Pathfinder Equipment in JSON Form
Posted on Monday, November 4, 2013, 07:10 PM
| nessy
While reading through the Pathfinder Core Rule book I notice there is a specific way to randomly generate magic items for town shops.
I thought about possibly creating some code to generate magic items. However, to start I needed the basic data found in the rule book for equipment.
Below I give you a JSON file I created of the SRD 3.5 equipment:
https://nessy.info/equipment.json In [1]: from urllib2 import urlopen In [2]: from json import loads In [3]: data = urlopen('https://nessy.
Sandpoint at a glance
Posted on Monday, November 4, 2013, 06:32 PM
| nessy
I’m still relatively new to Pathfinder and tabletop RPGs in general, but being as I’ve just started running The Rise of the Runelords Adventure Path Anniversary edition I’ve created a few handy helper files.
One of this files is the Sandpoint at a glance document .
This document has been exported as a easy to print PDF, and includes all locations of shops and key points in the town of Sandpoint.
MagTek USB Card Reader Hacking 2
Posted on Monday, November 4, 2013, 06:14 PM
| nessy
So back at it, now with some code to decode the common financial card:
Let start out by showing the end results of scanning my Freebirds card:
# ./main.py Please swipe your card now: Raw String: %B???????????^FANATIC/FREEBIRDS^4211?;????????????=???????????? Card Holder: FANATIC/FREEBIRDS Card Number: ????-????-????-???? Expiration Date: 11/42 As you can see we still have our raw string, this is being decoded from the code I used last time. However now I have the Card Holder’s name, Card Number, and Expiration date, this format was all outlined quite well on Wikipedia .
MagTek USB Card Reader Hacking
Posted on Monday, November 4, 2013, 06:11 PM
| nessy
So just the other day I received my MagTek MSR100 in the mail, this unit only cost me about $20 and I have to say I’m very satisfied with it. After opening the box it was delivered in I quickly noticed no documentation was provided. No worries I figured, this will make hacking at it that much more fun.
I started out by connecting the USB device to my Gentoo Linux laptop and swiped a card, I noticed on my console prompt the card data was spewed out.
Python Device Hacking (Keyboard)
Posted on Monday, November 4, 2013, 06:09 PM
| nessy
After spending a bit of time hacking at the gamepad I decided to take a deeper look in to how /dev devices worked in Python, the easiest device I could get my hands on of course was a keyboard.
First things first I needed to discover which device name represented my keyboard, to do this I used the virtual /proc filesystem at /proc/bus/input/devices :
I: Bus=0011 Vendor=0001 Product=0001 Version=ab41 N: Name="AT Translated Set 2 keyboard" P: Phys=isa0060/serio0/input0 S: Sysfs=/devices/platform/i8042/serio0/input/input3 U: Uniq= H: Handlers=sysrq kbd event2 B: PROP=0 B: EV=120013 B: KEY=4 2000000 3803078 f800d001 feffffdf ffefffff ffffffff fffffffe B: MSC=10 B: LED=7 From the above output I can see my device is event2 within Handlers, which I know is the block device /dev/input/event2 .