Clone plugin from
https://github.com/silentsignal/oracle_forms/
Edit script for Python 3 (see pull request)
if ctx.options.corrupt_handshake:
flow.response.content = flow.response.content.replace(b'Mate', b'Matf')
# Test for semantic between sentences using small language model | |
from transformers import AutoTokenizer, AutoModel | |
import torch | |
from sklearn.metrics.pairwise import cosine_similarity | |
# Load a multilingual lightweight model and tokenizer | |
model_name = "sentence-transformers/paraphrase-multilingual-MiniLM-L12-v2" | |
tokenizer = AutoTokenizer.from_pretrained(model_name) | |
model = AutoModel.from_pretrained(model_name) |
#!/bin/bash | |
docker create --name extract_test repo.foo.bar/some_image:v1337 | |
mkdir container | |
docker export extract_test | tar xvf - -C container |
#!/bin/bash | |
# Run PXE boot server on interface | |
# Seems to work with UEFI and Secureboot | |
# Spip, 2023 | |
# | |
# Most stuff from https://www.youtube.com/watch?v=E_OlsA1hF4k | |
# | |
# Check args |
/* | |
Simple HackRF programming exercise | |
Sipke '19 | |
This program receives raw data from a certain frequency until the user pressed ctrl+c. | |
Code is mostly taken from hackrf_sweep.c (hackrf toolbox) and converted to the bare minimum. | |
It's created to learn about how the HackRF behaves and to do something with it via custom code that doesn't involve GnuRadio. | |
Note that you can directly use the command line tools hackrf_sweep, hackrf_transfer and rtl_sdr for the same thing and more. |
import ssl | |
from Crypto.Util import asn1 | |
from OpenSSL.crypto import FILETYPE_PEM, FILETYPE_ASN1, load_certificate, dump_privatekey | |
def getModulusFromServer(host, port=443): | |
try: | |
# get cert from server | |
cert = ssl.get_server_certificate((host,port)) | |
# load certificate |