I hereby claim:
- I am CJHackerz on github.
- I am cjhackerz (https://keybase.io/cjhackerz) on keybase.
- I have a public key whose fingerprint is 24D6 A630 64BF D2B7 837F 3402 CA79 7C3E 65A7 944E
To claim this, I am signing this object:
#load_module /usr/local/libexec/nginx/ngx_stream_module.so; | |
worker_processes 2; | |
worker_rlimit_nofile 40000; | |
events { | |
worker_connections 8192; | |
} | |
http { | |
include mime.types; |
echo "##### Variables and Operators" | |
$myVariable = "hello" + " CJHACKERZ " + 1337 | |
echo $myVariable | |
$myVariable -match "cjhackerz" | |
$myVariable -replace "CJHACKERZ", "Anonymous" | |
"1337" -in $myVariable | |
2 -gt 1 | |
4 -lt 10 | |
"hello CJHACKERZ 1337" -in $myVariable | |
echo "##### Split Example" |
import time | |
from tqdm import tqdm | |
import os | |
print("\n ######################################") | |
print(" Welcome to project SARK v1.5 terminal") | |
print(" ######################################\n") | |
for i in tqdm(range(100), ncols=70, desc="Intializing"): | |
time.sleep(0.035) | |
pass | |
os.system('clear') |
cl_crosshair_drawoutline "0.000000" | |
cl_crosshair_dynamic_maxdist_splitratio "0.0" | |
cl_crosshair_dynamic_splitalpha_innermod "1" | |
cl_crosshair_dynamic_splitalpha_outermod "0.300000" | |
cl_crosshair_dynamic_splitdist "5" | |
cl_crosshair_outlinethickness "0.500000" | |
cl_crosshair_sniper_show_normal_inaccuracy "0" | |
cl_crosshair_sniper_width "1" | |
cl_crosshair_t "0.000000" | |
cl_crosshairalpha "255.000000" |
#!/usr/bin/python3 | |
import os | |
from selenium import webdriver | |
from selenium.webdriver.common.keys import Keys | |
from selenium.webdriver.chrome.options import Options | |
import time | |
from getpass import getpass | |
chrome_options = Options() |
I hereby claim:
To claim this, I am signing this object:
Another exmple from 2017, Armis IoT security firm had discovered remote code execution (CVE-2017-0781 and CVE-2017-0782), one results in information leak (CVE-2017-0785) and the last allows an attacker to perform a Man-in-The-Middle attack (CVE-2017-0783) via Bluetooh resulting complete device take over and remote control over Android and IOS devices. Later Google provided kernel level security patches
[Android security
from flask import Flask, jsonify, render_template | |
from flask_cors import CORS | |
DEBUG = True | |
app = Flask(__name__) | |
app.config.from_object(__name__) | |
CORS(app) |
pragma solidity ^0.4.24; | |
contract ECI_India { | |
struct Candidate { | |
string candidateName; | |
uint64 votes; | |
} | |
bool electionState; | |
constructor() public{ |
<?xml version="1.0" encoding="UTF-8"?> | |
<Response> | |
<Say voice="Alice" language="en-US">Congratulations you have been recruited in sector 443 community</Say> | |
</Response> |