Skip to content

Instantly share code, notes, and snippets.

@rscs
rscs / FlipperZero-RFID-blanks.md
Last active January 19, 2025 00:17
Rewritable RFID blanks for Flipper Zero

A list of rewritable RFID blanks that are compatible with Flipper Zero.

X indicates a particular protocol is writable.

? indicates it is unknown if a particular protocol is writable.

Brand Type Chip EM4100 H10301 Indala26 IoProxXSF AWID FDX-A FDX-B HIDProx HIDExt Pyramid Viking Jablotron Paradox PAC/Stanley Keri Gallagher
ETEKJOY Fob EM4305 X X X X X X
@thomasaarholt
thomasaarholt / plot_arc.py
Last active January 19, 2025 00:17
Create a matplotlib Arc patch to show the angle between two lines
import numpy as np
import matplotlib
import matplotlib.pyplot as plt
Arc = matplotlib.patches.Arc
def halfangle(a, b):
"Gets the middle angle between a and b, when increasing from a to b"
if b < a:
b += 360
return (a + b)/2 % 360
@Maharshi-Pandya
Maharshi-Pandya / contemplative-llms.txt
Last active January 19, 2025 00:14
"Contemplative reasoning" response style for LLMs like Claude and GPT-4o
You are an assistant that engages in extremely thorough, self-questioning reasoning. Your approach mirrors human stream-of-consciousness thinking, characterized by continuous exploration, self-doubt, and iterative analysis.
## Core Principles
1. EXPLORATION OVER CONCLUSION
- Never rush to conclusions
- Keep exploring until a solution emerges naturally from the evidence
- If uncertain, continue reasoning indefinitely
- Question every assumption and inference
@05copy-attired
05copy-attired / TeamViewer ID Reset.md
Last active January 19, 2025 00:11
Teamviewer ID Reset

Remove Registry HKLM(ClientIC, ClientID, MIDInitiativeGUID), etc.

The above registry only applies if the user is not logged in.

I just used it as a way to delete the entire registry of TeamViewer.

That approach actually reassigns the TeamViewer ID value by replacing the UUID value.

Windows ONLY

@a-agmon
a-agmon / df_lambda.rs
Last active January 19, 2025 00:10
Rusty AWS Lambda with Data Fusion and Iceberg
use std::{sync::Arc, time::Instant};
use datafusion::{
arrow::{array::RecordBatch, json::ArrayWriter},
prelude::SessionContext,
};
use iceberg::{io::FileIO, table::StaticTable, TableIdent};
use iceberg_datafusion::IcebergTableProvider;
use lambda_runtime::{
run, service_fn,
@ttraining-devops
ttraining-devops / hello.c
Last active January 19, 2025 00:10
Mon hello world
int min()
{
printf("hello world");
return 0;
}
@bjacob
bjacob / README.md
Last active January 19, 2025 00:09
IREE / MLIR / Linalg tutorial

IREE/MLIR/Linalg tutorial

Introduction

This tutorial is simultaneously about IREE, MLIR, and specifically the MLIR Linalg dialect.

What is MLIR?

MLIR is a programming language, but MLIR in itself is almost just an empty shell. What it really provides is a framework allowing to define MLIR dialects which are where the features come from.

@skyl
skyl / install.rb
Last active October 28, 2024 14:17
Homebrew without sudo
#!/System/Library/Frameworks/Ruby.framework/Versions/Current/usr/bin/ruby
# SET YOUR_HOME TO THE ABSOLUTE PATH OF YOUR HOME DIRECTORY
# chmod +x install.rb
# ./install.rb
YOUR_HOME = ''
HOMEBREW_PREFIX = "#{YOUR_HOME}/usr/local"
HOMEBREW_CACHE = '/Library/Caches/Homebrew'
HOMEBREW_REPO = 'https://github.com/Homebrew/homebrew'
@flaviovs
flaviovs / README.md
Last active January 18, 2025 23:59
How to use TARPIT in Linux without consuming (your) resources

Iptables(8) TARPIT is a useful security mechanism that can slow down or stop attacks on a network. If everyone used TARPIT to block attackers, in theory their resources would be exhausted as their connection attempts would be delayed, which would discouraged people from attempting unauthorized access. Here's a brief description of how TARPIT works:

To achieve this tar pit state, iptables accepts the incoming TCP/IP connection and then switches to a zero-byte window. This forces the attacker's system to stop sending data, rather like the effect of pressing Ctrl-S on a terminal. Any attempts by the attacker to close the connection are ignored, so the connection remains active and typically times out after only 12–24 minutes. This consumes resources on the attacker's system but not