Skip to content

Instantly share code, notes, and snippets.

@qinwentu
qinwentu / jenkinsJobConsoleOutput.py
Created January 5, 2024 08:37 — forked from m-x-k/jenkinsJobConsoleOutput.py
Python script to help get jenkins job console output
#!/usr/bin/env python
import re
import argparse
import requests
jenkins_url = "https://localhost:8080"
# Add new jobs here:
jobs = {
windows CMD命令大全及详细解释和语法
引用:
http://letle.iteye.com/blog/169045
http://www.cppblog.com/kyelin/archive/2007/04/21/22540.aspx
windows批处理程序中的特殊字符
批处理介绍
纯以dos系统而言,可执行程序大约可以细分为五类,依照执行优先级由高到低排列分别是:
DOSKEY宏命令(预先驻留内存)
@qinwentu
qinwentu / WindowDos批处理指导
Created September 6, 2018 12:08 — forked from deneschen/WindowDos批处理指导
WindowDos批处理指导
Windows批处理(cmd/bat)常用命令小结
前言
批处理文件(batch file)包含一系列 DOS命令,通常用于自动执行重复性任务。用户只需双击批处理文件便可执行任务,而无需重复输入相同指令。
编写批处理文件非常简单,但难点在于确保一切按顺序执行。编写严谨的批处理文件可以极大程度地节省时间,在应对重复性工作时尤其有效。
在Windows中善用批处理可以简化很多重复工作
阅读原文 - https://wsgzao.github.io/post/windows-batch/
@qinwentu
qinwentu / PicConverText.py
Created September 28, 2016 12:22 — forked from evi1m0/PicConverText.py
12306 新版验证码识别脚本 (已失效)
#!/usr/bin/env python
# coding=utf8
# author=evi1m0
# website=linux.im
'''
12306 Captcha Picture:
author: Evi1m0@20150316
1. Download Captcha
2. Pic Conver Text
@qinwentu
qinwentu / intercept-https-with-python-mitmproxy.md
Created February 25, 2016 16:51 — forked from dannvix/intercept-https-with-python-mitmproxy.md
Intercept and manipulate HTTPs traffic with Python and mitmproxy

Intercepts HTTPs Traffic with Python & mitmproxy

Introduction

Modern applications usually make use of back-end API servers to provide their services. With a non-transparent HTTPs proxy, which intercepts the communication between clients and servers (aka the man-in-the-middle scheme), you can easily manipulate both API requests and responses.

This manual helps you create your own proxy with Python and mitmproxy/libmproxy. Mitmproxy ships with both a standalone command-line tool (mitmproxy) and a Python library (libmproxy).

@qinwentu
qinwentu / GHOST-test.sh
Last active September 17, 2015 18:04 — forked from scuderiaf1/GHOST-test.sh
GHOST - gethostbyname Detector GHOST-test.sh CVE-2015-0235 <https://access.redhat.com/security/cve/CVE-2015-0235>
#!/bin/bash
#Version 3
## command line to run
## curl -L https://gist.githubusercontent.com/scuderiaf1/52f881e6cce407228780/raw/043b6124f75d4c897377c157c6efab53654eb042/GHOST-test.sh |bash
echo "Installed glibc version(s)"
rv=0
for glibc_nvr in $( rpm -q --qf '%{name}-%{version}-%{release}.%{arch}\n' glibc ); do
glibc_ver=$( echo "$glibc_nvr" | awk -F- '{ print $2 }' )
glibc_maj=$( echo "$glibc_ver" | awk -F. '{ print $1 }')
#!/usr/bin/python
# Quick and dirty demonstration of CVE-2014-0160 by Jared Stafford ([email protected])
# The author disclaims copyright to this source code.
import sys
import struct
import socket
import time
import select