I hereby claim:
- I am pamplemousse on github.
- I am pamplemousse (https://keybase.io/pamplemousse) on keybase.
- I have a public key ASBzvfpmOhAH_uQ3cYer2IICuzUFLjYpcqQZv3qS9BcPngo
To claim this, I am signing this object:
// Red | |
$red_50 : #FFEBEE; | |
$red_100 : #FFCDD2; | |
$red_200 : #EF9A9A; | |
$red_300 : #E57373; | |
$red_400 : #EF5350; | |
$red_500 : #F44336; | |
$red_600 : #E53935; | |
$red_700 : #D32F2F; | |
$red_800 : #C62828; |
# RSpec matcher for alias_method. | |
# https://gist.github.com/47b56760a1e20e391b0b | |
# Usage: | |
# | |
# describe User do | |
# it { expect(subject).to alias_from(:username).to(:email) } | |
# end | |
RSpec::Matchers.define :alias_from do |alias_method| | |
match do |subject| |
// Version du 9 novembre 2003 | |
// | |
/////////////////////////////////////////////////////////////////////////////// | |
// Basé sur une version de corbax | |
// | |
// Modifié par escaflownn le 7 juillet 2003 | |
// => Traduction en français de toutes les commandes elfes de la nuit | |
// => Traduction en français de toutes les commandes humaines | |
// Pour toute faute ou oubli : [email protected] | |
// |
I hereby claim:
To claim this, I am signing this object:
from rx.core import Observable, AnonymousObservable | |
from rx.internal import extensionmethod | |
@extensionmethod(Observable) | |
def pair_with_previous(self): | |
""" | |
stream = Observable.from_iterable( | |
list(map( | |
lambda x: [1*x, 2*x], | |
range(6))) |
setup() { | |
OUTPUT=$(mktemp) | |
} | |
test_first_game() { | |
$(echo -e "C3\nB3\nA3\nD3\nD2\nD1\nD0\nB0\nC0\nA2\nA1\nA0" | ../reversi2 -s 2 > $OUTPUT) | |
board=$(cat $OUTPUT | tail -n 7 | head -n 5) | |
expected_board="\ | |
0 1 2 3 |
/* | |
* Proof that the `input` element for search in the juice-shop | |
* is injectable and can lead to an XSS vulnerability. | |
*/ | |
// Make this function global so it can be called from anywhere in a page. | |
window.reportXSSToZap = function (element) { | |
frontEndScanner.reportAlertToZap({ | |
confidence: frontEndScanner.zapAlertConstants.CONFIDENCE_HIGH, | |
description: "An XSS vulnerability has been found on the targeted page.", |
with import <nixpkgs> { }; | |
let | |
arm-binutils = pkgsCross.arm-embedded.buildPackages.binutils; | |
binutils_commands = "as ld objcopy readelf"; | |
python3WithCoolPackages = python3.withPackages(ps: with ps; [ | |
flask | |
ipdb | |
ipython |
import os | |
from networkx.drawing.nx_agraph import write_dot | |
write_dot(netowrkx_graph, 'graph.dot') | |
os.system('dot -Ksfdp -Tsvg -o graph.svg graph.dot') |
/* | |
* Help write shellcodes targetting MSP430: | |
* ``` | |
* msp430-elf-as shellcode.s -o shellcode.o | |
* msp430-elf-objcopy --dump-section .text=shellcode shellcode.o | |
* od -An -t x1 shellcode | tr -d ' ' | |
* ``` | |
*/ | |
with import <nixpkgs> { |