I hereby claim:
- I am vmesel on github.
- I am vmesel (https://keybase.io/vmesel) on keybase.
- I have a public key whose fingerprint is 8028 073C 0F39 ECB6 7127 E14E BF39 AB54 6335 5AC2
To claim this, I am signing this object:
| import random | |
| perguntas = { | |
| "1": { | |
| "pontos": [51, 5, 0, 15, 25], | |
| "pergunta": "AASSASASASASASASASAASSAKSAKSAKJSAASKS", | |
| "respostas": ["Pergunta a", "Pergunta b", "Pergunta c", "Pergunta d", "Pergunta e"], | |
| } | |
| } |
| ### Keybase proof | |
| I hereby claim: | |
| * I am vmesel on github. | |
| * I am vmesel (https://keybase.io/vmesel) on keybase. | |
| * I have a public key ASCdCz_Vj2Fk3oGnMjK2UrpasjjCKtxpMjUVUVGbL6-aqgo | |
| To claim this, I am signing this object: |
I hereby claim:
To claim this, I am signing this object:
| import json | |
| import websocket | |
| ws = websocket.WebSocket() | |
| ws.connect("wss://api.bitfinex.com/ws/2") | |
| ws.send(json.dumps({ | |
| "event":"subscribe", | |
| "channel":"book", | |
| "pair":"BTCUSD", |
| arqin = open('arq-teste.txt','r') | |
| arqout = open('arquivo-2','w+') | |
| for l in arqin: | |
| ls = l.split(';') | |
| if ls[0].startswith('aug') == True and ls[1].startswith('Cc') == True: | |
| arqout.write(l) | |
| arqin.close() | |
| arqout.close() |
| import unittest | |
| def frame_calc(sequence): | |
| modulo = len(sequence) % 3 | |
| if modulo == 0: | |
| return 0 | |
| elif modulo == 1: | |
| return 1 | |
| elif modulo == 2: | |
| return 2 |
| #!/usr/bin/python | |
| # | |
| # Exploit Title: Apache James Server 2.3.2 Authenticated User Remote Command Execution | |
| # Date: 16\10\2014 | |
| # Exploit Author: Jakub Palaczynski, Marcin Woloszyn, Maciej Grabiec | |
| # Vendor Homepage: http://james.apache.org/server/ | |
| # Software Link: http://ftp.ps.pl/pub/apache/james/server/apache-james-2.3.2.zip | |
| # Version: Apache James Server 2.3.2 | |
| # Tested on: Ubuntu, Debian | |
| # Info: This exploit works on default installation of Apache James Server 2.3.2 |
| 1 import unittest | |
| 2 from fasta_normalizer import fasta2dict | |
| 3 | |
| 4 def frame_calc(sequence): | |
| 5 modulo = len(sequence) % 3 | |
| 6 if modulo == 0: | |
| 7 return 0 | |
| 8 elif modulo == 1: | |
| 9 return 1 | |
| 10 elif modulo == 2: |
| from Bio import SeqIO | |
| from random import choice | |
| def reverse_translate(sequence): | |
| translation_table = { | |
| "F":["ttt","ttc",], | |
| "L":["tta","ttg","ctt","ctc","ctg",], | |
| "I":["att","atc",], | |
| "M":["atg"], | |
| "V":["gtt","gtc","gta","gtg",], |