Skip to content

Instantly share code, notes, and snippets.

**** PANIC: ****
Stack protector: Canary modified
**** CONTEXT: ****
Connection::on_data: data from 10.0.0.42:80 10.0.0.1:59532 (ESTABLISHED)
GET /api/dashboard HTTP/1.1
Host: 10.0.0.42
Connection: keep-alive
Accept: application/json, text/plain, */*
MMMMMMMMMMMMMMMNdhs++shdNMMMMMMMMMMMMMMM
MMMMMMMMMMMNNhyo++++++++oyhNNMMMMMMMMMMM
MMMMMMMMNmyso++++++++++++++osymNMMMMMMMM
MMMMNmhyo++++++++++++++++++++++oyhmNMMMM
NNdho++++++++++++++oo++++++++++++++ohdNN
hyoo++++++++++++osssssso++++++++++++ooyh
yyhhyso++++++oos+:. .:+soo++++++osyhddd
yyyyyyhysoos+:`` ``:+sooyhddddddd
yyyyyyyyyNd+:` `-/smddddddddd
yyyyyyyyyNdddho+. .//++/:mddddddddd
o oooooo o
oo oooooooooo oo
oo oooooooooCoooooooooo oo
o oooooooooooooooooooooooo o
o oooooooooooooooooooooooCoooooooooo o
oooooooooooooooooooooooooooooooooooooo
oooooooooooooooCoooooooooooooooooooooooooooooooo
o oooooooooooooCoooooooooooooooooooooooooooooooooooooo o
oo oooooooooooooooooooooooooooooooooooooooooooooooooooooooooooo oo
o oooooooooooooooooooooooCoooooooooooooooooooooooooooooooooooooooooo o
#!/usr/bin/perl
use IO::Socket;
use constant MAXWRITE => 2000; #biggest write we'll attempt
use strict;
use warnings;
$|++; # autoflush stdout
my ($host,$port) = @ARGV;
@perbu
perbu / captcha.md
Created September 24, 2017 07:05 — forked from Samuirai/captcha.md
G-WAN Captcha Decode

G-WAN is a new free web server. They seem to be very proud of it, or at least just want to make a lot of money. Well anyway, in almost every sentence they write, they claim that they are 20% cooler than anything else. It feels a bit arrogant. I have to admit, I don't know a lot about web servers, so I can't speak to how good they are.

However, then I saw their Captcha example. I also don't know much about machine learning algorithms, OCR, and stuff like that, but I do know how to read pixels. I also know how to compare values with python :P

demo

They say the following about their Captcha:

Iface eth0 dhcp
eth0.index: 0
Iface k1 {
address: 10.0.1.1,
netmask: 255.255.255.0,
index: 2,
prerouting: [ fw, mydnat ]
}
@perbu
perbu / nacl.txt
Created December 19, 2017 08:47
Example NaCl config for a simple firewall.
Iface outside {
address: 10.0.0.2,
netmask: 255.255.255.0,
gateway: 10.0.0.1,
index: 0
}
Iface inside {
address: 192.168.0.1,
netmask: 255.255.255.0,
/*
This prints out A,B,C,D and E.
What is the order and what is printed after E:
*/
myAdd = (a, b) => {
return new Promise((resolve, reject) => {
resolve(a + b);
});
function signalHandle(signal) {
console.log('Received signal ', signal);
server.em.emit("serverShutdown", "Shutdown initiated by signal "+signal);
}
process.on('SIGINT', signalHandle);
process.on('SIGTERM', signalHandle);
#!/bin/zsh
#
# Auto activate a python virtualenv when entering the project directory.
# Installation:
# source virtualenv-auto-activate.sh
#
# Usage:
# Function `venvconnect`:
# Connect the currently activated virtualenv to the current directory.
#