Skip to content

Instantly share code, notes, and snippets.

View carpedm20's full-sized avatar

Taehoon Kim carpedm20

View GitHub Profile
carpedm20 /
Last active September 11, 2018 07:37
#-*- coding: utf-8 -*-
import json
import requests
from tqdm import tqdm
DIST = 0.01
carpedm20 /
Created July 14, 2016 19:01
NAF-tensorflow writeup


First, clone the project:

git clone
cd NAF-tensorflow

To train a model for Pendulum:

python --env_name=Pendulum-v0 --is_train=True

carpedm20 /
Last active June 20, 2016 03:42
DQN-tensorflow writeup


First, clone the project:

git clone
cd DQN-tensorflow

To train a model for Breakout:

python --env_name=Breakout-v0 --is_train=True

import requests
r = requests.get("")
html = r.text
idx = html.find("<title>")
print html[idx:idx+20]
carpedm20 /
Last active August 29, 2015 14:15
Mail notification
import smtplib
from email.mime.text import MIMEText
import netrc
from docopt import docopt
DEFAULTSUBJECT = "Job finished from PAIL Minsky"

Intercepts HTTPs Traffic with Python & mitmproxy


Modern applications usually make use of back-end API servers to provide their services. With a non-transparent HTTPs proxy, which intercepts the communication between clients and servers (aka the man-in-the-middle scheme), you can easily manipulate both API requests and responses.

This manual helps you create your own proxy with Python and mitmproxy/libmproxy. Mitmproxy ships with both a standalone command-line tool (mitmproxy) and a Python library (libmproxy).

## make !
## clean just incase
make clean -C .
## build
carpedm20 /
Created October 7, 2014 14:39
Image-net 2012
for name in $image_path/val/*.JPEG; do
convert -resize 256x256\! $name $name
carpedm20 /
Last active August 29, 2015 14:06
HeXA 2nd CTF by tunz (2014.09.13)
print 'aaa'*2+hex(0x20acecafe-0xdeadbeef-eval('0x'+'aaaa'.encode('hex'))*2)[2:].decode('hex')