I hereby claim:
- I am mwielgoszewski on github.
- I am marcin (https://keybase.io/marcin) on keybase.
- I have a public key whose fingerprint is 66BB 5179 6968 5989 A287 25C4 4FCD 9C87 3610 C4D5
To claim this, I am signing this object:
from gluon.utils import AES_new | |
KEY = 'testtesttesttest' | |
PLAINTEXT = 'The quick brown fox jumped over the lazy dog.The quick brown fox' | |
def xor(a, b): | |
return bytearray(x ^ y for x, y in zip(a, b)) | |
def exploit(): | |
# ciphertext produced by web2py |
# -*- coding: utf-8 -*- | |
''' | |
Usage: | |
session = requests.Session() | |
session.mount('https://', RateLimitAdapter()) | |
''' | |
from datetime import datetime | |
from collections import deque | |
import logging |
# -*- coding: utf-8 -*- | |
""" | |
Created on Fri Dec 28 14:16:12 2012 | |
@author: Nick Coblentz | |
Some of this code is borrowed from Brian Holyfield's Burp plugin located here: https://github.com/GDSSecurity/WCF-Binary-SOAP-Plug-In | |
It is also fully dependent on having NBFS.exe from his plugin in the same directory as Burp. | |
""" | |
from burp import IBurpExtender |
from java.awt import Font | |
from javax.swing import JScrollPane, JTextPane | |
from javax.swing.text import SimpleAttributeSet | |
from burp import IBurpExtender, IExtensionStateListener, IHttpListener, ITab | |
import base64 | |
import traceback | |
from itertools import chain, cycle, dropwhile, islice, product | |
import string | |
def pattern_create(*args): | |
return ''.join(islice(chain.from_iterable(cycle(product(string.uppercase, string.lowercase, string.digits))), *args)) |
I hereby claim:
To claim this, I am signing this object:
>>> for n, pages in enumerate(diff, 1): | |
... print 'page: %d -> %.4f%%' % (n, difflib.SequenceMatcher(None, *pages).ratio() * 100) | |
page: 1 -> 66.6667% | |
page: 2 -> 94.1598% | |
page: 3 -> 82.4145% | |
page: 4 -> 99.3867% | |
page: 5 -> 99.3815% | |
page: 6 -> 99.4215% | |
page: 7 -> 97.5767% |
#!/usr/bin/env python | |
import json | |
import requests | |
import StringIO | |
import sys | |
import zipfile | |
def download_crx(identifier): | |
sys.stderr.write("Downloading {0}\n".format(identifier)) |
With the introduction of VenusOS v3.50, a new "secured" network profile mode has been added which automatically adds support for HTTPS (using a self-signed certificate). This breaks support for some MFD's that expect to access resources over HTTP and/or without having to support cookie sessions or authentication.
From the release notes:
It is no longer necessary to enable MQTT when using the Marine MFD HTML5 App.