Skip to content

Instantly share code, notes, and snippets.

View Siss3l's full-sized avatar
🦊

Sissel Siss3l

🦊
View GitHub Profile
@probonopd
probonopd / Wayland.md
Last active July 13, 2025 03:48
Think twice about Wayland. It breaks everything!

Think twice before abandoning Xorg. Wayland breaks everything!

image

Source: https://x.com/LundukeJournal/status/1940441670098809093

Hence, if you are interested in existing applications to "just work" without the need for adjustments, then you may be better off avoiding Wayland.

Wayland solves no issues I have but breaks almost everything I need. Even the most basic, most simple things (like xkill) - in this case with no obvious replacement. And usually it stays broken, because the Wayland folks mostly seem to care about Automotive, Gnome, maybe KDE - and alienating everyone else (e.g., people using just an X11 window manager or something like GNUstep) in the process.

@kevin-he-01
kevin-he-01 / _chunk-norris-writeup.md
Last active February 9, 2023 14:12
Chunk Norris - Google CTF 2020 Writeup

Chunk Norris — Google CTF 2020

Author: Kevin He
Team: 3PAC
Challenge Category: Crypto
Points: 98
Attachments: See challenge.py and output.txt in this Gist.

Chunk Norris is black belt in fast random number generation.

Start off by examining the code for challenge.py. It uses RSA — a modern public key cryptography algorithm — to encrypt the flag. The idea behind public key cryptography is that given the public key, everyone can encrypt plaintext messages, but only the party who possesses the secret private key can decrypt the ciphertext back into plaintext. In this challenge, only the public key is given, and it consists of the modulo n — a product of 2 large prime numbers — and the exponent e. However, the security of RSA heavily depends on the fact that its public key modulo n cannot be factored into its constituent primes p and q. Once p and q are known, the private key `d

@Soheab
Soheab / API's.md
Last active July 9, 2025 15:00
See here some of the API's you can use in your discord bot or anything

Some APIs for you.

Here are some APIs you can use in your Discord bot or any other project. For any help or questions on how to use one, please contact the owner of the API and not me.

A bigger list of APIs can be found at: https://github.com/public-apis/public-apis


[TOKEN] = API requires a token to access some if not all endpoints.

@muff-in
muff-in / resources.md
Last active July 10, 2025 04:38
A curated list of Assembly Language / Reversing / Malware Analysis / Game Hacking-resources
@tzmartin
tzmartin / wget-from-google-drive.md
Created July 24, 2020 14:41
Download files from Google Drive using wget in Jupyter or Colab

Programmatically download files from a Google Drive link:

For large file run the following command with necessary changes in FILEID and FILENAME:

!wget --load-cookies /tmp/cookies.txt "https://docs.google.com/uc?export=download&confirm=$(wget --quiet --save-cookies /tmp/cookies.txt --keep-session-cookies --no-check-certificate 'https://docs.google.com/uc?export=download&id=FILEID' -O- | sed -rn 's/.*confirm=([0-9A-Za-z_]+).*/\1\n/p')&id=FILEID" -O FILENAME && rm -rf /tmp/cookies.txt
@k-amin07
k-amin07 / VFIO.md
Last active June 30, 2025 23:43
VFIO Guide for GPU Passthrough

Introduction:

This guide is for achieving PCI-Passthrough with Intel 7700k and AMD RX 580. My host OS is Manjaro KDE edition, and guest is Windows 10.

Hardware:

Device Type Device
CPU Intel Core i7-7700K
Motherboard ASUS Prime Z270P
RAM Corsair Vengeance (DDR4 3000 MHz)
GPU (Host) Intel HD Graphics
@hackerscrolls
hackerscrolls / mutation_a.txt
Last active June 24, 2025 15:24
Mutation points in <a> tag for WAF bypass
<a[1]href[2]=[3]"[4]java[5]script:[6]alert(1)">
[1]
Bytes:
\x09 \x0a \x0c \x0d \x20 \x2f
<a/href="javascript:alert(1)">
<a\x09href="javascript:alert(1)">
[2,3]
@keerok
keerok / css.html
Created June 17, 2020 04:19
css timing attack via window.opener
<!DOCTYPE html>
<html lang="en" dir="ltr">
<head>
<meta charset="utf-8">
<title></title>
<h1>working on chrome linux & mac</h1>
<a href="" target=_blank>click me before</a>
</head>
<body>
<button type="button" id=clickme name="button">click me</button>