Skip to content

Instantly share code, notes, and snippets.

View AmitGupta7580's full-sized avatar
😴
sleeping

Amit Gupta AmitGupta7580

😴
sleeping
View GitHub Profile
@AmitGupta7580
AmitGupta7580 / api.py
Created April 17, 2021 09:46
bulk_search API Code suggestion for vulnerablecode
from urllib.parse import unquote
from django.db.models import Q
from django.urls import reverse
from django_filters import rest_framework as filters
from drf_spectacular.utils import extend_schema, inline_serializer
from packageurl import PackageURL
from rest_framework import serializers, viewsets, mixins
from rest_framework.decorators import action
@AmitGupta7580
AmitGupta7580 / graphQL_api.py
Created April 18, 2021 05:43
Testing GraphQL API on vulnerablecode
from graphene import relay, Schema, ObjectType, List, Field, String
from graphene_django import DjangoObjectType
from graphene_django.filter import DjangoFilterConnectionField
from rest_framework import serializers
from vulnerabilities.api import MinimalPackageSerializer
from vulnerabilities.api import VulnerabilityReferenceSerializer
from vulnerabilities.api import VulnerabilitySerializer
from vulnerabilities.api import VulnerabilitySeveritySerializer
from vulnerabilities.api import MinimalVulnerabilitySerializer
@AmitGupta7580
AmitGupta7580 / api.py
Created April 21, 2021 19:18
Pagination View of bulk_search API
#
# Copyright (c) nexB Inc. and others. All rights reserved.
# http://nexb.com and https://github.com/nexB/vulnerablecode/
# The VulnerableCode software is licensed under the Apache License version 2.0.
# Data generated with VulnerableCode require an acknowledgment.
#
# You may not use this software except in compliance with the License.
# You may obtain a copy of the License at: http://apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to in writing, software distributed
# under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR
@AmitGupta7580
AmitGupta7580 / data.txt
Created May 9, 2021 07:05
Training dataset for NLP model (vulnerablecode)
JavaScript in Internet Explorer 3.x and 4.x and Netscape 2.x 3.x and 4.x allows remote attackers to monitor a user's web activities, aka the Bell Labs vulnerability.@Internet#Explorer#[email protected]#4.x#2.x#3.x#4.x
MIME conversion buffer overflow in sendmail versions 8.8.3 and 8.8.4@[email protected]#8.8.4
Arbitrary file creation and program execution using FLEXlm LicenseManager, from versions 4.0 to 5.0 in IRIX@[email protected]#5.0
TCP RST denial of service in FreeBSD@FreeBSD@
Cisco IOS 12.0 and other versions can be crashed by malicious UDP packets to the syslog port.@Cisco#[email protected]
Apache httpd cookie buffer overflow for versions 1.1.1 and earlier.@Apache#[email protected]
Certain configurations of wu-ftp FTP server 2.4 use a _PATH_EXECPATH setting to a directory with dangerous commands, such as /bin, which allows remote authenticated users to gain root access via the 'site exec' command.@[email protected]
Remote access in AIX innd 1.5.1 using control messages@[email protected]
Buffer overflow in SLmail 3.x allows attackers to execute com
import airsimneurips
import airsim
import time
import socket
import numpy as np
# Network Configuration
################
HOST = "192.168.29.186"
PORT = 2222
{
"meta": {
"theme": "kwan"
},
"basics": {
"name": "Amit Gupta",
"label": "Student",
"image": "https://avatars0.githubusercontent.com/u/57043342?s=400&u=be0d04f5cc246b91c474094cc4a1faced794445d&v=4",
"email": "[email protected]",
"website": "http://ammmy.me/",
#!/usr/bin/env python3
import asyncio
from mavsdk import System
async def run():
drone = System()
await drone.connect(system_address="serial:///dev/ttyUSB0")
print("Waiting for drone to connect...")
#!/usr/bin/env python3
import asyncio
from mavsdk import System
async def run():
print("Code Initialized---")
drone = System()
#!/usr/bin/env python3
import asyncio
from mavsdk import System
async def run():
print("Code Initialized---")
drone = System()
#!/usr/bin/env python3
import asyncio
from mavsdk import System
async def print_flight_mode():
drone = System()
await drone.connect(system_address="serial:///dev/ttyUSB1")