A tweet-sized debugger for visualizing your CSS layouts. Outlines every DOM element on your page a random (valid) CSS hex color.
One-line version to paste in your DevTools
Use $$
if your browser aliases it:
~ 108 byte version
# ajout des informations pour l'animation | |
# --------------------------------------- | |
library(gganimate) | |
library(broom) | |
dc <- bind_rows(dc_jour,dc_insee_jour,deces_ecdc,deces_insee_provisoires) | |
# on démarre du fichier dc utilisé pour le graphique surmortalité |
#!/usr/bin/env bash | |
# Bash 4 required. | |
# brew install bash | |
USAGE=$(cat <<EOF_USAGE | |
USAGE: ${SCRIPT} <options> | |
The following options are supported: |
# From http://stackoverflow.com/questions/2006351/gettext-po-files-under-version-control/11291001#11291001 | |
[diff "msgcat"] | |
textconv = msgcat --no-location --no-wrap --sort-output |
diff -urN mimemail.orig//mimemail.info mimemail//mimemail.info | |
--- mimemail.orig//mimemail.info 2015-01-12 12:06:10.000000000 +0100 | |
+++ mimemail//mimemail.info 2015-01-12 12:08:23.000000000 +0100 | |
@@ -1,6 +1,5 @@ | |
name = Mime Mail | |
description = Send MIME-encoded emails with embedded images and attachments. | |
-dependencies[] = mailsystem | |
package = Mail | |
core = 7.x | |
name: 'Ajax Example' | |
description: 'Just an Ajax Example' | |
core: 8.x | |
type: module |
<?php | |
/** | |
* D7 autologin. | |
* Exploits SA-CORE-2014-005 to change your anonymous session into an uid 1 session. | |
* In order to work, first you need to have an anonymous session in the sessions table. | |
* One way to achieve this is to go to the update.php page. | |
* | |
* Usage: php d7-autologin.php http://example.com 127.0.0.1 | |
* |
<?php | |
/******************************************************** | |
* Drupal 7 SQL Injection vulnerability demo | |
* Created by Milan Kragujevic (of milankragujevic.com) | |
* Read more at http://milankragujevic.com/post/66 | |
* This will change the first user's username to admin | |
* and their password to admin | |
* Change $url to the website URL | |
********************************************************/ | |
$url = '[URL HERE]'; // URL of the website (http://domain.com/) |
SektionEins GmbH | |
www.sektioneins.de | |
-= Security Advisory =- | |
Advisory: Drupal - pre-auth SQL Injection Vulnerability | |
Release Date: 2014/10/15 | |
Last Modified: 2014/10/15 | |
Author: Stefan Horst [stefan.horst[at]sektioneins.de] |
#!/bin/sh | |
# ================================================ | |
# Description: Run compass watch in background | |
# GistID: 965f3e1a0876592db33f | |
# GistURL https://gist.github.com/allex/965f3e1a0876592db33f | |
# Author: Allex Wang (allex.wxn@gmail.com) | |
# Last Modified: Tue Dec 09, 2014 12:12PM | |
# ================================================ |