Skip to content

Instantly share code, notes, and snippets.

View stevespringer's full-sized avatar

Steve Springer stevespringer

View GitHub Profile
@stevespringer
stevespringer / bank-statement-parser.ipynb
Last active January 24, 2024 18:25
Bank Statement Parser.ipynb
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
@stevespringer
stevespringer / landlord-statement-email-mining.ipynb
Created January 11, 2024 14:33
Landlord Statement Email Mining.ipynb
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
@stevespringer
stevespringer / results.tsv
Last active March 27, 2023 20:36
Search results of dialogue from several PD films for the word "one"
It Started with Muybridge (1964) – The Public Domain Review.mp4 241120 247120 These shoulder mounts developed over a period of 20 years illustrate one of NOL's contributions
It Started with Muybridge (1964) – The Public Domain Review.mp4 258160 263600 Amid the preparations for this underwater test, the purpose of one piece of equipment
It Started with Muybridge (1964) – The Public Domain Review.mp4 280880 286240 The high-speed cameras expose their 100-foot magazines within one second.
It Started with Muybridge (1964) – The Public Domain Review.mp4 382000 387400 Blashing at one millionth of a second, their shadow graph pictures record the projectile's
It Started with Muybridge (1964) – The Public Domain Review.mp4 426840 434080 caught at an exposure of one 2 millionth of a second.
It Started with Muybridge (1964) – The Public Domain Review.mp4 489480 493800 as brief as one-fourth of a millionth of a second.
It Started with Muybridge (1964) – The Public Domain Review.mp4 544960 551440 together with greater opti
@stevespringer
stevespringer / LogPerformanceStatsToSQLite.ps1
Last active March 16, 2023 13:53
Powershell Script to log performance stats to SQLite, written by ChatGPT
# Prompt the user to enter the path to the SQLite command-line interface
$sqlitePath = Read-Host "Enter the path to the SQLite command-line interface (e.g. C:\sqlite\sqlite3.exe)"
# Prompt the user to enter the path to the SQLite database file
$databasePath = Read-Host "Enter the path to the SQLite database file (e.g. C:\sqlite\performance_stats.db)"
# Prompt the user to choose whether to record performance statistics or view the contents of the database
$action = Read-Host "Enter 'RECORD' to record performance statistics or 'VIEW' to view the contents of the database"
if ($action -eq "RECORD") {
@stevespringer
stevespringer / MidiNoteCounter.cs
Created March 15, 2023 13:09
ChatGPTs MIDI file analyser
using System;
using System.Collections.Generic;
using System.Linq;
using Melanchall.DryWetMidi.Core;
using Melanchall.DryWetMidi.Interaction;
class Program
{
static void Main(string[] args)
{
@stevespringer
stevespringer / broken_link_hijacking.md
Created March 2, 2021 17:55 — forked from EdOverflow/broken_link_hijacking.md
This post aims to give you a basic overview of the different issues that could possibly arise if a target links to an expired endpoint.
#!/bin/bash
# need to extract email addresses from an sql dump in a hurry? try this one liner:
grep -o '[[:alnum:]+\.\_\-]*@[[:alnum:]+\.\_\-]*' dump.sql | sort | uniq -i
# One liner to fetch all URLs in scope of all public programs (wildcard domains excluded) needs jq:
curl -s https://raw.githubusercontent.com/arkadiyt/bounty-targets-data/master/data/hackerone_data.json|jq -r '.[].targets.in_scope[] | select(.asset_type|contains("URL")) | .asset_identifier' |grep -v "*" | sort
@stevespringer
stevespringer / Web-Attack-Cheat-Sheet.md
Created March 2, 2021 17:44 — forked from secfb/Web-Attack-Cheat-Sheet.md
Web-Attack-Cheat-Sheet.md

Web-Attack-Cheat-Sheet

Discovering

Bug Bount Targets

https://github.com/arkadiyt/bounty-targets-data

IP Enumeration

http://www.asnlookup.com/
@stevespringer
stevespringer / paying.md
Created February 18, 2021 17:41 — forked from random-robbie/paying.md
paying bug bounty companys taken from https://github.com/disclose/disclose
Program Name: 0x Project
Policy URL: https://blog.0xproject.com/announcing-the-0x-protocol-bug-bounty-b0559d2738c
Submission URL: team@0xproject.com



Program Name: 1Password Game