Skip to content

Instantly share code, notes, and snippets.

View jasnow's full-sized avatar
🏠
Working from home

Al Snow jasnow

🏠
Working from home
View GitHub Profile
@jasnow
jasnow / gist:b80a18c9acfcf9a3e6817987f5540973
Last active July 1, 2019 20:29
"srb init" produces stack trace with "unexpected errors" message on rails_app5_2 sample app
"srb init" produces stack trace with "unexpected errors" message on rails_app5_2 sample app
#### Versions
- Ruby: ruby 2.4.6p354 (2019-04-01 revision 67394) [x86_64-darwin16]
- Rails: Rails 5.2.3
- Sorbet: Sorbet typechecker 0.4.4358 git 1beae38af163add1e13e897e4771727a0a40c338 built on 2019-06-30 00:44:42 GMT with debug symbols
- Sorbet-Rails: 0.2.0
- OS/Hardware: Mac OS 10.12.6 (Sierra) on Mid-2014 MacBookPro.
#### Input
@jasnow
jasnow / gist:4432aa1ff27174f651f12b1673ca2bd7
Last active February 26, 2020 21:22
OSCP References and my notes as of 2/18/2020 (in no specific order)
OSCP Description: (practical) Solid entry level PRACTICAL certification (note it is an entry level practical not theoretical) A lot of self learning/discovery through practical application. Gold standard for entry pentesting from my understanding.
"The only way to take the OSCP certification exam is to first complete the Penetration Testing with Kali Linux training course"
https://www.offensive-security.com/information-security-certifications/oscp-offensive-security-certified-professional
https://www.offensive-security.com/information-security-training/penetration-testing-training-kali-linux ($800: 30 day lab access + certification)
OSCP Related Links
UPDATED 2/18/2020: https://docs.google.com/spreadsheets/d/1dwSMIAPIam0PuRBkCiDI88pU3yzrqqHkDtBngUHNCw8/edit#gid=0
UPDATED 2/17/2020: https://gist.github.com/colealtdelete/e4ca9329350498a34ece2d87cd5db00b
https://www.youtube.com/watch?v=wjTt-5mfyhY (New OSCP/PWK course for 2020)
@jasnow
jasnow / gist:0e86d716220d22ba484692aa05b5feb6
Created May 10, 2023 21:18
Any ideas to change these links instead of just delete them while updating ruby-oriented advisories?
Any ideas to change these links instead of just deleting them while updating ruby-oriented advisories?
* http://secunia.com/advisories/41930
* http://www.vupen.com/english/advisories/2010/2719
* http://securitytracker.com/id?1024624
* http://www.securityfocus.com/bid/46291
* https://bugzilla.novell.com/show_bug.cgi?id=673010
* http://archives.neohapsis.com/archives/fulldisclosure/2011-02/0337.html
Thanks