Skip to content

Instantly share code, notes, and snippets.

# Quick and dirty demonstration of CVE-2014-0160 by Jared Stafford ([email protected])
# The author disclaims copyright to this source code.
import sys
import struct
import socket
import time
import select
import re
import codecs
#!/usr/bin/python
# Quick and dirty demonstration of CVE-2014-0160 by Jared Stafford ([email protected])
# The author disclaims copyright to this source code.
import sys
import struct
import socket
import time
import select
import os, time, random
from collections import defaultdict
from System import Console, ConsoleColor, ConsoleKey
from System.Threading import Thread, ThreadStart
class Screen(object):
red = ConsoleColor.Red; green = ConsoleColor.Green; blue = ConsoleColor.Blue;black = ConsoleColor.Black
dimension = (21,39)
def __update_input(self):
mapping = defaultdict(lambda: None,
# = Usage
# Download to your jekyll site directory, and run it
# `ruby jekyll_image_fetcher.rb`
Dir['_posts/*.md'].each do |path|
content = File.open(path).read
basename = File.basename path, '.md'
content.gsub!(/!\[\]\((.+)\)/) do |m|
url = $1