I hereby claim:
- I am vmesel on github.
- I am vmesel (https://keybase.io/vmesel) on keybase.
- I have a public key whose fingerprint is 8028 073C 0F39 ECB6 7127 E14E BF39 AB54 6335 5AC2
To claim this, I am signing this object:
import random | |
perguntas = { | |
"1": { | |
"pontos": [51, 5, 0, 15, 25], | |
"pergunta": "AASSASASASASASASASAASSAKSAKSAKJSAASKS", | |
"respostas": ["Pergunta a", "Pergunta b", "Pergunta c", "Pergunta d", "Pergunta e"], | |
} | |
} |
### Keybase proof | |
I hereby claim: | |
* I am vmesel on github. | |
* I am vmesel (https://keybase.io/vmesel) on keybase. | |
* I have a public key ASCdCz_Vj2Fk3oGnMjK2UrpasjjCKtxpMjUVUVGbL6-aqgo | |
To claim this, I am signing this object: |
I hereby claim:
To claim this, I am signing this object:
import json | |
import websocket | |
ws = websocket.WebSocket() | |
ws.connect("wss://api.bitfinex.com/ws/2") | |
ws.send(json.dumps({ | |
"event":"subscribe", | |
"channel":"book", | |
"pair":"BTCUSD", |
arqin = open('arq-teste.txt','r') | |
arqout = open('arquivo-2','w+') | |
for l in arqin: | |
ls = l.split(';') | |
if ls[0].startswith('aug') == True and ls[1].startswith('Cc') == True: | |
arqout.write(l) | |
arqin.close() | |
arqout.close() |
import unittest | |
def frame_calc(sequence): | |
modulo = len(sequence) % 3 | |
if modulo == 0: | |
return 0 | |
elif modulo == 1: | |
return 1 | |
elif modulo == 2: | |
return 2 |
#!/usr/bin/python | |
# | |
# Exploit Title: Apache James Server 2.3.2 Authenticated User Remote Command Execution | |
# Date: 16\10\2014 | |
# Exploit Author: Jakub Palaczynski, Marcin Woloszyn, Maciej Grabiec | |
# Vendor Homepage: http://james.apache.org/server/ | |
# Software Link: http://ftp.ps.pl/pub/apache/james/server/apache-james-2.3.2.zip | |
# Version: Apache James Server 2.3.2 | |
# Tested on: Ubuntu, Debian | |
# Info: This exploit works on default installation of Apache James Server 2.3.2 |
1 import unittest | |
2 from fasta_normalizer import fasta2dict | |
3 | |
4 def frame_calc(sequence): | |
5 modulo = len(sequence) % 3 | |
6 if modulo == 0: | |
7 return 0 | |
8 elif modulo == 1: | |
9 return 1 | |
10 elif modulo == 2: |
from Bio import SeqIO | |
from random import choice | |
def reverse_translate(sequence): | |
translation_table = { | |
"F":["ttt","ttc",], | |
"L":["tta","ttg","ctt","ctc","ctg",], | |
"I":["att","atc",], | |
"M":["atg"], | |
"V":["gtt","gtc","gta","gtg",], |