A cat
clone with syntax highlighting and Git integration.
import re | |
from urllib.parse import unquote | |
FLAGS = re.IGNORECASE | re.DOTALL | |
ESC_DOLLAR = r'(?:\$|[\\%]u0024||\\x24|\\0?44|%24)' | |
ESC_LCURLY = r'(?:\{|[\\%]u007B|\\x7B|\\173|%7B)' | |
ESC_RCURLY = r'(?:\}|[\\%]u007D|\\x7D|\\175|%7D)' | |
_U_PERCENT_ESCAPE_RE = re.compile(r'%(u[0-9a-f]{4})', flags=FLAGS) | |
_PERCENT_ESCAPE_RE = re.compile(r'%[0-9a-f]{2}', flags=FLAGS) |
#!/usr/bin/env python3 | |
# # This python script provides a function to query the pfsense (+v2.4) dhcp leases status page and return a list of tuples including | |
# ip, hostname, and mac address. To use, ensure LXML is installed via package manager or via pip. | |
# | |
# 16-Dec-2016 - Original release | |
# 3-Sep-2020 - Minor update to match formatting of leases page in latest pfSense version (2.4.5). | |
# 9-Sep-2020 - Backported improvements to handle table rows with missing data, use global variables for user/pass/server_ip, | |
# and return list from scrape function as implemented by fryguy04 in fork here: | |
# https://gist.github.com/fryguy04/7d12b789260c47c571f42e5bc733a813 |
# Runs "$@" in a subshell with the caller's options, sets reply=(stdout stderr) | |
# and returns the status of the executed command. Both stdout and stderr are | |
# captured completely, including NUL bytes, incomplete UTF-8 characters and | |
# trailing LF, if any. | |
# | |
# Example: | |
# | |
# % zsh-run-command ls -d ~ /garbage | |
# % printf 'status: %s\nstdout: %s\nstderr: %s\n' $? "${(q+)reply[@]}" | |
# status: 2 |
A cat
clone with syntax highlighting and Git integration.
struct __ValueType__ { | |
} | |
struct __ValueType__Key: EnvironmentKey { | |
static var defaultValue = __ValueType__() | |
} | |
extension EnvironmentValues { | |
var __KeyName__: __ValueType__ { | |
get { |
The list below is compiled to inform, guide, and inspire budding security researchers. Oh and to pick something for bedtime reading too.
Included in the list are works on the following topics related to MCU/SoC security:
At the end of the list, there is also a section with links to articles of potential general interest, not addressing vulnerabilities in any specific device.
# EDIDUtil.sh v5.12 | |
# by joevt Jun 27/2020 | |
#========================================================================================= | |
# Modify EDID | |
getarrstart () { | |
# bash arrays start at 0 | |
# zsh arrays start at 1 (applies only to [] syntax) but this can be changed with "setopt ksh_arrays" | |
# zsh arrays start at 0 when using ${arr:x:x} syntax |
Moved to https://virtualize.link/secure/
csrutil disable | |
sudo nvram boot-args="intcoproc_unrestricted=1 kext-dev-mode=1 amfi_allow_any_signature=1 amfi_unrestrict_task_for_pid=1 PE_i_can_has_debugger=1 cs_enforcement_disable=1 amfi_get_out_of_my_way=1 amfi=0xff cs_debug=1 ipc_control_port_options=0" | |
sudo spctl --global-disable | |
sudo defaults write /Library/Preferences/com.apple.security GKAutoRearm -bool NO | |
sudo defaults write /Library/Preferences/com.apple.security.coderequirements Entitlements -string always | |
sudo defaults write /Library/Preferences/com.apple.security.coderequirements AllowUnsafeDynamicLinking -bool YES | |
sudo defaults write /Library/Preferences/com.apple.security.libraryvalidation.plist DisableLibraryValidation -bool YES | |
defaults write com.apple.loginwindow DisableScreenLockImmediate -bool yes |