Skip to content

Instantly share code, notes, and snippets.

View infoslack's full-sized avatar
🏠
Working from home

Daniel Romero infoslack

🏠
Working from home
View GitHub Profile
@infoslack
infoslack / cat.gif
Last active February 25, 2024 15:37
Shhh
cat.gif
@infoslack
infoslack / main.py
Last active November 21, 2023 16:01
Technical interview helper
# dependencies
# pip install -U openai gradio
import os, openai
import gradio as gr
openai.api_key = 'sk-xxxxxx'
messages = [{"role": "system", "content": """Assistant is an expert candidate in
technical IT job interviews. Currently, the interview is
focused on a position for Platform Engineer. So, you have skills
@infoslack
infoslack / sdr.md
Created December 28, 2022 16:48
SDR - Software Defined Radio
@infoslack
infoslack / carros.csv
Last active January 12, 2023 18:19
carros csv test
Fabricante Cor Quilometragem Portas Preco
Toyota Branco 150043 4 R$ 24,000.00
Honda Vermelho 87899 4 R$ 25,000.00
Toyota Azul 32549 3 R$ 27,000.00
BMW Preto 11179 5 R$ 122,000.00
Nissan Branco 213095 4 R$ 13,500.00
Toyota Verde 99213 4 R$ 14,500.00
Honda Azul 45698 4 R$ 17,500.00
Honda Azul 54738 4 R$ 27,000.00
Toyota Branco 60000 4 R$ 26,250.00

Keybase proof

I hereby claim:

  • I am infoslack on github.
  • I am infoslack (https://keybase.io/infoslack) on keybase.
  • I have a public key whose fingerprint is 87BA 79B8 1CAD 72DE 8F91 D5AB C5DE 4724 27D3 DFD2

To claim this, I am signing this object:

@infoslack
infoslack / nginx_dos.py
Created February 26, 2014 16:02
Exploit: nginx v1.3.9-1.4.0 DOS POC (CVE-2013-2070)
# Exploit Title: nginx v1.3.9-1.4.0 DOS POC (CVE-2013-2070)
# Google Dork: CVE-2013-2070
# Date: 16.05.2013
# Exploit Author: Mert SARICA - mert [ . ] sarica [ @ ] gmail [ . ] com - http://www.mertsarica.com
# Vendor Homepage: http://nginx.org/
# Software Link: http://nginx.org/download/nginx-1.4.0.tar.gz
# Version: 1.3.9-1.4.0
# Tested on: Kali Linux & nginx v1.4.0
# CVE : CVE-2013-2070
@infoslack
infoslack / tomcat_mce_upload.rb
Created February 4, 2014 00:53
Apache Tomcat Manager Code Execution Exploit
##
# This module requires Metasploit: http//metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
Rank = ExcellentRanking