This is my personal list of Javascript Emulator
- [Apple II+] (http://porkrind.org/a2/)
- [Apple II js] (http://www.scullinsteel.com/apple2/)
| ''' | |
| hactool key verifier v0.2 by Khangaroo | |
| a very badly made script to verify your hactool keys | |
| Hash sources: | |
| https://gist.github.com/roblabla/d8358ab058bbe3b00614740dcba4f208 | |
| My own console | |
| https://github.com/SocraticBliss/hactool/blob/4169184c88a10cde0db8eaa83d38bd32a7f35751/KEYS.md | |
| Some places that I can't link | |
| ''' |
| 127.0.0.1 api.ak.facebook.com | |
| 127.0.0.1 api.connect.facebook.com | |
| 127.0.0.1 api.facebook.com | |
| 127.0.0.1 app.facebook.com | |
| 127.0.0.1 apps.facebook.com | |
| 127.0.0.1 ar-ar.facebook.com | |
| 127.0.0.1 badge.facebook.com | |
| 127.0.0.1 blog.facebook.com | |
| 127.0.0.1 connect.facebook.com | |
| 127.0.0.1 connect.facebook.net |
This is my personal list of Javascript Emulator
| # -*- coding: utf-8 -*- | |
| """ | |
| Python Script to download the Chrome Extensions (CRX) file directly from the google chrome web store. | |
| Referred from http://chrome-extension-downloader.com/how-does-it-work.php | |
| """ | |
| from __future__ import division | |
| import argparse | |
| import requests |
| Based on this: http://www.nathanbunn.com/NandUpgradeSteps/ | |
| using this: https://github.com/ihaveamac/ninfs | |
| and using this: https://github.com/rajkosto/memloader | |
| Using native MacOS tools + NinFS and memloader on the switch. | |
| - Make Backup of 32G NAND | |
| Use Hekate | |
| - Install 256G NAND | |
| - Restore boot0/1 backups with hekate |
In August 2007 a hacker found a way to expose the PHP source code on facebook.com. He retrieved two files and then emailed them to me, and I wrote about the issue:
http://techcrunch.com/2007/08/11/facebook-source-code-leaked/
It became a big deal:
http://www.techmeme.com/070812/p1#a070812p1
The two files are index.php (the homepage) and search.php (the search page)
| #!/usr/bin/perl | |
| use Mysql; | |
| use strict; | |
| use vars qw($school_name); | |
| use vars qw($pass); | |
| require "./cgi-lib.pl"; |
| from Crypto.Cipher import AES | |
| from Crypto.Util import Counter | |
| import struct | |
| """ | |
| typedef struct boot_dat_hdr | |
| { | |
| unsigned char ident[0x10]; | |
| unsigned char sha2_s2[0x20]; | |
| unsigned int s2_dst; |
| ########################################################### | |
| # TX SX OS MIPS VM disassembler - by hexkyz and naehrwert # | |
| ########################################################### | |
| import os | |
| import re | |
| import struct | |
| host_calls_0 = { | |
| 0x8E943DA2 : "host_crc32 (ptr r4r5, len r6)", |