master 永远处于稳定状态,这个分支代码可以随时用来部署。不允许在该分支直接提交代码。
开发分支,包含了项目最新的功能和代码,所有开发都在 develop 上进行。一般情况下小的修改直接在这个分支上提交代码。
<?xml version="1.0" encoding="utf-8"?> | |
<manifest xmlns:android="http://schemas.android.com/apk/res/android" | |
package="schwiz.net.weartest" > | |
<application | |
android:allowBackup="true" | |
android:icon="@drawable/ic_launcher" | |
android:label="@string/app_name" | |
android:theme="@style/AppTheme" > | |
<meta-data android:name="com.google.android.gms.version" android:value="@integer/google_play_services_version" /> |
# /etc/fail2ban/jail.local | |
# [...] | |
[nginx-dos] | |
# Based on apache-badbots but a simple IP check (any IP requesting more than | |
# 240 pages in 60 seconds, or 4p/s average, is suspicious) | |
# Block for two full days. | |
# @author xros | |
enabled = true |
import sqlalchemy as sa | |
import sqlalchemy.orm as orm | |
from sqlalchemy.ext.declarative import declarative_base | |
from sqlalchemy.ext.declarative import declared_attr | |
from sqlalchemy.orm import scoped_session, sessionmaker | |
DBSession = scoped_session(sessionmaker()) | |
class BaseMixin(object): | |
query = DBSession.query_property() | |
id = sa.Column(sa.Integer, primary_key=True) |
jupyter: | |
image: jupyter/datascience-notebook | |
environment: | |
- PASSWORD=${PASSWORD} | |
nginx: | |
image: nginx | |
links: | |
- jupyter |
# coding: utf-8 | |
import json | |
from django import template | |
from django.utils.dateparse import parse_datetime | |
from django.utils.html import mark_safe | |
register = template.Library() |
This Gist is created in 2014, and it's highliy outdated now, according to one of mitmproxy
's manjor contributor (check his comment below). Thanks for letting us know, @mhils!
Modern applications usually make use of back-end API servers to provide their services. With a non-transparent HTTPs proxy, which intercepts the communication between clients and servers (aka the man-in-the-middle scheme), you can easily manipulate both API requests and responses.
#!/usr/bin/python | |
#crEAP is a utility which will identify WPA Enterprise Mode Encryption types and if | |
#insecure protocols are in use, crEAP will harvest Radius usernames and handshakes. | |
#Author: Snizz | |
#Requirements: Should be run as root/sudo. | |
# | |
# Python Scapy Community (scapy-com) - Dev version of Scapy which supports additional |
#!/usr/bin/env python | |
from scapy.all import * | |
ap_list = [] | |
def PacketHandler(pkt) : | |
if pkt.haslayer(Dot11) : | |
if pkt.type == 0 and pkt.subtype == 8 : |
# Reset our signal handler | |
signal.signal(signal.SIGINT, signal.SIG_DFL) | |
target_bssid = raw_input('Enter a BSSID to perform an deauth attack (q to quit): ') | |
while target_bssid not in networks: | |
if target_bssid == 'q' : sys.exit(0) | |
raw_input('BSSID not detected... Please enter another (q to quit): ') | |
# Get our interface to the correct channel | |
print 'Changing ' + args.interface + ' to channel ' + str(networks[target_bssid][1]) | |
os.system("iwconfig %s channel %d" % (args.interface, networks[target_bssid][1])) | |
# Now we have a bssid that we have detected, let's get the client MAC |