Skip to content

Instantly share code, notes, and snippets.

@shoaloak
shoaloak / fix-entitlements.sh
Last active March 29, 2024 14:21
This script automates the process of granting specific entitlements to a set of iOS binaries, resolving issues related to 'Operation not permitted' errors, e.g., when accessing /private/var/mobile/Containers.
#!/bin/bash
# Author: Shoaloak (Axel Koolhaas) 2024
# Description: Fix iOS binary entitlements/access for "Operation not permitted"
ENTITLEMENT="com.apple.private.security.container-manager"
binaries=("sh" "bash" "zsh" "dash" # Shell
"ls" "cat" "find" "cp" "mv" # File management
"rm" "mkdir" "rmdir" "touch"
"file" "ln" "du" "scp"
"chmod" "chown" "chgrp" # Permissions
@jhaddix
jhaddix / content_discovery_all.txt
Created May 26, 2018 11:51
a masterlist of content discovery URLs and files (used most commonly with gobuster)
This file has been truncated, but you can view the full file.
`
~/
~
ים
___
__
_
@jhaddix
jhaddix / all.txt
Created January 19, 2019 04:35 — forked from orangetw/all.txt
all wordlists from every dns enumeration tool... ever. Please excuse the lewd entries =/
This file has been truncated, but you can view the full file.
.
..
........
@
*
*.*
*.*.*
🐎
@genedy2017
genedy2017 / k8s-helmfile-ubuntu.md
Created February 12, 2023 13:25
Install k8s + helm + helmfile on Ubuntu

Exactly how to install k8s + helm + helmfile on a fresh Ubuntu machine?

The web is full of outdated and confusing instructions, specially for installing and configuring docker, as well as getting helmfile to work! Moreover, those instructions are mostly defragmented among many sites and pages. I didn't find a single compiled list of steps in one place. So I decided to make one!

This is what worked for me on Ubuntu Jammy 22.04 64bit in Feb 2023 — YMMV!

  1. Update repos:
@jboner
jboner / latency.txt
Last active March 29, 2024 14:18
Latency Numbers Every Programmer Should Know
Latency Comparison Numbers (~2012)
----------------------------------
L1 cache reference 0.5 ns
Branch mispredict 5 ns
L2 cache reference 7 ns 14x L1 cache
Mutex lock/unlock 25 ns
Main memory reference 100 ns 20x L2 cache, 200x L1 cache
Compress 1K bytes with Zippy 3,000 ns 3 us
Send 1K bytes over 1 Gbps network 10,000 ns 10 us
Read 4K randomly from SSD* 150,000 ns 150 us ~1GB/sec SSD
@troykelly
troykelly / INTEGRATION.md
Last active March 29, 2024 14:17
Automatically mount rclone mounts

Automatic Rclone Mounting and Unmounting on macOS

Prerequisites

  • rclone configured with remotes.
  • The mounting script is properly set up.
  • brew package manager for installing sleepwatcher.

Steps

@haacked
haacked / ModelBuilderExtensions.cs
Last active March 29, 2024 14:16
Example of applying an EF Core global query filter on all entity types that implement an interface
/*
Copyright Phil Haack
Licensed under the MIT license - https://github.com/haacked/CodeHaacks/blob/main/LICENSE.
*/
using System;
using System.Linq;
using System.Linq.Expressions;
using System.Reflection;
using Microsoft.EntityFrameworkCore;
using Microsoft.EntityFrameworkCore.Metadata.Builders;
@bnchk
bnchk / encoins-monitor.sh
Created March 28, 2024 08:34
ENCS LIGHT RELAY MONITOR - notifications via push message
#!/bin/bash
#===============
# ENCS MONITOR - light relay notifications via push message - v0.2
#===============
# - sent via pushover.net app (free trial/$5usd forever /device)
# - create specific api key for encoins(+optionally load logo thumbnail)
# - sends hourly message if node failed
# - sends daily message if all ok
# - requires secrets_file containing both pushover apitoken and usrtoken (see below)
# - requires curl+jq packages installed: sudo apt-get update && sudo apt install curl jq
volatile bool pinA = true;
volatile bool pinB = true;
volatile byte current = 0;
volatile byte previous = 0;
int counter = 0;
int counterClick = 0;
byte up[] = {1, 3, 0, 2};
byte down[] = {2, 0, 3, 1};
@superkojiman
superkojiman / namemash.py
Last active March 29, 2024 14:15
Creating a user name list for brute force attacks.
#!/usr/bin/env python3
'''
NameMash by superkojiman
Generate a list of possible usernames from a person's first and last name.
https://blog.techorganic.com/2011/07/17/creating-a-user-name-list-for-brute-force-attacks/
'''