Skip to content

Instantly share code, notes, and snippets.

>>> interesting

Xarrow Xarrow

>>> interesting
Block or report user

Report or block Xarrow

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
View 简明 pipenv .md


  • 基于 Python3.7 环境


  • pip 方式

    pip install pipenv

View nginx firebasestorage proxy
# 46789
set $simplebox "simplebox";
listen 46789 fastopen=5;
#ssl_certificate /etc/nginx/sites-available/ssl/server.crt;
#ssl_certificate_key /etc/nginx/sites-available/ssl/server.key;
# ssl_certificate /etc/letsencrypt/live/;
# ssl_certificate_key /etc/letsencrypt/live/;
Xarrow /
Created Jul 4, 2019 — forked from securitytube/
WLAN SSID Sniffer in Python using Scapy
#!/usr/bin/env python
from scapy.all import *
ap_list = []
def PacketHandler(pkt) :
if pkt.haslayer(Dot11) :
if pkt.type == 0 and pkt.subtype == 8 :
Xarrow /
Created Jul 3, 2019 — forked from sergray/
Asynchronous requests in Flask with gevent
"""Asynchronous requests in Flask with gevent"""
from time import time
from flask import Flask, Response
from gevent.pywsgi import WSGIServer
from gevent import monkey
import requests
Xarrow /
Created Mar 25, 2019
import java.util.Optional;
public final class PsbEnum {
public static enum SexType {
MALE(1, ""),
FEMALE(2, ""),
UNKNOWN(9, "未说明");
private Integer type;
Xarrow /
Created Jan 29, 2019 — forked from prasanthj/
Native memory tracking in JVM

Enable native memory tracking in JVM by specifying the following flag


Know the <PID> of the java process


To print ps based RSS

ps -p <PID> -o pcpu,rss,size,vsize

To print native memory tracking summary

View AAA
# -*- coding:utf-8 -*-
Verion: 1.0
Since : 3.6
Author: zhangjian
File: csdaf
Time: 2018/12/12
Xarrow /
Created Sep 17, 2018 — forked from spinpx/
TCP Reset attack in practice #Security #Network

TCP Reset attack

RESET is a flag in TCP packets to indicate that the conection is not longer working. So, if any of the two participants in a TCP connection send a packet contains such a RESET flag, the connection will be closed immediately.

Thus it can be use to attack TCP connections once the attacker can forge TCP packets from any of the two parties if he or she know their IPs, ports and the sequence number of current TCP connection.

The attack can be used to make certain users to fail to use certain network services based on TCP if we know the information above.

In practice, we should eavesdrop the victims’ communications to get their IPs, ports and the sequence number. You can do it by:

Xarrow / ad.html
Created Jan 24, 2017
View ad.html
<meta name="viewport" content="width=device-width, initial-scale=1.0">
body {
margin: 0;
color: #000;
overflow: hidden;
padding: 0;
Xarrow /
Created Jan 11, 2016
__author__ = 'ZhangJian'
import requests
import time
import sys
import os
import log
from bs4 import BeautifulSoup
from subprocess import Popen
You can’t perform that action at this time.