I hereby claim:
- I am ahadsheriff on github.
- I am ahadsheriff (https://keybase.io/ahadsheriff) on keybase.
- I have a public key ASAs3GanCTaGcZnrtPEPr2BPFe6ZLDPc0IV9S70dyIBmxAo
To claim this, I am signing this object:
| from bs4 import BeautifulSoup | |
| import requests | |
| import requests.exceptions | |
| from urllib.parse import urlsplit | |
| from urllib.parse import urlparse | |
| from collections import deque | |
| import re | |
| url = "https://scrapethissite.com" | |
| # a queue of urls to be crawled |
| import argparse | |
| welcome = "Practicing creating interactive command-line interfaces" | |
| parser = argparse.ArgumentParser(description=welcome) | |
| parser.add_argument('--domain', '-d', required=True, | |
| help='domain name of the website you want to scrape. i.e. "https://ahadsheriff.com"') | |
| parser.add_argument('--ofile', '-o', | |
| help='define output file to save results of stdout. i.e. "output.txt"') | |
| parser.add_argument('--lines', '-l', |
| /* | |
| DCOM RPC Overflow Discovered by LSD - Exploit Based on Xfocus's Code | |
| Written by H D Moore <hdm [at] metasploit.com> | |
| - Usage: ./dcom <Target ID> <Target IP> | |
| - Targets: | |
| - 0 Windows 2000 SP0 (english) | |
| - 1 Windows 2000 SP1 (english) | |
| - 2 Windows 2000 SP2 (english) |
| #include <errno.h> | |
| #include <stdlib.h> | |
| #include <stdio.h> | |
| #include <unistd.h> | |
| extern int errno; | |
| int | |
| main(int argc, char **argv) | |
| { |
I hereby claim:
To claim this, I am signing this object:
| Verifying my Blockstack ID is secured with the address 1AKxxEkL6HV91Hrs24qvxEQECAkMYojzSL https://explorer.blockstack.org/address/1AKxxEkL6HV91Hrs24qvxEQECAkMYojzSL |
| import datetime | |
| import os | |
| # Local Website: http://127.0.0.1/var/website/html | |
| website = str(input("Enter the URL of the website you want to test: ")) | |
| os.system('ab -n 1000 -c 5 '+ website + ' > LoadTest.txt') | |
| infile = 'LoadTest.txt' |
| @ echo off | |
| echo Testing local connectivity | |
| ping 192.168.1.102 > nul | |
| if errorlevel 1 goto :ERRORLocal | |
| goto :LocalSuccess | |
| :TRYRemote | |
| echo Testing remote connectivity | |
| ping 8.8.8.8 > nul | |
| if errorlevel 1 goto :ERRORRemote |
| """ | |
| Author: Ahad Sheriff | |
| Description: | |
| Python script to add users to Linux groups. You can easily change the content | |
| of this script to fit your needs. | |
| Sample CSV file that I used to test is | |
| included as `sampleAccounts.csv` | |
| Data: | |
| The data in the csv file must be of the form: | |
| "Full Name", "Office Number", "Phone Extension #", "Department Name" |