This guide covers all supported ways to fully remove OpenClaw, including cases where the CLI is missing but background services are still running.
Use this if the openclaw command still works.
hi, i'm daniel. i'm a 16-year-old high school senior. in my free time, i hack billion dollar companies and build cool stuff.
about a month ago, a couple of friends and I found serious critical vulnerabilities on Mintlify, an AI documentation platform used by some of the top companies in the world.
i found a critical cross-site scripting vulnerability that, if abused, would let an attacker to inject malicious scripts into the documentation of numerous companies and steal credentials from users with a single link open.
(go read my friends' writeups (after this one))
how to hack discord, vercel, and more with one easy trick (eva)
Redacted by Counsel: A supply chain postmortem (MDL)
| '$schema' = 'https://jj-vcs.github.io/jj/latest/config-schema.json' | |
| [user] | |
| name = 'Pavan Kumar Sunkara' | |
| email = 'pavan.sss1991@gmail.com' | |
| username = 'pksunkara' | |
| [ui] | |
| default-command = 'default' | |
| editor = 'nvim' |
Arc
defaults write company.thebrowser.Browser.plist ExtensionManifestV2Availability -int 2
Chrome
defaults write com.google.Chrome.plist ExtensionManifestV2Availability -int 2
Chrome Beta
| #!/bin/bash | |
| GITHUB_USERNAME= | |
| GITHUB_TOKEN= | |
| GITHUB_ORGANISATION= | |
| GITHUB_API_CALL= | |
| GITHUB_MAX_PER_PAGE=100 | |
| GITHUB_CURRENT_PAGE=1 | |
| GITEA_TOKEN= |
Some notes, tools, and techniques for reverse engineering Golang binaries.
| # latest supported electron version as of october 2024 | |
| LATEST_SUPPORTED_VERSION=30 | |
| RED='\033[0;31m' | |
| GREEN='\033[0;32m' | |
| NC='\033[0m' # no color | |
| mdfind "kind:app" 2>/dev/null | sort -u | while read app; | |
| do | |
| filename="$app/Contents/Frameworks/Electron Framework.framework/Electron Framework" | |
| if [[ -f $filename ]]; then |
| #!/bin/bash | |
| # makes a cloud-init template vm from URL | |
| # call like ./make-debian-template.sh 9000 | |
| # Check for root priviliges | |
| if [[ $EUID -ne 0 ]]; then | |
| printf "Please run as root:\nsudo %s\n" "${0}" | |
| exit 1 | |
| fi |
To pass wireguard's traffic through a TCP tunnel by using udp2raw
For Arch linux, install udp2raw by pacman:
pacman -S udp2raw
For Debian or Ubuntu, you can use a binary release from: https://github.com/wangyu-/udp2raw/releases
| //Moved to https://github.com/Incognito-Lab/Frida-WebView-Inspector | |
| //frida -U "<ProcessName>" -l Android_WebView_inspector.js | |
| let Webview = Java.use("android.webkit.WebView"); | |
| // inspect settings of android.webkit.WebView class | |
| Java.choose("android.webkit.WebView", { | |
| // check if there are any running webview instances | |
| onMatch: function(instance) { | |
| // webview must be running on the main thread, so scheduleOnMainThread() will force the function to run on the main thread | |
| Java.scheduleOnMainThread(function(){ |