This file was generated automatically based on this two sources:
- /etc/nginx/mime.types
- http://www.garykessler.net/library/file_sigs.html
This is a JSON object by following structure:
[string ext] : {
signs: [sign]
param( | |
[string]$FolderPath, | |
[string]$Extension = "txt", | |
[ValidateSet("name", "date", "name-reverse", "date-reverse")] | |
[string]$Sort = "name", | |
[switch]$Recursive | |
) | |
Write-Host "------------------------------------------------------------------------------------------------" | |
Write-Host "" |
$array = @('1a2a5773', '0fe68296', '01b7f045') | |
$expected = @('0fe68296', '01b7f045', '1a2a5773') | |
# # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # | |
Write-Host 'Bad:' # from https://stackoverflow.com/a/5429048/4880243 | |
$array | Sort-Object { [regex]::Replace($_, '\d+', { $args[0].Value.PadLeft(20) }) } | |
# # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # |
# http://www.nasdaqtrader.com/trader.aspx?id=symboldirdefs | |
# NASDAQ-Listed Securities | |
# File Name: nasdaqlisted.txt | |
# FTP Directory: ftp://ftp.nasdaqtrader.com/symboldirectory | |
# Field Name Definition | |
# Symbol The one to four or five character identifier for each | |
# NASDAQ-listed security. | |
# Security Name Company issuing the security. | |
# Market Category The category assigned to the issue by NASDAQ based on |
import argparse | |
import os | |
import shutil | |
import tempfile | |
from zipfile import ZipInfo, ZipFile | |
parser = argparse.ArgumentParser(description="Unzips a password protected .zip by performing a brute-force attack " | |
"using either a word list, password list or a dictionary.", | |
usage="BruteZIP.py -z zip.zip -d dict.txt") | |
parser.add_argument("-z", "--zip", metavar="", required=True, help="Path to the .zip file.") |
{ | |
"0": { | |
"descriptions": [ | |
"Compressed harddisk data" | |
] | |
}, | |
"1": { | |
"descriptions": [ | |
"Fax", | |
"Roff/nroff/troff/groff source for manual page" |
/** | |
* This snippet is used to extract all file extension names from wikipedia pages. | |
* | |
* Usage: Copy this snippet and paste on Chrome console. Do it for each extensions page available. | |
* After that, get the json using `localStorage.getItem('extensions')` | |
* @see https://en.wikipedia.org/wiki/List_of_filename_extensions | |
* @type {string} | |
*/ | |
var memorySlot='extensions'; |
== Adb Server | |
adb kill-server | |
adb start-server | |
== Adb Reboot | |
adb reboot | |
adb reboot recovery | |
adb reboot-bootloader | |
== Shell |
----------------------------------------------------------------------------------------- | |
ID Full Name Short Name Description | |
----------------------------------------------------------------------------------------- | |
256: Show TST Show global scripts and variables. | |
257: ShowVars SV Show variables on object. You can optionally specified a papyrus variable or script to filter with [player->sv] | |
258: ShowGlobalVars SGLV Show all global variables. | |
259: ShowQuestVars SQV Show quest variables. You can optionally specified a papyrus variable or script to filter with [svq QuestID] | |
260: ShowQuests SQ List quests. | |
261: ShowQuestAliases Show quest aliases. [ShowQuestAliases QuestID] | |
262: |
This file was generated automatically based on this two sources:
This is a JSON object by following structure:
[string ext] : {
signs: [sign]
#!/bin/sh | |
# Generate self signed root CA cert | |
openssl req -nodes -x509 -newkey rsa:2048 -keyout ca.key -out ca.crt -subj "/C=AU/ST=NSW/L=Sydney/O=MongoDB/OU=root/CN=`hostname -f`/[email protected]" | |
# Generate server cert to be signed | |
openssl req -nodes -newkey rsa:2048 -keyout server.key -out server.csr -subj "/C=AU/ST=NSW/L=Sydney/O=MongoDB/OU=server/CN=`hostname -f`/[email protected]" | |
# Sign the server cert |