Jon Warbrick, July 2014, V3.2 (for Ansible 1.7)
First one found from of
Public Sub SendToJoplin() | |
Dim sToken As String, sURL As String | |
Dim sURLNotes, sURLResources, sEscapedBody, sJSONString, sFolderID As String | |
Dim objItem As Outlook.MailItem | |
sToken = "REPLACE ME WITH YOUR TOKEN" | |
sURL = "http://127.0.0.1:41184" | |
sURLNotes = sURL & "/notes?token=" & sToken | |
sURLResources = sURL & "/resources?token=" & sToken |
String.prototype.strspn = function (chars, start, length) { | |
var end; | |
if (start == undefined) | |
start = 0; | |
else if (start < 0) | |
start += this.length; | |
if (length == undefined) | |
length = this.length; |
Jon Warbrick, July 2014, V3.2 (for Ansible 1.7)
First one found from of
server { | |
index index.php; | |
set $basepath "/var/www"; | |
set $domain $host; | |
# check one name domain for simple application | |
if ($domain ~ "^(.[^.]*)\.dev$") { | |
set $domain $1; | |
set $rootpath "${domain}"; |
nginx/ | |
!nginx/.gitkeep | |
!nginx/logs/.gitkeep | |
src/ | |
tmp/ |
#!/usr/bin/python | |
# Quick and dirty demonstration of CVE-2014-0160 by Jared Stafford ([email protected]) | |
# The author disclaims copyright to this source code. | |
# | |
# Modified slightly by Andreas Thienemann <[email protected]> for clearer exploit code | |
# and 64k reads | |
# | |
# This version of the exploit does write received data to a file called "dump" in the local directory | |
# for analysis. |