macOS keyboard shortcut favorites
Command (or Cmd) - ⌘
Control (or Ctrl) - ^
Option (or Alt) - ⌥
Shift - ⇧
Fn (Function) - 🌐
#!/usr/local/munki/munki-python | |
import argparse | |
import os | |
import pathlib | |
import plistlib | |
import pprint | |
import pwd | |
import subprocess | |
from time import sleep |
Model | Type | Identifier | |
---|---|---|---|
MacBook Air | LAPTOP | Mac14,15 | |
MacBook Air | LAPTOP | Mac14,2 | |
MacBook Air | LAPTOP | Mac15,12 | |
MacBook Air | LAPTOP | Mac15,13 | |
MacBook Air | LAPTOP | MacBookAir10,1 | |
MacBook Air | LAPTOP | MacBookAir2,1 | |
MacBook Air | LAPTOP | MacBookAir3,1 | |
MacBook Air | LAPTOP | MacBookAir3,2 | |
MacBook Air | LAPTOP | MacBookAir4,1 |
If you want to change things on the root drive of a Mac you will need to take some steps to disable the built in security of the system. Most of these steps are the same regardless if you are on Intel or Apple Silicon. If there is a difference it is noted.
Note that all of these things put a Mac into an unsupported and less secure state.
Make sure you either perform these steps in a VM or that you reset the protections after you are done poking around
(This list is not exahustive on the details of each. Check the links at the end for more info.)
#! /usr/bin/env python3 | |
''' | |
Needs Requests (pip3 install requests) | |
Author: Marcello Salvati, Twitter: @byt3bl33d3r | |
License: DWTFUWANTWTL (Do What Ever the Fuck You Want With This License) | |
This should allow you to detect if something is potentially exploitable to the log4j 0day dropped on December 9th 2021. |
const app = Application.currentApplication() | |
app.includeStandardAdditions = true | |
function getJSON(path) { | |
const fullPath = path.replace(/^~/, app.pathTo('home folder')) | |
const contents = app.read(fullPath) | |
return JSON.parse(contents) | |
} | |
function run() { |
The set
lines
set -euxo pipefail
is short for:set -e
set -u
#!/bin/bash | |
<<ABOUT_THIS_SCRIPT | |
------------------------------------------------------------------------------- | |
Written by:William Smith | |
Professional Services Engineer | |
Jamf | |
[email protected] | |
https://gist.github.com/2cf20236e665fcd7ec41311d50c89c0e |