This script detects apps with not yet updated versions of Electron.
Repo: https://github.com/tkafka/detect-electron-apps-on-mac
See:
This script detects apps with not yet updated versions of Electron.
Repo: https://github.com/tkafka/detect-electron-apps-on-mac
See:
g.co, Google's official URL shortcut (update: or Google Workspace's domain verification, see bottom), is compromised. People are actively having their Google accounts stolen.
Someone just tried the most sophisticated phishing attack I've ever seen. I almost fell for it. My mind is a little blown.
Someone named "Chloe" called me from 650-203-0000 with Caller ID saying "Google". She sounded like a real engineer, the connection was super clear, and she had an American accent. Screenshot.
They said that they were from Google Workspace and someone had recently gained access to my account, which they had blocked. They asked me if I had recently logged in from Frankfurt, Germany and I said no.
I asked if they can confirm this is Google calling by emailing me from a Google email and they said sure and sent me this email and told me to look for a case number in it, which I saw in
This article aims to describe how to hook Swift functions.
Thanks to help from @NightwindDev for discussion and testing.
Overall, the idea is simple:
Write our own Swift code that will have the same calling convention as the target code,
then get a pointer to our own code and the target code, and call MSHookFunction
with
these values.
Some notes and tools for reverse engineering / deobfuscating / unminifying obfuscated web app code.
#!/usr/bin/env python | |
# -*- coding: utf-8 -*- | |
# | |
# System: macOS 12+ | |
# Version: TeamViewer v15.x.x | |
# Python: 3.x.x | |
# Command: sudo python TeamViewer-15-id-changer.py | |
# | |
import os |
# ffmpeg -i foo.m4a foo.wav | |
from pyannote.audio import Pipeline | |
pipeline = Pipeline.from_pretrained("pyannote/speaker-diarization") | |
diarization = pipeline("foo.wav") | |
# RTTM format https://catalog.ldc.upenn.edu/docs/LDC2004T12/RTTM-format-v13.pdf | |
with open("foo.rttm", "w") as rttm: | |
diarization.write_rttm(rttm) |
// ==UserScript== | |
// @name betterDashboard | |
// @namespace Nothing4You | |
// @match https://tracker.archiveteam.org/*/ | |
// @grant none | |
// @version 1.2.0 | |
// @author Nothing4You | |
// @description adds more information to archive team tracker dashboards | |
// @updateURL https://gist.githubusercontent.com/Nothing4You/b127b3cc4d4fabe372dcf078dbe86070/raw/dashboard.user.js | |
// ==/UserScript== |
# https://macos-defaults.com/ | |
# https://www.defaults-write.com | |
# reset with: defaults delete -g <FEATURE> | |
# dock | |
# position | |
defaults write com.apple.dock "orientation" -string "right" | |
# icon size | |
defaults write com.apple.dock "tilesize" -int "36" |
It's come to my attention that some people have been spamming issue trackers with a link to this gist. While it's a good idea to inform people of the situation in principle, please do not do this. By all means spread the word in the communities that you are a part of, after verifying that they are not aware yet, but unsolicited spam is not helpful. It will just frustrate people.
A number of things have happened since the last update.