractive.
- https://mehotkhan.github.io/BandersnatchInteractive/assets/bandersnatch.js
aly / hibp-sha1-check.py
0 likes
0 forks
1 files
Last active
Wrote this to check AD hashes against haveibeenpwned's sha1 password list
| 1 | #!/usr/bin/env python |
| 2 | # input files: |
| 3 | # - hashlist.txt, a file containing the user hashes to check, in format username:hash, one per line. |
| 4 | # (or change the input to whatever you need it as) |
| 5 | # - pwned-passwords-sha1-ordered-by-count-v4.txt, get this from https://haveibeenpwned.com/Passwords |
| 6 | # any format is fine, just update the file name below |
| 7 | # the script will output percentage of the password file completed to stdout. compare this against your |
| 8 | # original password list, or modify the block at the end to further process the data |
| 9 | import os.path |
| 10 | inp_users = "hashlist.txt" |
aly / txtrecord_decode.py
0 likes
0 forks
3 files
Last active
Encoding and decoding files with txt records
| 1 | #!/usr/bin/env python3 |
| 2 | # txtrecord_decode.py [-h] output.png logo.example.com |
| 3 | import dns.resolver # pip3 install dnspython |
| 4 | import base64 |
| 5 | import sys |
| 6 | from argparse import ArgumentParser |
| 7 | def parse_records(name): |
| 8 | _next = "" |
| 9 | print("{}".format(name), file=sys.stderr) |
| 10 | q = dns.resolver.query(name,"TXT").response.answer[0] |
aly / aws-cloudformation-lamp-test.yml
0 likes
0 forks
1 files
Last active
generated by AWS cloudformation
| 1 | AWSTemplateFormatVersion: 2010-09-09 |
| 2 | Description: >- |
| 3 | AWS CloudFormation Sample Template LAMP_Single_Instance: Create a LAMP stack |
| 4 | using a single EC2 instance and a local MySQL database for storage. This |
| 5 | template demonstrates using the AWS CloudFormation bootstrap scripts to |
| 6 | install the packages and files necessary to deploy the Apache web server, PHP |
| 7 | and MySQL at instance launch time. **WARNING** This template creates an Amazon |
| 8 | EC2 instance. You will be billed for the AWS resources used if you create a |
| 9 | stack from this template. |
| 10 | Parameters: |
aly / discord_presence_pbx.py
0 likes
0 forks
1 files
Last active
connects to an asterisk manager and picks up ExtensionStatus messages. ties into https://gist.github.com/blha303/37e83f320b009de19e7a6c140f51e8d5
| 1 | import socket |
| 2 | from requests import get |
| 3 | |
| 4 | EXTEN = "1" |
| 5 | presence_api = "http://127.0.0.1:8081" |
| 6 | auth = ("me", "aa") |
| 7 | pbx_ip = "127.0.0.2" |
| 8 | |
| 9 | def process_event(resp): |
| 10 | d = {} |
aly / discord_presence_working.py
0 likes
0 forks
1 files
Last active
A webpage for updating my presence while I'm at work showing what I'm up to
| 1 | from pypresence import Presence # https://github.com/qwertyquerty/pypresence |
| 2 | from flask import * |
| 3 | from requests import get |
| 4 | from time import sleep |
| 5 | |
| 6 | client_id = "556918123421368329" |
| 7 | |
| 8 | RPC = Presence(client_id) |
| 9 | RPC.connect() |
| 10 | app = Flask(__name__) |