jq — lightweight, flexible command-line JSON processor
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/env python3 | |
| """Fetch GitHub traffic stats for all repositories using gh CLI.""" | |
| import json | |
| import subprocess | |
| import sys | |
| from concurrent.futures import ThreadPoolExecutor, as_completed | |
| def run_gh(args: list[str]) -> dict | list | None: | |
| """Run gh api command and return parsed JSON.""" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| [ | |
| { | |
| "id": "cards_structure_seed_100_low_entropy", | |
| "category": "structure", | |
| "description": "Verify minimal card count at low entropy", | |
| "url": "https://proteus-target.vercel.app/lab/cards?seed=100&entropy=0.1&profile=structure", | |
| "parameters": { | |
| "seed": 100, | |
| "entropy": 0.1, | |
| "profiles": [ |
This document outlines the design specification for a high-performance Rust-based web crawler integrated with Apache Kafka and PostgreSQL. The crawler will act as a worker within a distributed system, consuming URLs from Kafka topics, crawling the associated web pages, and storing the results in a PostgreSQL database. Docker Compose will be utilized to manage the infrastructure, ensuring seamless deployment and orchestration of the services.
- Develop a high-performance web crawler using Rust that integrates with Kafka and PostgreSQL.
- Ensure scalable crawling of up to 10 million websites.
| Command | Description | Example |
|---|---|---|
grep pattern file |
🔎 Search for a pattern in a file | grep error logfile.txt |
grep -i pattern file |
🔠 Case-insensitive search | grep -i ERROR logfile.txt |
grep -w word file |
🔤 Match whole words only | grep -w error logfile.txt |
grep -v pattern file |
❌ Invert match (show lines that don't match) | grep -v success logfile.txt |
| Command | Description | Example |
|---|---|---|
tail file.txt |
📄 Display the last 10 lines of a file | tail /var/log/syslog |
tail -n 20 file.txt |
🔢 Display the last 20 lines of a file | tail -n 20 /var/log/auth.log |
tail -c 100 file.txt |
📏 Display the last 100 bytes of a file | tail -c 100 /etc/passwd |
DISCLAIMER: This information is for educational purposes only. Always obtain proper authorization before performing any penetration testing activities. Unauthorized testing is illegal and unethical.
| Command | Description | Example |
|---|---|---|
netstat |
🌐 Network connections, routing tables, interface statistics | netstat -tuln |
ss |
🔌 Socket statistics | ss -tuln |
NewerOlder