Skip to content

Instantly share code, notes, and snippets.

View anonyco's full-sized avatar
🐕
I really like dogs. They are so fun to play with, simple to care for, and cute.

jack anonyco

🐕
I really like dogs. They are so fun to play with, simple to care for, and cute.
  • United States
  • 08:36 (UTC -04:00)
View GitHub Profile
@ppoffice
ppoffice / build.sh
Last active July 24, 2024 15:11
Minimal Linux Build Script
#!/bin/sh
# Modified from ivandavidov/minimal-linux-script
# https://github.com/ivandavidov/minimal-linux-script
# This script includes a dynamic linked busybox, openssl, python and
# network support
set -ex
KERNEL_VERSION=4.17.2
BUSYBOX_VERSION=1.28.4
@liach
liach / Debate
Created August 24, 2019 03:36
Refute against forge discord's forgevsfabric trick
Minecraft Forge and FabricMC both have similar infrastructures: mod loaders, mod api, gradle build tools, deobuscation tools.
Mod loader: supposed to just load mods in Minecraft and deobfuscate the game.
Mod API: Offer events, loaders, hooks (e.g. model loading systems, config systems, standard energy API)
Gradle build tool: The gradle plugin that is used to build mods
Deobfuscation tool: Converts obfuscated Minecraft to deobfuscated ones so that modders can understand what they are modding
Minecraft Forge:
- Mod loader: Forge (more exactly, fmllauncher source set since 1.13, previously FML)
- Mod API: Forge (previously Forge and part of FML)
@anonyco
anonyco / Undo And Redo Mutation Observer Records.js
Last active August 23, 2024 12:18
This sample code snippet demonstrates how to undo and redo a MutationRecord observed by a MutationObserver
//(function(){"use strict";
var Object_freeze = Object.freeze;
/**
* @param {!Array<MutationRecord>} mutationRecords
* @return {undefined}
*/
function redoMutations(undidMutations) {
if (undidMutations) for (var i=undidMutations.length|0, record, type, target, addedNodes, removedNodes, nextSibling, value; i; ) {
@Neo23x0
Neo23x0 / log4j_rce_detection.md
Last active August 15, 2025 09:49
Log4j RCE CVE-2021-44228 Exploitation Detection

log4j RCE Exploitation Detection

You can use these commands and rules to search for exploitation attempts against log4j RCE vulnerability CVE-2021-44228

Grep / Zgrep

This command searches for exploitation attempts in uncompressed files in folder /var/log and all sub folders

sudo egrep -I -i -r '\$(\{|%7B)jndi:(ldap[s]?|rmi|dns|nis|iiop|corba|nds|http):/[^\n]+' /var/log