I hereby claim:
- I am jakejarvis on github.
- I am jakejarvis (https://keybase.io/jakejarvis) on keybase.
- I have a public key whose fingerprint is 87FB 4B60 06DD 1BEB 3ED4 7FAB D36C B66F 4002 B25B
To claim this, I am signing this object:
| local-zone: "tracking.klickthru.com" redirect | |
| local-data: "tracking.klickthru.com A 0.0.0.0" | |
| local-zone: "click.buzzcity.net" redirect | |
| local-data: "click.buzzcity.net A 0.0.0.0" | |
| local-zone: "ads.admoda.com" redirect | |
| local-data: "ads.admoda.com A 0.0.0.0" | |
| local-zone: "stats.pflexads.com" redirect | |
| local-data: "stats.pflexads.com A 0.0.0.0" | |
| local-zone: "a.glcdn.co" redirect | |
| local-data: "a.glcdn.co A 0.0.0.0" |
| function deleteSavedItems() { | |
| var query = document.querySelectorAll("#sc-saved-cart input[value=Delete]") | |
| if (query.length) { | |
| query[0].click(); | |
| } | |
| if (query.length > 1) { | |
| setTimeout(deleteSavedItems,100); | |
| } | |
| else { | |
| console.log('Finished'); |
| # Create a new self signed HTTPS Certificate for IIS Express | |
| # Crafted with all organic, GMO, gluten free ingreditations | |
| # with an artisinal SAN to make Chrome 58 onwards happy. | |
| # | |
| # See https://bugs.chromium.org/p/chromium/issues/detail?id=308330 | |
| # | |
| # Run this at an administrative PowerShell prompt. | |
| # | |
| # You will be prompted to trust a new certificate via a windows dialog. | |
| # Click yes otherwise Visual Studio will not be able to determine your |
| . | |
| .. | |
| ........ | |
| @ | |
| * | |
| *.* | |
| *.*.* | |
| 🎠|
| # use the latest ubuntu environment (18.04) available on travis | |
| dist: bionic | |
| language: go | |
| # You don't need to test on very old versions of the Go compiler. It's the user's | |
| # responsibility to keep their compiler up to date. | |
| go: | |
| - 1.16.x |
| {"lastUpload":"2020-11-12T17:31:33.925Z","extensionVersion":"v3.4.3"} |
I hereby claim:
To claim this, I am signing this object:
I spent the weekend meeting hackers in Vegas, and I got talking to one of them about CRLF Injection. They'd not seen many CRLF Injection vulnerabilities in the wild, so I thought I'd write up an example that's similar to something I found a few months ago.
If you're looking for bugs legally through a program like hackerone, or you're a programmer wanting to write secure PHP: this might be useful to you.
| # Description: Boxstarter Script | |
| # Author: Jess Frazelle <[email protected]> | |
| # Last Updated: 2017-09-11 | |
| # | |
| # Install boxstarter: | |
| # . { iwr -useb http://boxstarter.org/bootstrapper.ps1 } | iex; get-boxstarter -Force | |
| # | |
| # You might need to set: Set-ExecutionPolicy RemoteSigned | |
| # | |
| # Run this boxstarter by calling the following from an **elevated** command-prompt: |
Preconditions:
- POSIX or Windows system
- Install Docker
- A GitHub repo that already builds on Travis
Postcondition: