Skip to content

Instantly share code, notes, and snippets.

View matiasinsaurralde's full-sized avatar

Matias Insaurralde matiasinsaurralde

View GitHub Profile
@matiasinsaurralde
matiasinsaurralde / abc.R
Last active September 8, 2018 02:50 — forked from maggiesarmiento/abc.R
abc.r
# Script de R: Introduccion a R
# Goku
# Solamente si estoy en la FACEN
Sys.setenv(http_proxy="http://laboratorio:[email protected]:3128/")
Sys.setenv(https_proxy="https://laboratorio:[email protected]:3128/")
## Trabajando con Secuencias de DNA
# Una de las cosas mas basicas qeu necesitas saber hacer con R para bioinformatica es
@matiasinsaurralde
matiasinsaurralde / read.md
Last active January 18, 2019 02:10 — forked from buger/read.md
API Gateway guide to SOAP

API Gateway guide to SOAP

SOAP is a big and painful topic when it comes to API gateway support. And the reason is that the SOAP protocol itself has a very flexible declarative XML format, and its specifications are unfortunately really vague and leave a lot of things open for interpretation.

In this document, we will try to cover all possible ways how you can integrate SOAP with Tyk API Gateway, from simple pass through to calling WSDL services.

Introduction to SOAP format

A SOAP message is a XML document which is used to transmit your data, and can look as simple as:

@matiasinsaurralde
matiasinsaurralde / docker-cleanup-resources.md
Created March 22, 2020 00:12 — forked from bastman/docker-cleanup-resources.md
docker cleanup guide: containers, images, volumes, networks

Docker - How to cleanup (unused) resources

Once in a while, you may need to cleanup resources (containers, volumes, images, networks) ...

delete volumes

// see: https://github.com/chadoe/docker-cleanup-volumes

$ docker volume rm $(docker volume ls -qf dangling=true)

$ docker volume ls -qf dangling=true | xargs -r docker volume rm

@matiasinsaurralde
matiasinsaurralde / rails_omakase.rb
Created July 21, 2020 08:28 — forked from postmodern/rails_omakase.rb
Proof-of-Concept exploit for the new Rails Remote Code Execution vulnerability (CVE-2013-0333)
#!/usr/bin/env ruby
#
# Proof-of-Concept exploit for Rails Remote Code Execution (CVE-2013-0333)
#
# ## Advisory
#
# https://groups.google.com/forum/?fromgroups=#!topic/rubyonrails-security/1h2DR63ViGo
#
# ## Caveats
#
@matiasinsaurralde
matiasinsaurralde / rails_omakase.rb
Created July 21, 2020 08:28 — forked from postmodern/rails_omakase.rb
Proof-of-Concept exploit for the new Rails Remote Code Execution vulnerability (CVE-2013-0333)
#!/usr/bin/env ruby
#
# Proof-of-Concept exploit for Rails Remote Code Execution (CVE-2013-0333)
#
# ## Advisory
#
# https://groups.google.com/forum/?fromgroups=#!topic/rubyonrails-security/1h2DR63ViGo
#
# ## Caveats
#