" Ordinary settings | |
set title | |
set autoindent | |
set cursorcolumn | |
set cursorline | |
set number | |
set ruler |
As a security professional, it is important to conduct a thorough reconnaissance. With the increasing use of APIs nowadays, it has become paramount to keep access tokens and other API-related secrets secure in order to prevent leaks. However, despite technological advances, human error remains a factor, and many developers still unknowingly hardcode their API secrets into source code and commit them to public repositories. GitHub, being a widely popular platform for public code repositories, may inadvertently host such leaked secrets. To help identify these vulnerabilities, I have created a comprehensive search list using powerful search syntax that enables the search of thousands of leaked keys and secrets in a single search.
(path:*.{File_extension1} OR path:*.{File_extension-N}) AND ({Keyname1} OR {Keyname-N}) AND (({Signature/pattern1} OR {Signature/pattern-N}) AND ({PlatformTag1} OR {PlatformTag-N}))
**1.
#include <iostream> | |
#include <vector> | |
#include <string> | |
#include <stack> | |
using namespace std; | |
// redefine operator << to print the vector like just strings | |
template <typename S> | |
ostream& operator<<(ostream& os, | |
const vector<S>& vector) |
# espanso match file | |
# For a complete introduction, visit the official docs at: https://espanso.org/docs/ | |
# You can use this file to define the base matches (aka snippets) | |
# that will be available in every application when using espanso. | |
# Matches are substitution rules: when you type the "trigger" string | |
# it gets replaced by the "replace" string. | |
matches: |
@echo off | |
:: BatchGotAdmin | |
:------------------------------------- | |
REM --> Check for permissions | |
IF "%PROCESSOR_ARCHITECTURE%" EQU "amd64" ( | |
>nul 2>&1 "%SYSTEMROOT%\SysWOW64\cacls.exe" "%SYSTEMROOT%\SysWOW64\config\system" | |
) ELSE ( | |
>nul 2>&1 "%SYSTEMROOT%\system32\cacls.exe" "%SYSTEMROOT%\system32\config\system" | |
) |
import requests | |
from bs4 import BeautifulSoup | |
import time | |
import re | |
import random | |
class GoogleParsingConst: | |
index_name_class_name = "LC20lb MBeuO DKV0Md" | |
index_url_class_name = "iUh30 qLRx3b tjvcx" |
import random | |
import time | |
import os | |
from multiprocessing import Process, Queue | |
def roll_the_dice(id, start, end, result): | |
counters = [0, 0, 0, 0, 0, 0] | |
for _seq in range(start, end): | |
value = random.randint(0, 5) |
import requests | |
import sys | |
from bs4 import BeautifulSoup | |
from time import sleep | |
# fancy color! | |
class colorBrights: | |
BLACK = '\033[90m' | |
RED = '\033[91m' | |
GREEN = '\033[92m' |