joubin jabbari
  • home
  • blog
  • work
  • reading
  • photography
  • contact
  • resume

Lets get some reading material for the flight

I got married last weekend and this weekend I'm going to be on a 6 hour flight to Kauai, Hawaii 🌴🌴🌴

As much as I love my iPad, nothing can replace writing on the margins of white paper. My first plan was to write a crawler to get white papers off of university pages that I'd like to apply to for my graduate work. But given that I just got married, I found it to be in poor taste to spend a bunch of time programming. But I still needed reading material for the flight (no wifi) so I decided to write a small script to generate pdfs for me.

Thanks to /r/netsec and /r/programming for their amazing posts.

The code base is entirely in python. I wrote and executed this on both my Mac and Ubuntu server. The install script will install most of the required tools with the exception of wkhtmltopdf which needs to be installed manually.

The main method simply get the top N posts from a selected sub and generates a pdf from it.

Let me know what you think!

Source

Example:

Output:

02:48:47 - [email protected]:[~/Documents/Git/Reddit2PDF]: python Main.py 
    328 :: CVE-2015-3245 and CVE-2015-3245: local exploit that lets users change ...
    41 :: Introducing KeychainEditor for iOS
    0 :: Determining the Right CND Tool for a Job
    46 :: IBM Mainframe (z/OS) Shellcode, Egghunters and Encoders (Exploit Dev).
    47 :: Bypassing GMX Virus Scanning using Conflicting MIME Boundaries
    22 :: Gaming Meets OSINT: Using Python to Help Solve Her Story
    17 :: A tale of Pirpi, Scanbox & CVE-2015-3113
    295 :: I wrote a detailed HowTo on "Privacy & Security Conscious Browsing" an...
    144 :: Hacking Team: a zero-day market case study
    182 :: Georgia Tech Releases No Cost Malware DNS Data Feed
    23 :: RECON 2015 slides
    16 :: Android Broadcast Security
    284 :: OS X 10.10 DYLD_PRINT_TO_FILE Local Privilege Escalation Vulnerability
    53 :: RECON 2015: Exploiting Out-of-Order-Execution
    25 :: Bypassing AOL Mail Virus Scanning with Conflicting Content-Transfer-Enc...
    31 :: How to fuzz a server with American Fuzzy Lop
    561 :: MS15-078, Remote Code Execution in all versions of Windows. No patch f...
    62 :: Collection of Hacking ezines
    24 :: One Perfect Bug: Exploiting Type Confusion in Flash
    3 :: x86 Exploitation 101: “House of Spirit” – Friendly stack overflow
    233 :: The Public Comments on the Proposed Wassenaar Rule to Limit Export of ...
    264 :: The Case of Insecure MongoDB Defaults and 600TB of Data
    59 :: A gentle introduction to Berkeley packet filters for network traffic an...
    267 :: RedStar OS Watermarking
    231 :: OpenSSH keyboard-interactive authentication brute force vulnerability ...
    0 :: Why You Don't Need 2 Factor Authentication
    18 :: OWASP Application Security Verification Standard Project 3.0
    674 :: Computer Systems Security | MIT OpenCourseWare
    37 :: out with the old, in with the less - OpenBSD replacing sudo with doas
    10 :: Frida: Putting the open back into closed software
    14 :: Project Zero: Significant Flash exploit mitigations are live in v18.0.0...

Result:

image

On the left is the pdf generated from the webpage on the right


June 10 2015

Joubin Jabbari | Github | Twitter