I hereby claim:
- I am ahadsheriff on github.
- I am ahadsheriff (https://keybase.io/ahadsheriff) on keybase.
- I have a public key ASAs3GanCTaGcZnrtPEPr2BPFe6ZLDPc0IV9S70dyIBmxAo
To claim this, I am signing this object:
from bs4 import BeautifulSoup | |
import requests | |
import requests.exceptions | |
from urllib.parse import urlsplit | |
from urllib.parse import urlparse | |
from collections import deque | |
import re | |
url = "https://scrapethissite.com" | |
# a queue of urls to be crawled |
import argparse | |
welcome = "Practicing creating interactive command-line interfaces" | |
parser = argparse.ArgumentParser(description=welcome) | |
parser.add_argument('--domain', '-d', required=True, | |
help='domain name of the website you want to scrape. i.e. "https://ahadsheriff.com"') | |
parser.add_argument('--ofile', '-o', | |
help='define output file to save results of stdout. i.e. "output.txt"') | |
parser.add_argument('--lines', '-l', |
/* | |
DCOM RPC Overflow Discovered by LSD - Exploit Based on Xfocus's Code | |
Written by H D Moore <hdm [at] metasploit.com> | |
- Usage: ./dcom <Target ID> <Target IP> | |
- Targets: | |
- 0 Windows 2000 SP0 (english) | |
- 1 Windows 2000 SP1 (english) | |
- 2 Windows 2000 SP2 (english) |
#include <errno.h> | |
#include <stdlib.h> | |
#include <stdio.h> | |
#include <unistd.h> | |
extern int errno; | |
int | |
main(int argc, char **argv) | |
{ |
I hereby claim:
To claim this, I am signing this object:
Verifying my Blockstack ID is secured with the address 1AKxxEkL6HV91Hrs24qvxEQECAkMYojzSL https://explorer.blockstack.org/address/1AKxxEkL6HV91Hrs24qvxEQECAkMYojzSL |
import datetime | |
import os | |
# Local Website: http://127.0.0.1/var/website/html | |
website = str(input("Enter the URL of the website you want to test: ")) | |
os.system('ab -n 1000 -c 5 '+ website + ' > LoadTest.txt') | |
infile = 'LoadTest.txt' |
@ echo off | |
echo Testing local connectivity | |
ping 192.168.1.102 > nul | |
if errorlevel 1 goto :ERRORLocal | |
goto :LocalSuccess | |
:TRYRemote | |
echo Testing remote connectivity | |
ping 8.8.8.8 > nul | |
if errorlevel 1 goto :ERRORRemote |
""" | |
Author: Ahad Sheriff | |
Description: | |
Python script to add users to Linux groups. You can easily change the content | |
of this script to fit your needs. | |
Sample CSV file that I used to test is | |
included as `sampleAccounts.csv` | |
Data: | |
The data in the csv file must be of the form: | |
"Full Name", "Office Number", "Phone Extension #", "Department Name" |