I hereby claim:
- I am mwielgoszewski on github.
- I am marcin (https://keybase.io/marcin) on keybase.
- I have a public key whose fingerprint is 66BB 5179 6968 5989 A287 25C4 4FCD 9C87 3610 C4D5
To claim this, I am signing this object:
| from gluon.utils import AES_new | |
| KEY = 'testtesttesttest' | |
| PLAINTEXT = 'The quick brown fox jumped over the lazy dog.The quick brown fox' | |
| def xor(a, b): | |
| return bytearray(x ^ y for x, y in zip(a, b)) | |
| def exploit(): | |
| # ciphertext produced by web2py |
| # -*- coding: utf-8 -*- | |
| ''' | |
| Usage: | |
| session = requests.Session() | |
| session.mount('https://', RateLimitAdapter()) | |
| ''' | |
| from datetime import datetime | |
| from collections import deque | |
| import logging |
| # -*- coding: utf-8 -*- | |
| """ | |
| Created on Fri Dec 28 14:16:12 2012 | |
| @author: Nick Coblentz | |
| Some of this code is borrowed from Brian Holyfield's Burp plugin located here: https://github.com/GDSSecurity/WCF-Binary-SOAP-Plug-In | |
| It is also fully dependent on having NBFS.exe from his plugin in the same directory as Burp. | |
| """ | |
| from burp import IBurpExtender |
| from java.awt import Font | |
| from javax.swing import JScrollPane, JTextPane | |
| from javax.swing.text import SimpleAttributeSet | |
| from burp import IBurpExtender, IExtensionStateListener, IHttpListener, ITab | |
| import base64 | |
| import traceback | |
| from itertools import chain, cycle, dropwhile, islice, product | |
| import string | |
| def pattern_create(*args): | |
| return ''.join(islice(chain.from_iterable(cycle(product(string.uppercase, string.lowercase, string.digits))), *args)) |
I hereby claim:
To claim this, I am signing this object:
| >>> for n, pages in enumerate(diff, 1): | |
| ... print 'page: %d -> %.4f%%' % (n, difflib.SequenceMatcher(None, *pages).ratio() * 100) | |
| page: 1 -> 66.6667% | |
| page: 2 -> 94.1598% | |
| page: 3 -> 82.4145% | |
| page: 4 -> 99.3867% | |
| page: 5 -> 99.3815% | |
| page: 6 -> 99.4215% | |
| page: 7 -> 97.5767% |
| #!/usr/bin/env python | |
| import json | |
| import requests | |
| import StringIO | |
| import sys | |
| import zipfile | |
| def download_crx(identifier): | |
| sys.stderr.write("Downloading {0}\n".format(identifier)) |
With the introduction of VenusOS v3.50, a new "secured" network profile mode has been added which automatically adds support for HTTPS (using a self-signed certificate). This breaks support for some MFD's that expect to access resources over HTTP and/or without having to support cookie sessions or authentication.
From the release notes:
It is no longer necessary to enable MQTT when using the Marine MFD HTML5 App.