Skip to content

Instantly share code, notes, and snippets.

View endersonmenezes's full-sized avatar
:octocat:
Focusing

Enderson Menezes (Mr. Enderson) endersonmenezes

:octocat:
Focusing
View GitHub Profile
@endersonmenezes
endersonmenezes / views.py
Created April 24, 2019 12:17
Django - Cursor MongoDB to Pandas DataFrame
import pymongo
import pandas as pd
from pymongo import MongoClient
def test_view(request):
client = MongoClient('Mongo URI') # Conexão ao Banco
db = client['database_name'] # Seleção de Banco de Dados
test = db.test # Seleção da Coleção de Dados
test = pd.DataFrame(list(test.find())) #Consulta tudo na Coleção -> Lista (python) -> DataFrame (pandas)
@endersonmenezes
endersonmenezes / forms.py
Last active April 24, 2019 12:18
Django Forms with Args making query in model
# Enderson Menezes
# Django Brasil
# 05/04/2019
# Django 2.2
from django import forms
from .models import CadastroSubEntidades
# Declare your form
class EscalarOcorrenciaRespForm(forms.Form):
@endersonmenezes
endersonmenezes / bruteforce.py
Last active August 23, 2019 21:53
Brute Force Discont for TicNova
# Copyright (c) 2018. Enderson Menezes Cândido [www.endersonmenezes.com.br]
# Your console will display a list of available discount coupons.
# Do not use this code to gain advantage or illegally enter the event.
# Code just to demonstrate that creating discount coupons in sympla using simple word combinations can be hacked.
# This gist serves to show how social engineering be taken care of by event organizations.
# To event organizers please create discount coupon processes and tracking processes.
# Working Since 2018
import requests
import itertools

Keybase proof

I hereby claim:

  • I am endersonmenezes on github.
  • I am enderson (https://keybase.io/enderson) on keybase.
  • I have a public key ASAL16wIwUY14vEncg6Q3J-scqM93knGIc7Tc6r4rMsv3Qo

To claim this, I am signing this object:

@endersonmenezes
endersonmenezes / file.py
Last active January 17, 2020 17:46
Uma breve comparação entre verificação de itens em um array, utilizando chaves aleatórias em MD5. O conceito desse teste é criar uma ordem de prioridade das chaves, e chegar uma váriavel 'chave' respeitando essa lógica.
import secrets
import time
import numpy as np
resultados_if = []
resultados_last = []
resultados_for = []
chave_full = secrets.token_urlsafe(256)
chave_com_tag = secrets.token_urlsafe(256)
chave_com_usage = secrets.token_urlsafe(256)
@endersonmenezes
endersonmenezes / section-dates.ipynb
Last active January 17, 2020 20:41
This code makes you enter a date range, it will divide that range into 12 sections, checking if a target is in those 12 sections and what the index of that section is.
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
@endersonmenezes
endersonmenezes / 0social.png
Last active July 22, 2020 14:22
Social Networks
0social.png

Keybase proof

I hereby claim:

  • I am endersonmenezes on github.
  • I am enderson (https://keybase.io/enderson) on keybase.
  • I have a public key ASA8SRcGpxNUhQ11anqK4amQlbTjuN8CbpapFCO37CmV6Qo

To claim this, I am signing this object:

@endersonmenezes
endersonmenezes / arvore_binaria.py
Created June 17, 2021 18:33
Arvore Binária que Adivinha Número de 0 a 100
# Busca Binária de 0 - 100 (Número Inteiros)
def pesquisa_binaria(numero, lista):
baixo = 0
alto = len(lista) - 1
contador = 0
while baixo <= alto:
contador += 1
meio = round((baixo + alto) / 2)
chute = lista[meio]
@endersonmenezes
endersonmenezes / keybase.md
Created October 15, 2021 19:08
keybase.md

Keybase proof

I hereby claim:

  • I am endersonmenezes on github.
  • I am enderson (https://keybase.io/enderson) on keybase.
  • I have a public key ASAxIp9Pb0rf7bwUPdo6shH8GRZ8BRvFysDue-IynLrGFgo

To claim this, I am signing this object: