Using this you can run against a directory that has nested files/folders with files of *.avro
.
This will walk the tree, convert alongside each of the avro files.
python avroConvert.py "mypath"
#!/usr/bin/env bash | |
for i in {1..220}; do | |
echo | ./vulnFileCopy2 "'%$i\$x..'" | |
printf "\nLast offset was: ${i}\n" | |
done |
There are multiple posts (old and new) with instructions on how to generate a fat jar, this is, a jar file for your application
containing also your application's dependencies. Most solutions I have tried did not work for me, even in a simple Hello World
java application, but I have found one that seems to work as expected.
Here it is:
Just run this from your Mac terminal and it'll drop you in a container with full permissions on the Docker VM. This also works for Docker for Windows for getting in Moby Linux VM (doesn't work for Windows Containers).
docker run -it --rm --privileged --pid=host justincormack/nsenter1
more info: https://github.com/justincormack/nsenter1
SOURCES=caesar.s | |
OBJECTS=caesar.o | |
PRODUCT=caesar | |
uname_m := $(shell uname -m) | |
$(info uname_m=$(uname_m)) | |
# 32 bit | |
LDFLAGS.i686= | |
ASFLAGS.i686= | |
# 64 bit |
const genRanHex = size => [...Array(size)].map(() => Math.floor(Math.random() * 16).toString(16)).join(''); | |
//let traceparent = "00-" + genRanHex(32) + "-00" + genRanHex(14) + "-01" | |
let traceparent = "00-" + genRanHex(32) + "-" + genRanHex(16) + "-01" | |
pm.environment.set("traceparent", traceparent) | |
console.warn("sent " + traceparent) |
#!/usr/bin/env bash | |
# set -eox | |
# see spec: https://www.w3.org/TR/trace-context | |
# version-format = trace-id "-" parent-id "-" trace-flags | |
# trace-id = 32HEXDIGLC ; 16 bytes array identifier. All zeroes forbidden | |
# parent-id = 16HEXDIGLC ; 8 bytes array identifier. All zeroes forbidden | |
# trace-flags = 2HEXDIGLC ; 8 bit flags. Currently, only one bit is used. See below for detail | |
VERSION="00" # fixed in spec at 00 | |
TRACE_ID="$(cat /dev/urandom | tr -dc 'a-f0-9' | fold -w 32 | head -n 1)" | |
PARENT_ID="00$(cat /dev/urandom | tr -dc 'a-f0-9' | fold -w 14 | head -n 1)" |
#!/bin/bash | |
shopt -s nocasematch | |
getFileExtension () { | |
case "$1" in | |
"zip" ) | |
echo "zip" | |
;; | |
"bzip2" ) | |
echo "bz2" |
.data | |
prompt: .asciiz "Encrypt(E) or Decrypt(D) ?" | |
indata: .space 20 | |
plaintext: .asciiz "Enter Plain text: " | |
ciphertext: .asciiz "Enter Cipher text: " | |
data: .space 40 | |
Key: .asciiz "Key ?" | |
WrongKeyword: .asciiz "\nPlease enter a valid character" | |
.text | |
main: |
@Test | |
fun `should $DESCRIPTION$`() { | |
// given | |
$GIVEN$ | |
// when | |
$WHEN$ | |
// then | |
$THEN$ |