Skip to content

Instantly share code, notes, and snippets.

Pedro Worcel droope

Block or report user

Report or block droope

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
View gist:31634b6017a8d57a9aa9
*0.3.0:*
(<class 'dscan.tests.base_http_tests.BaseHttpTests'>, 'test_add_slash_to_urls', <bound method RequestsMock.activate of <responses.RequestsMock object at 0xb5b7aa8c>>, <unbound method BaseHttpTests.test_add_slash_to_urls>, <function test_add_slash_to_urls at 0xb5b96144>)
*0.4.0:*
(<class 'dscan.tests.base_http_tests.BaseHttpTests'>, 'test_add_slash_to_urls', <bound method RequestsMock.activate of <responses.RequestsMock object at 0xb5bcaa6c>>, <unbound method BaseHttpTests.test_add_slash_to_urls>, <unbound method NoneType.test_add_slash_to_urls>)
@droope
droope / gist:6181087
Last active Dec 20, 2015
My first metasploit exploit
View gist:6181087
##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# web site for more information on licensing and terms of use.
# http://metasploit.com/
##
require 'msf/core'
###
You can’t perform that action at this time.