- Create your realm / client
- Inside client configuration go to "Mappers"
- Click on "Create"
- Name it "hasura"
- Choose Mapper Type "Script Mapper"
- Add following script to demonstrate how it works
import classnames from 'classnames'; | |
const { | |
registerBlockType, | |
} = wp.blocks; | |
const { | |
InspectorControls, | |
InnerBlocks, | |
withColors, | |
getColorClass |
import os | |
import arrow | |
import urllib | |
import zipfile | |
import time | |
# get times | |
timezone = 'Europe/Amsterdam' | |
timestamp_format = 'YYYY-MM-DD_HH-mm-ss' | |
log_timestamp_format = "YYYY-MM-DD HH:mm:ss.SSS ZZ" |
GitHub repositories can disclose all sorts of potentially valuable information for bug bounty hunters. The targets do not always have to be open source for there to be issues. Organization members and their open source projects can sometimes accidentally expose information that could be used against the target company. in this article I will give you a brief overview that should help you get started targeting GitHub repositories for vulnerabilities and for general recon.
You can just do your research on github.com, but I would suggest cloning all the target's repositories so that you can run your tests locally. I would highly recommend @mazen160's GitHubCloner. Just run the script and you should be good to go.
$ python githubcloner.py --org organization -o /tmp/output
### | |
### | |
### UPDATE: For Win 11, I recommend using this tool in place of this script: | |
### https://christitus.com/windows-tool/ | |
### https://github.com/ChrisTitusTech/winutil | |
### https://www.youtube.com/watch?v=6UQZ5oQg8XA | |
### iwr -useb https://christitus.com/win | iex | |
### | |
### OR take a look at | |
### https://github.com/HotCakeX/Harden-Windows-Security |
#Loading Tweaks in the Simulator
With the latest updates to the simulator, this turns out to be pretty simple:
You need to be using kirb/theos
In order not to require MobileSubstrate to be loaded and your tweak to be compiled for i386/x86_64, add
In your makefile:
var degToCard = function(deg){ | |
if (deg>11.25 && deg<=33.75){ | |
return "NNE"; | |
}else if (deg>33.75 && deg<=56.25){ | |
return "ENE"; | |
}else if (deg>56.25 && deg<=78.75){ | |
return "E"; | |
}else if (deg>78.75 && deg<=101.25){ | |
return "ESE"; | |
}else if (deg>101.25 && deg<=123.75){ |