I hereby claim:
- I am antitree on github.
- I am antitree (https://keybase.io/antitree) on keybase.
- I have a public key whose fingerprint is 0B2C 9595 A8E0 3683 A81F E3EE 68B1 A274 584F 01E8
To claim this, I am signing this object:
#!/usr/bin/python | |
# | |
# Author: Antitree | |
# Description: Example of using the new Twitter 1.1 API to | |
# collect all the tweets from a user. | |
# | |
# Derived from tsileo | |
# https://gist.github.com/tsileo/4637864/raw/9ea056ffbe5bb88705e95b786332ae4c0fd7554c/mytweets.py | |
# |
apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
name: poc-list-bypass | |
rules: | |
- apiGroups: | |
- "" | |
resources: | |
- secrets | |
verbs: |
#!/usr/bin/env bash | |
# Ephemeral container deployer | |
# Author: @antitree | |
# This patches over a pod to add an ephemeral container, mounts share volumes, | |
# enters the namespace and some other shit. | |
function description() { | |
echo -e "\nDescription: This plugin speeds up the process of patching a Pod with an | |
ephemeral container. It will automatically mount the PID namespace, secrets, and other volumes | |
to help with debugging or reviewing the main container. \n\n |
{ | |
"basics": { | |
"name": "Mark Manning", | |
"label": "Security Consultant", | |
"picture": "https://pbs.twimg.com/profile_images/658038562261069825/jB7pbsiE_400x400.png", | |
"email": "mark@antitree.com", | |
"phone": "", | |
"website": "https://www.antitree.com", | |
"summary": "Career security consultant with a focus on containerization technologies.", | |
"location": { |
function(t, e, n) { | |
var r, o; | |
r = [n(34), n(35)], o = function(t, e) { | |
var n; | |
return n = function() { | |
function n() {} | |
return n.prototype.changePhone = function(n, r, o, i) { | |
var s, a; | |
a = e.get().userId, s = "/json/users/" + a + "/change_phone/request", t.postAuth(s, { |
#include <Adafruit_NeoPixel.h> | |
//Hacked from the original Adafruit library demo | |
#define PIN 6 //my control pin | |
// Parameter 1 = number of pixels in strip | |
// Parameter 2 = pin number (most are valid) | |
// Parameter 3 = pixel type flags, add together as needed: | |
// NEO_KHZ800 800 KHz bitstream (most NeoPixel products w/WS2812 LEDs) | |
// NEO_KHZ400 400 KHz (classic 'v1' (not v2) FLORA pixels, WS2811 drivers) |
library(ggplot2) | |
load_trace <- function(filename, nickname, proto, n) { | |
x <- read.csv(filename) | |
x$ts <- x$ts - min(x$ts) | |
x$sz <- x$size * ifelse(x$dir=="up", 1, -1) | |
data.frame(x, nickname=nickname, proto=proto, n=n) | |
} | |
# derive nickname, proto, and n columns from the filename. |
Packages: | |
Package [com.google.android.apps.maps] (b364692): | |
userId=10077 | |
sharedUser=SharedUserSetting{40bb50d com.google.android.apps.maps/10077} | |
pkg=Package{3cd2ad3 com.google.android.apps.maps} | |
codePath=/data/app/com.google.android.apps.maps-2 | |
resourcePath=/data/app/com.google.android.apps.maps-2 | |
legacyNativeLibraryDir=/data/app/com.google.android.apps.maps-2/lib | |
primaryCpuAbi=arm64-v8a | |
secondaryCpuAbi=null |
I hereby claim:
To claim this, I am signing this object:
import requests | |
def longify(url): | |
try: | |
r = requests.get(url, allow_redirects=False) | |
if r.status_code = 301: | |
lurl = r.headers['location'] | |
return lurl | |
return url | |
except: |