Skip to main content

Determine who's in the hackerspace based on DHCP leases.

Project description

12:01 < tlevine> Hi! I'm visiting from . Is anyone inside? I'm not quite convinced
12:03 <@emeryth> tlevine: hi, the website really works, it's too early for hacking
12:04 <@emeryth> try again later, around 6 pm
12:07 < tlevine> okay thanks
12:07 -!- Petros [] has quit [Ping timeout: 250 seconds]
12:07 < tlevine> when i get in and understand how it works, i'll document it better so random people
like me actually believe it
12:09 <@ar> tlevine: tl;dr: it's an opt-in system where you, if you're a member, claim a network device
as their own and if the said device has a valid dhcp lease, you get listed as being at the
12:10 <@ar> tlevine: you can also claim a device and then set it as hidden

Run like so for testing. ::

./at-hackerspace --lease-file at/test/fixtures/leases --fake --claimable-prefix=




Project details

Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Files for at-hackerspace, version 0.2.0
Filename, size File type Python version Upload date Hashes
Filename, size at-hackerspace-0.2.0.tar.gz (8.3 kB) File type Source Python version None Upload date Hashes View

Supported by

AWS AWS Cloud computing Datadog Datadog Monitoring DigiCert DigiCert EV certificate Facebook / Instagram Facebook / Instagram PSF Sponsor Fastly Fastly CDN Google Google Object Storage and Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Salesforce Salesforce PSF Sponsor Sentry Sentry Error logging StatusPage StatusPage Status page