Skip to content

Instantly share code, notes, and snippets.

View clone1018's full-sized avatar

Luke Strickland clone1018

View GitHub Profile

Incoming Client Request

[
    "REQ", 
    "F56CF531-2376-4D7C-95D0-2D8F6BCCB061", 
    {
        "authors": [
            "3efdaebb1d8923ebd99c9e7ace3b4194ab45512e2be79c1b7d68d9243e0d2681", 
            "82341f882b6eabcd2ba7f1ef90aad961cf074af15b9ef44a09f9d2a8fbfbe6a2",
            "foobar"
private def processBatch(results: Future[Seq[String]], batch: Seq[String]): Future[Seq[String]] = {
// when the results for the previous batches have been completed, start a new batch
results.flatMap { responses =>
// create the web requests for this batch
val batchFutures: Seq[Future[String]] = batch.map(ws.url(_).get().map(_.body))
// sequence the futures for this batch into a singe future
val batchFuture: Future[Seq[String]] = Future.sequence(batchFutures)
// when this batch is complete, append the responses to the existing responses
<template>
Everything inside of here would be tag_contents
<template> <-- this is where the parser fails with a syntax error
everything inside of here would still be tag_contents
</template>
</template>
<script>
everything in here would be tag_contents
@clone1018
clone1018 / reclaimWindows10.ps1
Last active December 9, 2016 17:26 — forked from alirobe/reclaimWindows10.ps1
"Reclaim Windows 10" turns off a bunch of unnecessary Windows 10 telemetery, removes bloatware, and privacy invasions. Review and tweak before running. Scripts for reversing are included and commented. Originally forked from http://pastebin.com/gQxCUkLP, but the author is on github @ https://github.com/Disassembler0
##########
# Win10 Initial Setup Script
# Author: Disassembler <disassembler@dasm.cz>
# Version: 1.7, 2016-08-15
# dasm's script: https://github.com/Disassembler0/Win10-Initial-Setup-Script/
# THIS IS A PERSONALIZED VERSION
# This script leaves more MS defaults on, including MS security features.
# Tweaked based on personal preferences for @alirobe 2016-11-16 - v1.7.1
inp = "
First page
:page
Second page
:page dskfmsadg
Third page"
<?php
$lines = [
"1100000100011001000101010000111100000011100000110010001100001100000100001001000001001110011100000100001001000001010001001100000100001001000001010001101100000011100000110010001101001100000100011001000101010000011100000011000000110000001101011100000100011000110010001110001100000011100100111000001100001100000011010101000010001100001000110001101010011100100001010",
"1100000011010001000010001100011100000011001001000011001101111100000100011000111000001100111100000011011100110100001110001100000011011101000110001101001100000011011100110001001110011100000100000101000001010000011100000011001001000011001110001100000011000101000110001101101100000011010000110111010000111100000011010101000001001110001000100010000100100000100001010",
"1100000011000000110111010001101100010011010100110100001100011100000011100000110101010001001100000100010100110101010001001100000011001100110101010001001100010100001100110100001100011100010011010100110111010001101100000011010100110000001100001100000011010000111001
<?php foreach(glob("*.png") as $file): ?>
<br><br>
<img src="<?php echo $file; ?>" alt="" class="img-responsive">
<code><?php $userHex = `zbarimg $file`; $hex = str_replace('CODE-128:', '', $userHex); echo $userHex; ?></code>
<pre><?php
$explosion = explode('-', $hex);
foreach($explosion as $k => $expl) {
$hex = str_pad($expl, 4, 0, STR_PAD_LEFT);
65 76 2E 2E 2E 7B 76 20 66 62 72 20 63 7E 72 79
72 20 7B 76 20 7E 79 71 78 65 7A 76 74 7E D4 A4
79 2C 20 63 7E 72 79 72 20 72 7B 20 67 78 73 72
65 2E 2E 2E 7B 76 20 66 62 72 20 63 7E 72 79 72
20 7B 76 20 7E 79 71 78 65 7A 76 74 7E 04 A4 79
2C 20 63 7E 72 79 72 20 72 7B 20 67 78 73 72 65
2E 2E 2E 7B 76 20 66 62 72 20 63 7E 72 79 72 20
7B 76 20 7E 79 71 78 65 7A 76 74 7E 04 A4 79 2C
20 63 7E 72 79 72 20 72 7B 20 67 78 73 72 65 2E
2E 2E 7B 76 20 66 62 72 20 63 7E 72 79 72 20 7B
[derp@derp ~]$ echo -n "U2FsdGVkX1+vupppZksvRf5pq5g5XjFRIipRkwB0K1Y96Qsv2Lm+31cmzaAILwytX/z66ZVWEQM/ccf1g+9m5Ubu1+sit+A9cenDxxqkIaxbm4cMeh2oKhqIHhdaBKOi6XX2XDWpa6+P5o9MQw==" | base64 -d | od -t x8
0000000 5f5f6465746c6153 452f4b66699abaaf
0000020 51315e3998ab69fe 562b740093512a22
0000040 dfbeb9d82f0be93d ad0c2f08a0cd2657
0000060 03115695e9fafc5f e566ef83f5c7713f
0000100 3de0b722ebd7ee46 ac21a41ac7c3e971
0000120 2aa81d7a0c879b5b a2a3045a171e881a
0000140 af6ba9355cf675e9 000000434c8fe68f
0000155
[derp@derp ~]$ echo -n "U2FsdGVkX1+vupppZksvRf5pq5g5XjFRIipRkwB0K1Y96Qsv2Lm+31cmzaAILwytX/z66ZVWEQM/ccf1g+9m5Ubu1+sit+A9cenDxxqkIaxbm4cMeh2oKhqlHhdaBKOi6XX2XDWpa6+P5o9MQw==" | base64 -d | od -t x8
<?php
// Wanted End Permission: reports.incentive.details
Route::group(['prefix' => 'reports', 'namespace' => 'Reports', 'middleware' => 'permissions:reports'], function() {
Route::group(['prefix' => 'incentive', 'namespace' => 'Incentive', 'middleware' => 'permissions:incentive'], function() {
Route::group(['prefix' => 'details', 'namespace' => 'Details', 'middleware' => 'permissions:details'], function() {
//
});
});