Skip to content

Instantly share code, notes, and snippets.

View ionicpanda's full-sized avatar
🎯
Focusing

ionicpanda

🎯
Focusing
View GitHub Profile
@ionicpanda
ionicpanda / kali-linux-macbook-air-wifi.md
Created November 14, 2018 00:48 — forked from RayPS/kali-linux-macbook-air-wifi.md
Fix Wi-Fi adapter for Kali linux on MacBook Air
  1. What is the OPTIONS method used for? The OPTIONS method asks the server to report the HTTP methods that are available for a particular resource.

  2. What are the IF-Modified-Since and If-None-Match headers used for? The If-Modified-Since header is used to specify the time at which the browser last received the requested resource. The If-None-Match header is used to specify the entity tag that the server issued with the requested resource when it was last received.

  3. What is the significance of the secure flag when a server sets a cookie? The secure flag is used to instruct the browser that the cookie should only ever be resubmitted over HTTPS connections, and never unencrypted HTTP.

package com.commercebank.serveranalyzer.BackEnd;
//Response Header Imports
import java.net.*;
import java.util.*;
import java.io.IOException;
/////////////////////////////////
import com.commercebank.serveranalyzer.BackEnd.DataPieces.CertChainData;
import com.commercebank.serveranalyzer.BackEnd.DataPieces.CipherSuiteData;
import com.commercebank.serveranalyzer.BackEnd.DataPieces.DataPiece;
package com.commercebank.serveranalyzer.BackEnd;
import com.commercebank.serveranalyzer.BackEnd.DataPieces.CertChainData;
import com.commercebank.serveranalyzer.BackEnd.ServerAnalyzerBackEnd;
import org.springframework.stereotype.Controller;
import org.springframework.web.bind.annotation.RequestMapping;
import org.springframework.web.bind.annotation.RequestParam;
import org.springframework.web.bind.annotation.ResponseBody;
import org.springframework.web.servlet.ModelAndView;
<!doctype html>
<html lang="en">
<head>
<meta charset="utf-8">
<meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">
<link rel="stylesheet" href="https://stackpath.bootstrapcdn.com/bootstrap/4.1.3/css/bootstrap.min.css" integrity="sha384-MCw98/SFnGE8fJT3GXwEOngsV7Zt27NXFoaoApmYm81iuXoPkFOJwJ8ERdknLPMO" crossorigin="anonymous">
<title>Server Analyzer</title>
</head>
# Python program for implementation of Insertion Sort
# Function to do insertion sort
def insertionSort(arr):
# Traverse through 1 to len(arr)
for i in range(1, len(arr)):
key = arr[i]
@ionicpanda
ionicpanda / week5.md
Created September 10, 2018 14:49
9-10-18 Homework and Readings

Computer Networking: Homework: Reading/Notes: Chapter 1-2

Rogue Unlock key minigame https://vdwaa.nl/pages/about-me.html#about-me We need better tools and we need to finally migrate to our packaging infrastructure to git. Neither of that is a lot of fun and so people don't really work on that. We all work on Arch in our spare time; one can dedicate only so much to spend on the project. We should do better about encouraging more people to join and making said process simpler. Neither is unfortunately easy to accomplish.

@ionicpanda
ionicpanda / oscp.md
Created April 18, 2018 03:45
OSCP Notes
  1. Recon
  2. Find vuln
  3. Exploit
  4. Document it

Recon

Unicornscans in cli, nmap in msfconsole to help store loot in database.

How to pass the OSCP

  1. Recon
  2. Find vuln
  3. Exploit
  4. Document it

Recon

Unicornscans in cli, nmap in msfconsole to help store loot in database.