start new:
tmux
start new with session name:
tmux new -s myname
「宋体-方正超大字符集」 | |
& | |
「PMingLiU-ExtB」 | |
檢字表 | |
1 | |
一部 |
I just had to set up Jenkins to use GitHub. My notes (to myself, mostly):
For setting up Jenkins to build GitHub projects. This assumes some ability to manage Jenkins, use the command line, set up a utility LDAP account, etc. Please share or improve this Gist as needed.
#!/usr/bin/python | |
__version__="0.0.1" | |
__author__="david" | |
__email__="[email protected]" | |
import argparse | |
import csv | |
import json | |
from multiprocessing import Process | |
import netaddr |
import sqlalchemy as sa | |
import sqlalchemy.orm as orm | |
from sqlalchemy.ext.declarative import declarative_base | |
from sqlalchemy.ext.declarative import declared_attr | |
from sqlalchemy.orm import scoped_session, sessionmaker | |
DBSession = scoped_session(sessionmaker()) | |
class BaseMixin(object): | |
query = DBSession.query_property() | |
id = sa.Column(sa.Integer, primary_key=True) |
# Reset our signal handler | |
signal.signal(signal.SIGINT, signal.SIG_DFL) | |
target_bssid = raw_input('Enter a BSSID to perform an deauth attack (q to quit): ') | |
while target_bssid not in networks: | |
if target_bssid == 'q' : sys.exit(0) | |
raw_input('BSSID not detected... Please enter another (q to quit): ') | |
# Get our interface to the correct channel | |
print 'Changing ' + args.interface + ' to channel ' + str(networks[target_bssid][1]) | |
os.system("iwconfig %s channel %d" % (args.interface, networks[target_bssid][1])) | |
# Now we have a bssid that we have detected, let's get the client MAC |
server { | |
listen 80; | |
server_name MY.WEBSITE.TLD; | |
root /Users/ME/Sites/FOLDER; | |
client_header_buffer_size 16k; | |
large_client_header_buffers 16 16k; | |
# qsa | |
rewrite ^/api/?(.*)$ /webservice/dispatcher.php?url=$1 last; |
This Gist is created in 2014, and it's highliy outdated now, according to one of mitmproxy
's manjor contributor (check his comment below). Thanks for letting us know, @mhils!
Modern applications usually make use of back-end API servers to provide their services. With a non-transparent HTTPs proxy, which intercepts the communication between clients and servers (aka the man-in-the-middle scheme), you can easily manipulate both API requests and responses.