Skip to content

Instantly share code, notes, and snippets.

@BourgonLaurent
BourgonLaurent / APPro_LMC_change.applescript
Last active August 7, 2022 03:58
AirPods Pro Listening Mode Changer. Copy-Paste the contents of the file "AirPods Pro Listening Mode Changer.json" inside BTT. The two other files are the scripts used by the widget. The last file (APPro_LMC_diag.applescript) retrieves the necessary information to add a new device, or debug a current one.
-- Change the listening mode of AirPods Pro, Laurent Bourgon 2020
-- Works in the background using private APIs, thanks to @smithumble
-- Frameworks to connect with Bluetooth
use framework "IOBluetooth"
use scripting additions
-- Get AirPods Name
tell application "BetterTouchTool" to set AIRPODS_PRO_NAME to get_string_variable "AirPodsWg_DevceName"
@dhinakg
dhinakg / tutorial.md
Last active September 16, 2024 13:12
iOS/iPadOS 14.3 OTA
@GetVladimir
GetVladimir / Force-RGB-Color-on-M1-Mac.md
Last active August 21, 2025 03:24
Force RGB Color on M1 Mac

Force RGB Color on M1 Mac

How to Force RGB Color Output instead of YPbPr on your M1 Apple Silicon Mac for an External Monitor.

This step-by-step video tutorial will guide you through the procedure of forcing RGB color output on your M1 Mac.

Force RGB Color on M1 Mac

Here is the direct link to the video tutorial: https://www.youtube.com/watch?v=Z1EqH3fd0V4

The video also has Closed Captions (Subtitles) that you can enable, to make it easier to follow if needed.

@mashirozx
mashirozx / _polyfill.scss
Last active April 18, 2025 09:51
Flex box gap polyfill with scss mixin
@use 'sass:math';
@mixin _flex-gap($gap, $row: true) {
$margin: math.div($gap, 2);
$transform: -$margin;
@if $row {
margin-left: $transform;
margin-right: $transform;
} @else {
margin-top: $transform;
margin-bottom: $transform;
@jcubic
jcubic / cdn.md
Last active September 5, 2025 07:12
How to setup a literally free CDN
@hackermondev
hackermondev / research.md
Last active September 19, 2025 19:46
Unique 0-click deanonymization attack targeting Signal, Discord and hundreds of platform

hi, i'm daniel. i'm a 15-year-old high school junior. in my free time, i hack billion dollar companies and build cool stuff.

3 months ago, I discovered a unique 0-click deanonymization attack that allows an attacker to grab the location of any target within a 250 mile radius. With a vulnerable app installed on a target's phone (or as a background application on their laptop), an attacker can send a malicious payload and deanonymize you within seconds--and you wouldn't even know.

I'm publishing this writeup and research as a warning, especially for journalists, activists, and hackers, about this type of undetectable attack. Hundreds of applications are vulnerable, including some of the most popular apps in the world: Signal, Discord, Twitter/X, and others. Here's how it works:

Cloudflare

By the numbers, Cloudflare is easily the most popular CDN on the market. It beats out competitors such as Sucuri, Amazon CloudFront, Akamai, and Fastly. In 2019, a major Cloudflare outage k