>Kindly reconsider your security:
——
(ssh anonce your pub-keys to server by default, to work on unsecure envs try ssh with dev null):
ssh whoami.filippo.io
——
(ssh anonce your pub-keys to server by default, to work on unsecure envs try ssh with dev null):
ssh whoami.filippo.io -i /dev/nulla very nice way to filter HTML or /and output to console:
or
links -codepage utf-8 -force-html -width 400 -dump /dev/stdin
or
links -codepage utf-8 -force-html -width 400 -dump /path/to/html/file.html
a fast way to get serial (and others things from udev):
udevadm info --query=all -n /dev/sda
FFmpeg near precision way to cut video (pt1):
check timing by:
ffmpeg -i planes.mkv -ss 00:00:05.000 -t 00:00:05.500 plane0505_recode.mkv
check timing by:
ffprobe -v error -show_entries format=duration -of default=noprint_wrappers=1:nokey=1 plane0505_recode.mkv
FFmpeg stress test:
(it will load all cpus)
(it will load all cpus)
ffmpeg -y -f rawvideo -video_size 1920x1080 -pixel_format yuv420p -framerate 60 -i /dev/urandom -c:v libx265 -preset placebo -f matroska /dev/null
Random noise from /dev/urandom:
Keep eye on filesize.
ffmpeg -f rawvideo -pixel_format rgb24 -video_size 1920x1080 -framerate 120 -i /dev/urandom -c:v libx264 -preset ultrafast -pix_fmt yuv420p output.mp4
Keep eye on filesize.
FFMPEG
Convert image IN.png to RAW RGB565 format:
Convert image IN.png to RAW RGB565 format:
ffmpeg -vcodec png -i IN.png -vcodec rawvideo -f rawvideo -pix_fmt rgb565 OUT.raw
linux system calls with just the python
standard library:
standard library:
import ctypes
ctypes.CDLL(None).syscall(39)
#
python -c '__import__("ctypes").CDLL(None).syscall(1,1,b"Haiiiiii",8)'
LaTeX to PDF conversion:
tectonic invoice10.tex
(tectonic util will download deps automatically )
tectonic invoice10.tex
(tectonic util will download deps automatically )
cat /dev/urandom | tr -dc 'a-zA-Z0-9' | fold -w 10 | sed 1000000000q |aplay
cat /dev/urandom | tr -dc '0-9' | fold -w 10 | sed 1000000000q |aplay
cat /dev/urandom | tr -dc '0-9' | fold -w 10 | sed 1000000000q |aplay
cat /dev/urandom | tr -dc '&*(&(^)' | fold -w 10 | sed 1000000000q |aplay
cat /dev/urandom | tr -dc '&*(&(^)' | fold -w 10 | sed 1000000000q |aplay
cat /dev/urandom | tr -dc '~`!@#$%^&*()' | fold -w 1 | sed 1000000000q |aplay
cat /dev/urandom | tr -dc "0-9a-z" |aplay
cat /dev/urandom | tr -dc 'a-zA-Z0-9' | fold -w 32 |aplay -r 192000
Lxc clean snapshots noscripts:
lxc info tor-jschan
echo "^^^^^^^^^^^BEFORE^^^^^^^^^^^^\n\n\n"
container_name="tor-jschan"
snapshots=$(lxc info $container_name | awk '/^\|/ {print $2}' | head -n -1)
for snapshot in $snapshots; do
lxc delete $container_name/$snapshot
done
echo "------------AFTER:-------------\n\n\n\"
lxc info tor-jschan
Video registrator DS-7104HQHI-K1
could be "hacked" trough rs232:
default command to get pass:
operationCode=password
could be "hacked" trough rs232:
default command to get pass:
getHardInfo
operationCode=password