Other languages:
Rooting the Transcend WiFi SD card
by injecting commands into the wifi channel config
This exploit requires opening the "Files" page of the card's web interface and escaping to the root of the file system.
INCHES = 25.4; | |
brick_depth = (3 + 5/8) * INCHES; | |
brick_height = (2 + 1/4) * INCHES; | |
brick_length = (7 + 5/8) * INCHES; | |
mortar_gap = (3/8) * INCHES; | |
module Brick() { | |
cube([brick_length, brick_depth, brick_height]); |
import os | |
import cProfile | |
from marshmallow import Schema | |
BRANCH = os.popen('git rev-parse --abbrev-ref HEAD').read().strip() | |
values = (1, True, '3') | |
class ImplicitSchema(Schema): | |
class Meta: |
diff --git a/benchmarks/run.py b/benchmarks/run.py | |
index c1209e9..9f5681f 100644 | |
--- a/benchmarks/run.py | |
+++ b/benchmarks/run.py | |
@@ -15,6 +15,7 @@ from pathlib import Path | |
from statistics import StatisticsError, mean | |
from statistics import stdev as stdev_ | |
+from test_marsha import TestMarsha | |
from test_pydantic import TestPydantic |
beforeEach(function () { | |
jasmine.addMatchers({ | |
toHaveBeenResolved: function() { | |
return { | |
compare: function(promise) { | |
promise | |
.thenCatch(function() { | |
expect('promise').toBe('resolved'); | |
}); |
beforeEach(function () { | |
jasmine.Matchers = {prototype: {}}; | |
jasmine.Env = {prototype: {}}; | |
require('promise-matchers'); | |
Object.keys(jasmine.Matchers.prototype).forEach(function(key) { | |
var matcher = jasmine.Matchers.prototype[key]; | |
jasmine.Matchers.prototype[key] = function() { | |
return { | |
compare: function(actual, done, expected) { |
10:05:47.619 INFO - Executing: [new session: Capabilities [{browserName=firefox}]]) | |
10:05:47.620 INFO - Creating a new session for Capabilities [{browserName=firefox}] | |
org.openqa.selenium.firefox.NotConnectedException: Unable to connect to host localhost.localdomain on port 7055 after 45000 ms. Firefox console output: | |
Xlib: extension "RANDR" missing on display ":99". | |
process 6144: D-Bus library appears to be incorrectly set up; failed to read machine uuid: Failed to open "/var/lib/dbus/machine-id": No such file or directory | |
See the manual page for dbus-uuidgen to correct this issue. | |
D-Bus not built with -rdynamic so unable to print a backtrace | |
Redirecting call to abort() to mozalloc_abort | |
Other languages:
by injecting commands into the wifi channel config
This exploit requires opening the "Files" page of the card's web interface and escaping to the root of the file system.
function Bucket(capacity, level){ | |
this.capacity = capacity; | |
this.level = level || 0; | |
} | |
Bucket.prototype.fill = function(){ | |
this.level = this.capacity; | |
} | |
Bucket.prototype.discard = function(){ | |
this.level = 0; | |
} |
I hereby claim:
To claim this, I am signing this object: