Skip to content

Instantly share code, notes, and snippets.

View busseyl's full-sized avatar
💭
👍 Primary Social Network

Lucas Bussey busseyl

💭
👍 Primary Social Network
View GitHub Profile
Public Sub SendToJoplin()
Dim sToken As String, sURL As String
Dim sURLNotes, sURLResources, sEscapedBody, sJSONString, sFolderID As String
Dim objItem As Outlook.MailItem
sToken = "REPLACE ME WITH YOUR TOKEN"
sURL = "http://127.0.0.1:41184"
sURLNotes = sURL & "/notes?token=" & sToken
sURLResources = sURL & "/resources?token=" & sToken
@busseyl
busseyl / strspn.js
Created October 13, 2018 14:54 — forked from detomon/strspn.js
JavaScript implementation of the PHP function `strspn`
String.prototype.strspn = function (chars, start, length) {
var end;
if (start == undefined)
start = 0;
else if (start < 0)
start += this.length;
if (length == undefined)
length = this.length;
@busseyl
busseyl / ansible-summary.md
Created May 29, 2018 19:30 — forked from andreicristianpetcu/ansible-summary.md
This is an ANSIBLE Cheat Sheet from Jon Warbrick

An Ansible summary

Jon Warbrick, July 2014, V3.2 (for Ansible 1.7)

Configuration file

intro_configuration.html

First one found from of

server {
index index.php;
set $basepath "/var/www";
set $domain $host;
# check one name domain for simple application
if ($domain ~ "^(.[^.]*)\.dev$") {
set $domain $1;
set $rootpath "${domain}";
@busseyl
busseyl / .gitignore
Last active August 29, 2015 14:08 — forked from karmi/.gitignore
nginx/
!nginx/.gitkeep
!nginx/logs/.gitkeep
src/
tmp/
#!/usr/bin/python
# Quick and dirty demonstration of CVE-2014-0160 by Jared Stafford ([email protected])
# The author disclaims copyright to this source code.
#
# Modified slightly by Andreas Thienemann <[email protected]> for clearer exploit code
# and 64k reads
#
# This version of the exploit does write received data to a file called "dump" in the local directory
# for analysis.