Society formed around going to hackathons and playing with tech.
Great fun and an good way of trying new things!
" Vundle | |
set nocompatible | |
filetype off | |
set rtp+=~/.vim/bundle/Vundle.vim | |
call vundle#begin() | |
Plugin 'VundleVim/Vundle.vim' | |
Plugin 'itchyny/lightline.vim' | |
Plugin 'flazz/vim-colorschemes' | |
Plugin 'rykka/mathematic.vim' | |
Plugin 'hari-rangarajan/CCTree' |
/* Here you have an exploit for CVE-2017-5754, otherwise known as "Meltdown". | |
* | |
* Mostly based on the paper [1], but it had to be adjusted a bit. | |
* I found that the Flush+Reload method didn't work as described (with a buffer | |
* of 256 pages) and had to do the binary method (which is otherwise faster, but | |
* more complex to implement). | |
* | |
* TSX is not present on many CPUs (including the one I wrote this exploit on), | |
* so I settled for handling the SEGV signal. | |
* |
We like to use etherpad to plan most things. We use the instance hosted under wikimedia. They should be backed up regularly.
Etherpad we used to plan stuff early on.
import requests | |
import hashlib | |
import time | |
import uuid | |
import os | |
import copy | |
import json | |
# This is based on my personal implementation but stripped down to only what is | |
# needed to verify it. |
import requests | |
import hashlib | |
import time | |
import uuid | |
import os | |
import copy | |
import json | |
# Fixed up version of my previous code to work with the Cloud endpoints. | |
# Hopefully this works. |
import os | |
import json | |
import binascii | |
import requests | |
from flask import Flask, request | |
app = Flask(__name__) | |
# Web app to get use a user token from Facebook | |
app_id = "<BLANKED>" | |
app_secret = "<BLANKED>" |
Links, tools and documents I think are interesting for level level development.
#!/bin/bash | |
IMAGE=<IMAGE_HERE> | |
CONTAINERNAME=<NAME_HERE> | |
XSOCK=/tmp/.X11-unix | |
XAUTH=/tmp/.docker.xauth | |
xauth nlist :0 | sed -e 's/^..../ffff/' | xauth -f $XAUTH nmerge - | |
docker run -dt \ | |
--name $CONTAINERNAME \ | |
-p 4444:4444 \ | |
-v $XSOCK:$XSOCK \ |