Skip to content

Instantly share code, notes, and snippets.

Zack Allen zmallen

Block or report user

Report or block zmallen

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
View gist:5d108d219dc9c2c2980870c27a0c38aa
function isASCII(str) {
return /^[\x00-\x7F]*$/.test(str);
for(d in data) {
var m = "";
for(var w=0,c="rozMWeXaXY";w<c.length;w++) {

Keybase proof

I hereby claim:

  • I am zmallen on github.
  • I am techy ( on keybase.
  • I have a public key ASDlND5HEwvAoAaVM4hZjiQ5FWYmrlT06CgVBUaTC3rnkgo

To claim this, I am signing this object:

View Makefile
obj-m += hello-1.o
hello-1.objs := hello-1.o
make -C /usr/src/kernels/3.10.0-693.11.1.el7.x86_64.debug M=$(PWD) modules
make -C /lib/modules/$(shell uname -r).debug/build M=$(PWD) clean
echo "foo"
echo "bar"
View ansibleversion
```$ ansible --version
config file = None
configured module search path = [u'/Users/zallen/.ansible/plugins/modules', u'/usr/share/ansible/plugins/modules']
ansible python module location = /usr/local/lib/python2.7/site-packages/ansible
executable location = /usr/local/bin/ansible
python version = 2.7.13 (default, Dec 18 2016, 07:03:39) [GCC 4.2.1 Compatible Apple LLVM 8.0.0 (clang-800.0.42.1)]
View .zshrc
# If you come from bash you might have to change your $PATH.
# export PATH=$HOME/bin:/usr/local/bin:$PATH
# Path to your oh-my-zsh installation.
export ZSH=~/.oh-my-zsh
# Set name of the theme to load. Optionally, if you set this to "random"
# it'll load a random theme each time that oh-my-zsh is loaded.
# See
import random
arr = []
def check_arr(num):
for elem in arr:
if elem == num:
return True
return False
View apache_struts.ldjson
{"ranking": [[{"circl": 2}]], "last-modified": "2017-03-29T21:59:01.940-04:00", "Modified": "2017-03-10T21:59:00.183-05:00", "cvss": "10.0", "capec": [{"name": "Embedding Scripts in Non-Script Elements", "prerequisites": ["Target client software must be a client that allows script execution based on scripts generated by remote hosts."], "summary": ["This attack is a form of Cross-Site Scripting (XSS) where malicious scripts are embedded in elements that are not expected to host scripts such as image tags (<img>), comments in XML documents (< !-CDATA->), etc. These tags may not be subject to the same input validation, output validation, and other content filtering and checking routines, so this can create an opportunity for an attacker to tunnel through the application's elements and launch a XSS attack through other elements.", "As with all remote attacks, it is important to differentiate the ability to launch an attack (such as probing an internal network for unpatched servers) and the ability of the remote
View gist:8ba955cc40a788719adb34326a62c98a
### Keybase proof
I hereby claim:
* I am zmallen on github.
* I am techy ( on keybase.
* I have a public key whose fingerprint is C512 0650 5340 4D9C 2B33 D2F9 BCFD 8DCA AEF5 AF14
To claim this, I am signing this object:
View vagrant
# -*- mode: ruby -*-
# vi: set ft=ruby :
Vagrant.configure("2") do |config|
config.vm.define "ansible", primary: true do |ansible| "private_network", ip: "" = "hashicorp/precise64"
ansible.vm.provision :shell, path: "scripts/"
ansible.vm.provider "virtualbox" do |vbox|
vbox.memory = 512
You can’t perform that action at this time.