Skip to content

Instantly share code, notes, and snippets.

View djcas9's full-sized avatar
🟣
Work

Dustin Willis Webber djcas9

🟣
Work
View GitHub Profile

Keybase proof

I hereby claim:

  • I am mephux on github.
  • I am dweb (https://keybase.io/dweb) on keybase.
  • I have a public key whose fingerprint is 0794 02D4 1707 6ED8 6B25 D134 7810 4395 1BCB FC8A

To claim this, I am signing this object:

@djcas9
djcas9 / crappy-csgo-walls.cs
Last active January 28, 2023 22:37
csgo wall hack - using VAMemory so it will get VAC for sure
using System;
using System.Threading;
using System.Diagnostics;
namespace csgo_walls {
public class Glow {
public static int Client;
public static string process = "csgo";
We couldn’t find that file to show.
@djcas9
djcas9 / keybase.md
Created September 18, 2014 04:07
keybase.md

Keybase proof

I hereby claim:

  • I am mephux on github.
  • I am dweb (https://keybase.io/dweb) on keybase.
  • I have a public key whose fingerprint is 4852 4231 3096 A57C C09B A10C CCF9 B870 24AF C63B

To claim this, I am signing this object:

var Blah = {
hello: function(items) {
var self = this;
_.each(items, function() {
self.items.push(item.json);
});
},
something: function() {
{
"event_id": 10750,
"sensor": {
"name": "snorby.org",
"interface": "eth0",
"id": 0,
"filter": null,
"encoding": null,
"detail": null
},
[White "edizx"]
[Black "mephux"]
[Result "0-1"]
1.e4 d5 2.exd5 Qxd5 3.Nc3 Qe5+ 4.Be2 Nc6 5.Nf3 Qe6 6.O-O Nf6 7.Ng5 Qf5 8.d3 h6 9.Nge4 Nxe4 10.Nxe4 e5 11.f4 Be6 12.fxe5 Qxe5 13.Bf4 Bc5+ 14.Kh1 Qxb2 15.Nxc5 O-O-O 16.Nxe6 fxe6 17.Bf3 Nd4 18.Be5 Qxc2 19.Bxd4 Qxd1 20.Rfxd1 Rxd4 21.Rab1 b6 22.Rb5 Rhd8 23.Be4 c5 24.Rf1 Ra4 25.Rb2 g5 26.Rf6 Rxe4 27.h3 Re1+ 28.Kh2 Rxd3 29.Rxh6 c4 30.Rf2 c3 31.Rh7 Rd8 32.Rc2 Re3 33.Rxa7 Rd2 34.a4 Rxc2
0-1
[White "Riveen"]
[Black "mephux"]
[Result "0-1"]
1.e4 d5 2.exd5 Qxd5 3.f4 Bf5 4.g3 Nf6 5.Nf3 Be4 6.d4 Bxf3 7.Rg1 Bxd1 8.Kxd1 Qxd4+ 9.Ke1 Qxg1 10.Kd2 Nc6 11.Nc3 Rd8+ 12.Ke2 Qxh2+ 13.Kf3 Nd4+ 14.Ke3 Qxg3+ 15.Kd2 Qxf4+ 16.Kd1 Qxf1+ 17.Kd2 Ne4+ 18.Ke3 Qf3#
0-1
@djcas9
djcas9 / gist:5021794
Last active December 14, 2015 03:29
This is how you sacrifice pieces. Mephux: White
1.e4 e5
2.Nf3 Nc6
3.d4 Qf6
4.dxe5 Nxe5
5.Bg5 Nxf3+
6.Qxf3 Qxg5
7.Bc4 Qc1+
8.Ke2 Qxh1
9.Qxf7+ Kd8
10.Qxf8#
@djcas9
djcas9 / rails_sqli.rb
Last active December 10, 2015 22:58 — forked from postmodern/rails_sqli.rb
#!/usr/bin/env ruby
#
# Proof-of-Concept exploit for Rails SQL Injection (CVE-2013-0156)
#
# ## Advisory
#
# https://groups.google.com/forum/#!topic/rubyonrails-security/61bkgvnSGTQ/discussion
#
# ## Caveats
#