https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/
Make sure the following options are off:
Disable pre-fetching
https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/
Make sure the following options are off:
Disable pre-fetching
Please see the most up-to-date version of this protocol on my blog at https://darencard.net/blog/.
inotify-tools
is installed (https://github.com/rvoicilas/inotify-tools)const timer = ms => new Promise(res => setTimeout(res, ms)); | |
// Unretweet normally | |
const unretweetTweet = async (tweet) => { | |
await tweet.querySelector('div[data-testid="unretweet"]').click(); | |
await timer(250); | |
await document.querySelector('div[data-testid="unretweetConfirm"]').click(); | |
console.log('****// Unretweeted Successfully //****') | |
} |
private extension MyTests { | |
private func setLocaleAsJP() { | |
let original = class_getClassMethod(NSLocale.self, #selector(getter: NSLocale.current))! | |
let swizzled = class_getClassMethod(NSLocale.self, #selector(NSLocale.myCurrentLocale))! | |
method_exchangeImplementations(original, swizzled) | |
} | |
} | |
// https://stackoverflow.com/questions/31065859/how-can-i-change-the-locale-on-the-xcode-playground | |
fileprivate extension NSLocale { |
Most apps and games downloaded from Microsoft Store on Windows 10 are placed on a special folder (WindowsApps), which the user probably won't have access.
That said, in case you want to use mods in a game, you'll likely need access to the it's files. Even though Microsoft introduced the option to enable mods, not all developers have adopted this yet (if some ever will). This document presents an alternative to get access to the files you may need.
This is basically a copy-paste of u/WiredRawdy's reddit post.
<?php | |
const PASSPHRASE = ''; // use 'openssl rand -hex 32' to generate key, same with python | |
function encrypt(array $data): string | |
{ | |
$data_json_64 = base64_encode(json_encode($data)); | |
$secret_key = hex2bin(PASSPHRASE); | |
$iv = openssl_random_pseudo_bytes(openssl_cipher_iv_length('aes-256-gcm')); | |
$tag = ''; | |
$encrypted_64 = openssl_encrypt($data_json_64, 'aes-256-gcm', $secret_key, 0, $iv, $tag); |
Some notes and techniques for reverse engineering Webpack apps
These are my notes basically. At first i created this gist just as a reminder for myself. But feel free to use this for your project as a starting point. If you have questions you can find me on twitter @thomasf https://twitter.com/thomasf This is how i used it on a Debian Wheezy testing (https://www.debian.org/releases/testing/)
Discuss, ask questions, etc. here https://news.ycombinator.com/item?id=7445545
server { | |
listen 80; | |
server_name example.wiki; | |
# this config assumes that MediaWiki is installed into /opt/mediawiki/w, | |
# so LocalSettings.php would be located at /opt/mediawiki/w/LocalSettings.php | |
root /opt/mediawiki; | |
index index.php; | |
# allow larger file uploads and longer script runtimes |