This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import junit.framework.Assert; | |
import junit.framework.TestCase; | |
import org.openqa.selenium.*; | |
import org.openqa.selenium.remote.*; | |
import java.net.URL; | |
import java.util.concurrent.TimeUnit; | |
public class TestingUploadSe2Sauce extends TestCase { | |
private RemoteWebDriver driver; |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<!DOCTYPE module PUBLIC "-//Google Inc.//DTD Google Web Toolkit 2.0//EN" | |
"http://google-web-toolkit.googlecode.com/svn/releases/2.0/distro-source/core/src/gwt-module.dtd"> | |
<module rename-to="App"> | |
<!-- Inherit the core Web Toolkit stuff. --> | |
<inherits name='com.google.gwt.user.User'/> | |
<inherits name="com.google.gwt.place.Place"/> | |
<inherits name="com.google.gwt.activity.Activity"/> | |
<inherits name="com.google.gwt.logging.Logging"/> | |
<inherits name="com.google.gwt.http.HTTP" /> |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python | |
# -*- coding: utf-8 -*- | |
"""A simple tool for converting batches of PNG pages into a PDF file. | |
Usage: | |
1. Drop into the folder with the PNGs. | |
2. chmod +x png2pdf.py | |
3. Double-click it. | |
Requires: |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/sh | |
#a good way of testing to see if you can get command injection | |
#on a remote web application is to have tcpdump listen for icmp | |
#packets and then trying to inject the "ping -c 10 yourip.com" | |
#into the vulnerable server. You should see your server's terminal | |
#light up with incoming ICMP packets... | |
tcpdump -i eth0 ip proto \\icmp -v | |
#similar trick for HTTP... this has other applications |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
hybi-07-12, headers: { host: 'example.com', | |
'sec-websocket-key': 'jjtFcDA0FonXscXj25UuaQ==', | |
'sec-websocket-origin': 'ws://example.com/socket.io/1/websocket/1105054216814116754', | |
'sec-websocket-version': '8', | |
'sec-websocket-protocol': '8', | |
'cache-control': 'max-stale=0', | |
connection: 'Keep-Alive', | |
'x-bluecoat-via': 'DDBD0991AB5F8902' } |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
/* Faux Console by Chris Heilmann http://wait-till-i.com */ | |
if (!window.console) { | |
var console = {init: function() { | |
console.d = document.createElement('div'); | |
document.body.appendChild(console.d); | |
var a = document.createElement('a'); | |
a.href = 'javascript:console.hide()'; | |
a.innerHTML = 'close'; | |
console.d.appendChild(a); |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
public class GridInfoExtracter{ | |
private static String[] getHostNameAndPort(String hostName, int port, | |
SessionId session) { | |
String[] hostAndPort = new String[2]; | |
String errorMsg = "Failed to acquire remote webdriver node and port info. Root cause: "; | |
try { | |
HttpHost host = new HttpHost(hostName, port); | |
DefaultHttpClient client = new DefaultHttpClient(); |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
license: gpl-3.0 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# the admin password for all of the IE VMs is “Password1″ without the quotes, it's also used for the password hints | |
1) Install VirtuaBox on your mac | |
http://download.virtualbox.org/virtualbox/4.1.10/VirtualBox-4.1.10-76795-OSX.dmg | |
2) Decide which versions of Internet Explorer you want to download and install – each version of Internet Explorer is contained within a separate virtual machine that runs within VirtualBox. In other words, if you want to run Internet Explorer 7, 8, and 9, you will need to download three separate VM’s, which may take a while so keep that in mind. Select the text below and copy it: | |
# Install ALL versions of Internet Explorer: IE 7, IE 8, and IE 9 (for now this script will also pull down a IE 6 vm with windows xp) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
package main | |
import ( | |
"fmt" | |
) | |
type Node struct { | |
Value int | |
} |