| https://github.com/github/training-kit | |
| https://github.com/AdguardTeam/AdGuardHome | |
| https://github.com/TH3xACE/SUDO_KILLER | |
| https://github.com/simbody/simbody | |
| https://github.com/matthieu-hackwitharts/Win32_Offensive_Cheatsheet |
| #!/bin/bash | |
| if [ "$#" -lt 1 ] || [ "$#" -gt 3 ] | |
| then | |
| echo "Usage: ./bypass.sh [OPTIONS] http://url/path/" | |
| echo "OPTIONS:" | |
| echo " -c Return curl command if response is 200" | |
| echo " -r Allow redirection if response is 3XX" | |
| exit | |
| fi |
| Java.perform(function() { | |
| var RootPackages = ["com.noshufou.android.su", "com.noshufou.android.su.elite", "eu.chainfire.supersu", | |
| "com.koushikdutta.superuser", "com.thirdparty.superuser", "com.yellowes.su", "com.koushikdutta.rommanager", | |
| "com.koushikdutta.rommanager.license", "com.dimonvideo.luckypatcher", "com.chelpus.lackypatch", | |
| "com.ramdroid.appquarantine", "com.ramdroid.appquarantinepro", "com.devadvance.rootcloak", "com.devadvance.rootcloakplus", | |
| "de.robv.android.xposed.installer", "com.saurik.substrate", "com.zachspong.temprootremovejb", "com.amphoras.hidemyroot", | |
| "com.amphoras.hidemyrootadfree", "com.formyhm.hiderootPremium", "com.formyhm.hideroot", "me.phh.superuser", | |
| "eu.chainfire.supersu.pro", "com.kingouser.com" | |
| ]; |
NOTE: This is a fork of the original Gist, with the code made more readable, and additional analysis added.
This is the source of background.js for a now-unpublished Chrome extension called "Video Downloader professional" (ID kmdldgcmokdpmacblnehppgkjphcbpnn, since then replaced with another "Video Downloader professional" (ID bacakpdjpomjaelpkpkabmedhkoongbi). This script is republished here for educational / research purposes. It has initially been extracted from the extension’s archive available as v2.4 on https://www.crx4chrome.com/.
The extension has appeared in malware discussions in the past. Its replacement of Video downloader professional "bacakpdjpomjaelpkpkabmedhkoongbi" seems related t
This is the source of background.js for a now-unpublished Chrome extension called "Video Downloader professional" (ID kmdldgcmokdpmacblnehppgkjphcbpnn, since then replaced with another "Video Downloader professional" (ID bacakpdjpomjaelpkpkabmedhkoongbi). This script is republished here for educational / research purposes. It has initially been extracted from the extension’s archive available as v2.4 on https://www.crx4chrome.com/.
The extension has appeared in malware discussions in the past. Its replacement of Video downloader professional "bacakpdjpomjaelpkpkabmedhkoongbi" seems related to the [ownership change of The Great Suspender](greatsuspender/thegreatsuspender#1263 (comment)
| 0059.co.kr | |
| 007.no | |
| 007airsoft.com | |
| 008.vista.kz | |
| 01186mb.ca | |
| 012.ca | |
| 01nii.ru | |
| 0286776498.com | |
| 0286780777.com | |
| 02asat.photoherald.com |
#summary Bookmarks List = Hacker Media =
== Blogs Worth It: == What the title says. There are a LOT of pentesting blogs, these are the ones i monitor constantly and value in the actual day to day testing work.
* http://carnal0wnage.blogspot.com/
* http://www.mcgrewsecurity.com/
* http://www.gnucitizen.org/blog/
| @echo off | |
| title Activate Microsoft Office 2019 ! | |
| cls | |
| echo ============================================================================ | |
| echo #Project: Activating Microsoft software products | |
| echo ============================================================================ | |
| echo. | |
| echo #Supported products: | |
| echo - Microsoft Office Standard 2019 | |
| echo - Microsoft Office Professional Plus 2019 |