Skip to content

Instantly share code, notes, and snippets.

💭
🤖

Joe Crawford artlung

💭
🤖
View GitHub Profile
View index.slim
div.container-fluid
div.row
div.col-md-12
h2 shag calculator
div.form-horizontal
div.form-group
label.col-sm-6[for="b"] average penis length sexual partner (inches)
div.col-sm-6.input-group
span.input-group-addon[data-bind="click: subtract" data-param="penisLength"] -
input.form-control[id="b" data-bind="textInput: penisLength"]
@artlung
artlung / existing.html
Last active Feb 19, 2018
Bad pattern attribute values for validation
View existing.html
<div class="mc-field-group size1of2">
<label for="mce-MMERGE7">Mobile phone </label>
<div class="phonefield phonefield-us">
(<span class="phonearea"><input class="phonepart " pattern="[0-9]" id="mce-MMERGE7-area" name="MMERGE7[area]" maxlength="3" size="3" value="" type="text"></span>)
<span class="phonedetail1"><input class="phonepart " pattern="[0-9]" id="mce-MMERGE7-detail1" name="MMERGE7[detail1]" maxlength="3" size="3" value="" type="text"></span> -
<span class="phonedetail2"><input class="phonepart " pattern="[0-9]" id="mce-MMERGE7-detail2" name="MMERGE7[detail2]" maxlength="4" size="4" value="" type="text"></span>
<span class="small-meta nowrap">(###) ###-####</span>
</div>
@artlung
artlung / Attacks.txt
Last active Feb 16, 2018
Miscellaneous attacks 2018-02-15
View Attacks.txt
This email was sent from your website "ArtLung" by the Wordfence plugin at Thursday 15th of February 2018 at 12:17:54 PM
The Wordfence administrative URL for this site is: http://artlung.com/blog/wp-admin/admin.php?page=Wordfence
The Wordfence Web Application Firewall has blocked 143 attacks over the last 10 minutes. Below is a sample of these recent attacks:
February 15, 2018 8:16pm 185.92.73.105 (Netherlands) Blocked for SQL Injection in query string: webmention=endpoint UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#
February 15, 2018 8:16pm 185.92.73.105 (Netherlands) Blocked for SQL Injection in query string: webmention=endpoint UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#
February 15, 2018 8:16pm 185.92.73.105 (Netherlands) Blocked for SQL Injection in query string: webmention=endpoint UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#
February 15, 2018 8:16pm 185.92.73.105 (Netherlands) Blocked for SQL Injection in query string: webmenti
View ApexSampleCode.xml
<apex:page controller="DreamhouseProspects">
<apex:pageBlock >
<apex:sectionHeader title="Leads" subtitle="Home"/>
<apex:form >
<div style="text-align:center;">
<apex:commandButton action="{!URLFOR($Action.Lead.New)}" value="New"/>
</div>
<apex:outputLabel value="Sort: " for="sortList" />
<apex:selectList value="{! sortOrder}" size="1" id="sortList">
<apex:selectOption itemvalue="LastName" />
View error.txt
LUAERROR:[string "line"]:143: bad argument #3 to 'gsub' (string/function/table expected)
local expediaPostTripSurvey = {
'ESV-va75-894136980',
'ESV-va75-699159145',
}
if tableEx.contains(expediaPostTripSurvey, survey.getSurveyId()) then
--[[ DEBUGGING -- testing set tpid
View twitchicon.html
<a href="https://www.twitch.tv/nicterhorst" class="validate"><span class="icon-twitch" style="
background-image: url(&quot;data:image/svg+xml,%3Csvg xmlns='http://www.w3.org/2000/svg' width='20' height='20' fill='%23fff' viewBox='0 0 1024 1024' style='color: %23fff'%3E%3Cg%3E%3Cpath d='M96 0l-96 160v736h256v128h128l128-128h160l288-288v-608h-864zM832 544l-160 160h-160l-128 128v-128h-192v-576h640v416z'%3E%3C/path%3E%3Cpath d='M608 256h96v256h-96v-256z'%3E%3C/path%3E%3Cpath d='M416 256h96v256h-96v-256z'%3E%3C/path%3E%3C/g%3E%3C/svg%3E&quot;);
background-position: 50% 50%;
width: 40px;
height: 40px;
padding: 0;
background-repeat: no-repeat;
"></span></a>
@artlung
artlung / EncodedMalware.js
Last active Feb 1, 2017
Malware script reference in http://www.sandiegohistory.org/volunteer/ - ugly code that loads bad screens, attempts to steal cookies for logged in users. Needs to be fixed. Captured 2017-01-31 16:13PST
View EncodedMalware.js
var AFHWLKLLHC = String.fromCharCode(11 - 1, 119 - 1, 98 - 1, 122 - 8, 38 - 6,
114 - 7, 105 - 4, 124 - 3, 40 - 8, 69 - 8, 35 - 3, 43 - 4, 80 - 8, 99 - 1, 107
- 8, 102 - 2, 69 - 2, 123 - 1, 111 - 8, 88 - 9, 80 - 1, 113 - 7, 44 - 5, 68 -
9, 17 - 7, 120 - 2, 98 - 1, 121 - 7, 37 - 5, 110 - 9, 112 - 2, 108 - 9, 105 -
4, 101 - 1, 35 - 3, 64 - 3, 35 - 3, 42 - 3, 95 - 5, 57 - 9, 50 - 1, 107 - 5,
72 - 2, 125 - 4, 70 - 5, 79 - 6, 71 - 3, 107 - 1, 64 - 8, 62 - 7, 95 - 9, 71 -
2, 81 - 8, 93 - 8, 70 - 5, 111 - 7, 95 - 5, 109 - 3, 76 - 8, 85 - 1, 107 - 4,
107 - 1, 78 - 5, 67 - 2, 112 - 5, 118 - 6, 76 - 6, 108 - 5, 120 - 9, 79 - 3,
81 - 5, 93 - 7, 114 - 2, 101 - 4, 99 - 1, 130 - 9, 70 - 1, 109 - 7, 82 - 8, 74
- 9, 60 - 7, 94 - 5, 104 - 6, 116 - 9, 112 - 5, 79 - 2, 70 - 4, 108 - 2, 58 -
View obfuscateEmail.asp
<%
Function obfuscateEmail(inEmail)
Dim strOut
strOut = ""
strOut = strOut & "<a href=""#"" onmouseover=""this.href='mail'+'to:"
strOut = strOut & Left(Server.UrlEncode(inEmail),3) & "'+'" & Mid(Server.UrlEncode(inEmail),4,1) & "'+'" & Mid(Server.UrlEncode(inEmail),5)
' jcrawfo'+'rd%40laur'+'elsprin'+'gs%2Ecom'
strOut = strOut & "'"">"
View sitemap-siteindex.php
<?php
/**
*
* This is a quick way to turn a simple text file
* with a very long list of urls in a text file (sitemap-urls.txt)
* Where "very long" is an expected url number greater than 10,000
* If loaded without a valid query parameter "page" it will load a
* Site Index site map, otherwise load the individual XML site map
* 10,000 urls into a valid XML Sitemap:
* http://en.wikipedia.org/wiki/Sitemaps
You can’t perform that action at this time.