Discover gists
// wiring example for ripping a PMW3360 SROM: https://i.imgur.com/EspAlvz.jpeg | |
// set the board to 240mhz or higher for best results (WARNING: higher than 240mhz only works with USB if you overvolt the MCU) | |
// this implements reading SPI mode 3. if you want a different mode, you need to edit these two lines: | |
// uint32_t clockval = (1 << pin_clock); | |
// if (newclock && !clockval && buff_i < buffsize) | |
#include <pico/stdlib.h> | |
#define buffsize 50000 |
https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/
Make sure the following options are off:
Disable pre-fetching
Please see the most up-to-date version of this protocol on my blog at https://darencard.net/blog/.
- Make sure
inotify-tools
is installed (https://github.com/rvoicilas/inotify-tools) - Configure git as usual
- Clone the git repository of interest from github and, if necessary, add file you want to monitor
- Allow username/password to be cached so you aren't asked everytime
const timer = ms => new Promise(res => setTimeout(res, ms)); | |
// Unretweet normally | |
const unretweetTweet = async (tweet) => { | |
await tweet.querySelector('div[data-testid="unretweet"]').click(); | |
await timer(250); | |
await document.querySelector('div[data-testid="unretweetConfirm"]').click(); | |
console.log('****// Unretweeted Successfully //****') | |
} |
private extension MyTests { | |
private func setLocaleAsJP() { | |
let original = class_getClassMethod(NSLocale.self, #selector(getter: NSLocale.current))! | |
let swizzled = class_getClassMethod(NSLocale.self, #selector(NSLocale.myCurrentLocale))! | |
method_exchangeImplementations(original, swizzled) | |
} | |
} | |
// https://stackoverflow.com/questions/31065859/how-can-i-change-the-locale-on-the-xcode-playground | |
fileprivate extension NSLocale { |
Most apps and games downloaded from Microsoft Store on Windows 10 are placed on a special folder (WindowsApps), which the user probably won't have access.
That said, in case you want to use mods in a game, you'll likely need access to the it's files. Even though Microsoft introduced the option to enable mods, not all developers have adopted this yet (if some ever will). This document presents an alternative to get access to the files you may need.
This is basically a copy-paste of u/WiredRawdy's reddit post.
<?php | |
const PASSPHRASE = ''; // use 'openssl rand -hex 32' to generate key, same with python | |
function encrypt(array $data): string | |
{ | |
$data_json_64 = base64_encode(json_encode($data)); | |
$secret_key = hex2bin(PASSPHRASE); | |
$iv = openssl_random_pseudo_bytes(openssl_cipher_iv_length('aes-256-gcm')); | |
$tag = ''; | |
$encrypted_64 = openssl_encrypt($data_json_64, 'aes-256-gcm', $secret_key, 0, $iv, $tag); |
Some notes and techniques for reverse engineering Webpack apps
These are my notes basically. At first i created this gist just as a reminder for myself. But feel free to use this for your project as a starting point. If you have questions you can find me on twitter @thomasf https://twitter.com/thomasf This is how i used it on a Debian Wheezy testing (https://www.debian.org/releases/testing/)
Discuss, ask questions, etc. here https://news.ycombinator.com/item?id=7445545