Skip to content

Instantly share code, notes, and snippets.

import random
perguntas = {
"1": {
"pontos": [51, 5, 0, 15, 25],
"pergunta": "AASSASASASASASASASAASSAKSAKSAKJSAASKS",
"respostas": ["Pergunta a", "Pergunta b", "Pergunta c", "Pergunta d", "Pergunta e"],
}
}
### Keybase proof
I hereby claim:
* I am vmesel on github.
* I am vmesel (https://keybase.io/vmesel) on keybase.
* I have a public key ASCdCz_Vj2Fk3oGnMjK2UrpasjjCKtxpMjUVUVGbL6-aqgo
To claim this, I am signing this object:

Keybase proof

I hereby claim:

  • I am vmesel on github.
  • I am vmesel (https://keybase.io/vmesel) on keybase.
  • I have a public key whose fingerprint is 8028 073C 0F39 ECB6 7127 E14E BF39 AB54 6335 5AC2

To claim this, I am signing this object:

import json
import websocket
ws = websocket.WebSocket()
ws.connect("wss://api.bitfinex.com/ws/2")
ws.send(json.dumps({
"event":"subscribe",
"channel":"book",
"pair":"BTCUSD",
arqin = open('arq-teste.txt','r')
arqout = open('arquivo-2','w+')
for l in arqin:
ls = l.split(';')
if ls[0].startswith('aug') == True and ls[1].startswith('Cc') == True:
arqout.write(l)
arqin.close()
arqout.close()
import unittest
def frame_calc(sequence):
modulo = len(sequence) % 3
if modulo == 0:
return 0
elif modulo == 1:
return 1
elif modulo == 2:
return 2
#!/usr/bin/python
#
# Exploit Title: Apache James Server 2.3.2 Authenticated User Remote Command Execution
# Date: 16\10\2014
# Exploit Author: Jakub Palaczynski, Marcin Woloszyn, Maciej Grabiec
# Vendor Homepage: http://james.apache.org/server/
# Software Link: http://ftp.ps.pl/pub/apache/james/server/apache-james-2.3.2.zip
# Version: Apache James Server 2.3.2
# Tested on: Ubuntu, Debian
# Info: This exploit works on default installation of Apache James Server 2.3.2

Gestão de projetos

Resumo da matéria para o segundo semestre

Comunicação

  • Quando o projeto n se comunica direito ele pode falhar
  • Plano de gerenciamento das comunicações
  • Formaliza as comunicações, reuniões
  • Serve para alinhar espectativas e etc
1 import unittest
2 from fasta_normalizer import fasta2dict
3
4 def frame_calc(sequence):
5 modulo = len(sequence) % 3
6 if modulo == 0:
7 return 0
8 elif modulo == 1:
9 return 1
10 elif modulo == 2:
from Bio import SeqIO
from random import choice
def reverse_translate(sequence):
translation_table = {
"F":["ttt","ttc",],
"L":["tta","ttg","ctt","ctc","ctg",],
"I":["att","atc",],
"M":["atg"],
"V":["gtt","gtc","gta","gtg",],