Show more

RT @[email protected]

SMA-Q2 Smart Watch Is Completely Hackable

The search for the ultimate hacker’s smart watch probably won’t end any time soon. [emeryth] has nominated another possible candidate in the form of the SMA-Q2, and has made a lot of progress in making it access… hackaday.com/2020/01/30/sma-q2

RT @[email protected]

Commands to image Netscaler device:

dd if=/dev/md0 | gzip -1 - | ssh [email protected][IP address] dd of=/[fullpath]/md0.gz
dd if=/dev/ad0s1a | gzip -1 - | ssh [email protected][IP address] dd of=/[fullpath]/ad0s1a.gz
dd if=/dev/ad0s1b | gzip -1 - | ssh [email protected][IP address] dd of=/[fullpath]/ad0s1b.gz

git config --global alias.oops 'reset --hard HEAD^'

git oops

If you had a first generation Tamagachi and kept it alive until now, it would be 23 years old.

RT @[email protected]

Windows Kiosk breakout tip:
If you get a Printing panel, and the traditional methods don't work:
Amongst the printers, select "SendTo OneNote"
OneNote will launch -> Add new notebook
On the Notebook -> New page
Type: \\127.0.0.1\c$\windows\system32\cmd.exe
Click the link

I'm trying to build a list of teensy-based projects for hackers and infosec people. The list isn't comprehensive now, but I'm really hoping to add any suggestions!

Please let me know what to add and share this around!

gist.github.com/JeffAlyanak/79

RT @[email protected]

alias yeet="rm"
alias skurt="exit"
alias yolo="rm -rf / --no-preserve-root"
alias hashtag="sudo !!"
alias fetch="clear"
alias curve="sudo /sbin/iptables -I INPUT -j DROP"

I'd love to see more content like this showing off unique regional switching equipment. Any phreaks out there have any reccomentations on what to look up?

youtube.com/watch?v=bUIiUXvnkU

This looks like a cool project.

"The Open Book aims to be a simple device that anyone with a soldering iron can build for themselves. The Open Book should be comprehensible: the reader should be able to look at it and understand, at least in broad strokes, how it works. It should be extensible, so that a reader with different needs can write code and add accessories that make the book work for them."

oddlyspecific.org/book/

#TheOpenBook #OddlySpecific #Arduino

This is actually so cool.

Seeing this sort of emergent gameplay arising from AI competition is just absolutely fascinating.

youtube.com/watch?v=Lu56xVlZ40

A simpler alternative is just take a face that is obviously not yours and overlay it on yourself.

Use it like a mask, like the Guy Fawkes mask, that everyone puts onto themselves when they need to be anonymous.

You can then use the deepfakes tools to overlay that on a video or image(s) of yourself.

A simpler alternative is just take a face that is obviously not yours and overlay it on yourself.

Use it like a mask, like the Guy Fawkes mask, that everyone puts onto themselves when they need to be anonymous.

You can then use the deepfakes tools to overlay that on a video or image(s) of yourself.

So, I've found an interecting use-case for deepfakes.

deidentification.co/

You could use a facial recognition model in combination with the deepfakes model to generate a face that looks like the original to a human but that appears as different to the facial recognition model.

As part of my ongoing foray into turning a CPU into a "heater that does meaningful work" I wrote a little script for throttling a process — in my case, [email protected] — based on CPU temp.

github.com/JeffAlyanak/temp-th

Now I need to get a networked thermostat set up to drive it all.

Show more
Rights.Ninja Social

Social.Rights.Ninja is a small Mastodon instance for those looking for a quiet home-base from which to explore the fediverse. Please email [email protected] for information on getting an invite.