wire scl to analog in wire sda to analog in
void setup() {
Wire.begin(4);
Wire.onReceive(dataReceived);
0448a4f1893f2ba253bb0055dab0e0f5df36d5b7a2863dcdafae99d8c35c986ec6c7702117bb406d2636fe4d41cda383cebce54467ccaf7fd14826734aba2a4760 |
// ==UserScript== | |
// @name Estately + Zillow Plugin | |
// @namespace http://tampermonkey.net/ | |
// @version 0.1.1 | |
// @description Plugin | |
// @author You | |
// @match https://www.estately.com/* | |
// @grant none | |
// @run-at document-end | |
// @require https://code.jquery.com/jquery-3.3.1.min.js |
import itertools | |
#in_ = input() | |
mod = 1000000007 | |
# find possible expressions | |
# find number of steps to sort expression | |
def iters_to_sort(s: str): | |
c = 0 | |
s_list = list(s) |
wire scl to analog in wire sda to analog in
void setup() {
Wire.begin(4);
Wire.onReceive(dataReceived);
import sys, os, tempfile, shutil | |
import tarfile | |
import requests | |
import argparse | |
requests.packages.urllib3.disable_warnings(category=requests.packages.urllib3.exceptions.InsecureRequestWarning) | |
SPLUNK_APP_NAME = '_PWN_APP_' | |
Hello! I ended up reverse-engineering the badge to get the correct note sequence, get the correct codes for the friends, and flashing a custom boot image to my badge. This short README will include the relevant functions to the challenges + boot images.
Cybersecurity club admin at the University of Illinois, SIGPwny. We do CTFs and fun stuff! This year, we had Minh present on Rick Rolling his high school, and an alum, Ravi, present on PACMAN M1 Attacks. This summer, I was reverse-engineering and exploiting cellular modems.