Original Source: https://securitytrails.com/blog/google-hacking-techniques
Reading time: 12 minutes
Some time ago we wrote an interesting post about the [OSINT](https://securitytrails.com/blog/what
| MONGODB_URI=[YOUR_MONGO_DB_URL] | |
| GITLAB_HOST=[YOUR_GITLABHOST_URL] | |
| GITLAB_PROJECT_ID=[YOUR_GITLAB_PROJECT_ID] | |
| GITLAB_BRANCH=[YOUR_GITLAB_BRANCH] | |
| GITLAB_PERSONAL_ACCESS_TOKEN=[YOUR_GITLAB_TOKEN] | |
| TINA_PUBLIC_IS_LOCAL=false | |
| # _optionally_ Use Tina Cloud for user authentication | |
| #NEXT_PUBLIC_TINA_CLIENT_ID=*** |
| // Log all DOM mutations to console. | |
| // Modern interpretation of https://github.com/kdzwinel/DOMListenerExtension | |
| observer = new MutationObserver(onMutation); | |
| observerSettings = { | |
| subtree: true, | |
| childList: true, | |
| attributes: true, | |
| attributeOldValue: true, |
| const { promisify } = require('util'); | |
| const sleep = promisify(setTimeout); | |
| async function f1() { | |
| await sleep(1000); | |
| } | |
| async function f2() { | |
| await sleep(2000); | |
| } |
| // YouTube API video uploader using JavaScript/Node.js | |
| // You can find the full visual guide at: https://www.youtube.com/watch?v=gncPwSEzq1s | |
| // You can find the brief written guide at: https://quanticdev.com/articles/automating-my-youtube-uploads-using-nodejs | |
| // | |
| // Upload code is adapted from: https://developers.google.com/youtube/v3/quickstart/nodejs | |
| const fs = require('fs'); | |
| const readline = require('readline'); | |
| const assert = require('assert') | |
| const {google} = require('googleapis'); |
| (async function () { | |
| // Define a Promise generator | |
| function getPromise() { | |
| // return Promise.resolve('done2'); | |
| // return Promise.reject('throw text '); | |
| return new Promise((resolve, reject) => { | |
| setTimeout(() => { | |
| resolve('done'); | |
| }, 300 /* ms */); | |
| }); |
| AliceBlue | |
| AntiqueWhite | |
| Aqua | |
| Aquamarine | |
| Azure | |
| Beige | |
| Bisque | |
| Black | |
| BlanchedAlmond | |
| Blue |
Original Source: https://securitytrails.com/blog/google-hacking-techniques
Reading time: 12 minutes
Some time ago we wrote an interesting post about the [OSINT](https://securitytrails.com/blog/what
| const { execSync } = require('child_process') | |
| const { createHash } = require('crypto') | |
| const invertColor = require('invert-color') | |
| const branchName = execSync('git rev-parse --abbrev-ref HEAD') | |
| const hash = createHash('sha256') | |
| hash.update(branchName) | |
| const color = '#' + hash.digest().toString('hex').substring(0, 6) | |
| const invertedColor = invertColor(color, true) |
| const audioCtx = new window.AudioContext(); | |
| const oscillator = audioCtx.createOscillator(); | |
| oscillator.connect(audioCtx.destination); | |
| oscillator.type = "sine"; | |
| let numItems = 0 | |
| oscillator.frequency.setValueAtTime( | |
| 1, | |
| audioCtx.currentTime |
| /* | |
| Copy this into the console of any web page that is interactive and doesn't | |
| do hard reloads. You will hear your DOM changes as different pitches of | |
| audio. | |
| I have found this interesting for debugging, but also fun to hear web pages | |
| render like UIs do in movies. | |
| */ | |
| const audioCtx = new (window.AudioContext || window.webkitAudioContext)() |