This is just a BASIC cheatsheet for a PR based workflow using git and GitHub, geared towards new users of git and GitHub. If you are a new user, I HIGHLY recommend you skip to the end and review the Recommended Resources, which includes a sample GitHub repo you can clone and which will guide you through using GitHub.
| using System; | |
| using System.IO; | |
| using System.Security.Cryptography; | |
| using System.Runtime.Serialization.Formatters.Binary; | |
| namespace hawktracewsus | |
| { | |
| class Program | |
| { | |
| static void Main() |
| import sys | |
| import argparse | |
| from impacket.dpapi import MasterKeyFile, MasterKey, DPAPI_BLOB | |
| from impacket.uuid import bin_to_string | |
| from binascii import unhexlify, hexlify | |
| def decrypt_masterkey(mk_blob, dpapikey): | |
| """Decrypt masterkey blob with dpapikey pulled from secretsdump""" | |
| try: |
| cmake_minimum_required(VERSION 3.24) | |
| project(Stardust | |
| LANGUAGES CXX | |
| ) | |
| # Build option for generating the final shellcode.bin file | |
| option(STARDUST_BUILD_SHELLCODE "Build the final shellcode.bin file" OFF) | |
| # Add nasm for the Stardust.asm source if building shellcode | |
| if(${STARDUST_BUILD_SHELLCODE}) |
hi, i'm daniel. i'm a 15-year-old high school junior. in my free time, i hack billion dollar companies and build cool stuff.
3 months ago, I discovered a unique 0-click deanonymization attack that allows an attacker to grab the location of any target within a 250 mile radius. With a vulnerable app installed on a target's phone (or as a background application on their laptop), an attacker can send a malicious payload and deanonymize you within seconds--and you wouldn't even know.
I'm publishing this writeup and research as a warning, especially for journalists, activists, and hackers, about this type of undetectable attack. Hundreds of applications are vulnerable, including some of the most popular apps in the world: Signal, Discord, Twitter/X, and others. Here's how it works:
By the numbers, Cloudflare is easily the most popular CDN on the market. It beats out competitors such as Sucuri, Amazon CloudFront, Akamai, and Fastly. In 2019, a major Cloudflare outage k
-
Access Firefox Configuration:
- Open Firefox and type
about:configin the address bar, then press Enter. - Accept the warning message by clicking on "Accept the Risk and Continue."
- Open Firefox and type
-
Modify Preferences:
- Search for each of the following preferences and set them to the specified values:
| Preference | Value |
| import random | |
| import argparse | |
| import tempfile | |
| import ipaddress | |
| from time import sleep | |
| from shlex import split | |
| from os import path, remove | |
| from scapy.all import sniff | |
| from threading import Thread | |
| from subprocess import Popen, PIPE |
Original report
- Affected Vendor: OpenPrinting
- Affected Product: Several components of the CUPS printing system: cups-browsed, libppd, libcupsfilters and cups-filters.
- Affected Version: All versions <= 2.0.1 (latest release) and master.
- Significant ICS/OT impact? no
- Reporter: Simone Margaritelli [evilsocket@gmail.com]
- Vendor contacted? yes The vendor has been notified trough Github Advisories and all bugs have been confirmed:
| javascript:(function(){var scripts=document.getElementsByTagName("script"),regex=/(?<=(\"|\%27|\`))\/[a-zA-Z0-9_?&=\/\-\#\.]*(?=(\"|\'|\%60))/g,jsRegex=/(?<=(\"|\'|\%60))(?:\/|https?:\/\/)[a-zA-Z0-9_?&=\/\-\#\.]+\.js(?:\?[^"'%60]*)?(?=(\"|\'|\%60))/g;const results=new Set;const paramMap=new Map();const jsFiles=new Set();function processContent(t,src){var e=t.matchAll(regex);for(let r of e){results.add(r[0]);var params=r[0].split('?')[1];if(params){params.split('&').forEach(param=>{var [key,]=param.split('=');if(key){if(!paramMap.has(key)){paramMap.set(key,[]);}paramMap.get(key).push(src||'Inline script or HTML');}});}}var j=t.matchAll(jsRegex);for(let r of j){jsFiles.add(r[0]);}}for(var i=0;i<scripts.length;i++){var t=scripts[i].src;if(t){jsFiles.add(t);fetch(t).then(function(t){return t.text()}).then(text=>processContent(text,t)).catch(function(t){console.log("An error occurred: ",t)});}else{processContent(scripts[i].textContent);}}var pageContent=document.documentElement.outerHTML;processContent(pageContent |