Keybase proof
I hereby claim:
- I am endersonmenezes on github.
- I am enderson (https://keybase.io/enderson) on keybase.
- I have a public key ASAxIp9Pb0rf7bwUPdo6shH8GRZ8BRvFysDue-IynLrGFgo
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
# Busca Binária de 0 - 100 (Número Inteiros) | |
def pesquisa_binaria(numero, lista): | |
baixo = 0 | |
alto = len(lista) - 1 | |
contador = 0 | |
while baixo <= alto: | |
contador += 1 | |
meio = round((baixo + alto) / 2) | |
chute = lista[meio] |
I hereby claim:
To claim this, I am signing this object:
import secrets | |
import time | |
import numpy as np | |
resultados_if = [] | |
resultados_last = [] | |
resultados_for = [] | |
chave_full = secrets.token_urlsafe(256) | |
chave_com_tag = secrets.token_urlsafe(256) | |
chave_com_usage = secrets.token_urlsafe(256) |
I hereby claim:
To claim this, I am signing this object:
# Copyright (c) 2018. Enderson Menezes Cândido [www.endersonmenezes.com.br] | |
# Your console will display a list of available discount coupons. | |
# Do not use this code to gain advantage or illegally enter the event. | |
# Code just to demonstrate that creating discount coupons in sympla using simple word combinations can be hacked. | |
# This gist serves to show how social engineering be taken care of by event organizations. | |
# To event organizers please create discount coupon processes and tracking processes. | |
# Working Since 2018 | |
import requests | |
import itertools |