Skip to content

Instantly share code, notes, and snippets.

@paulirish
paulirish / how-to-view-source-of-chrome-extension.md
Last active January 7, 2026 11:56
How to view-source of a Chrome extension

Option 1: Command-line download extension as zip and extract

extension_id=jifpbeccnghkjeaalbbjmodiffmgedin   # change this ID
curl -L -o "$extension_id.zip" "https://clients2.google.com/service/update2/crx?response=redirect&os=mac&arch=x86-64&nacl_arch=x86-64&prod=chromecrx&prodchannel=stable&prodversion=44.0.2403.130&x=id%3D$extension_id%26uc" 
unzip -d "$extension_id-source" "$extension_id.zip"

Thx to crxviewer for the magic download URL.

@jbrown17
jbrown17 / rsa.java
Last active June 5, 2025 14:34
Quick, simple implementation of RSA encryption algorithm without external libraries
import java.awt.EventQueue;
import java.io.*;
import java.math.BigInteger;
import java.util.ArrayList;
import java.util.Random;
import java.util.Scanner;
/**
* Quick and dirty implementation of the RSA algorithm
@divyanshu013
divyanshu013 / rsa.c
Created October 12, 2015 04:50
Simple RSA implementation in C
#include<stdio.h>
#include<stdlib.h>
#include<math.h>
#include<string.h>
/* Refer to http://www.coders-hub.com/2013/04/c-code-to-encrypt-and-decrypt-message.html#.Vhs81MryNC1 */
long int p,q,n,t,flag,e[100],d[100],temp[100],j,m[100],en[100],i;
char msg[100];
int prime(long int);
@JoshCheek
JoshCheek / cheating_at_drawful.md
Last active June 15, 2021 11:59
Cheating at drawful

Video of this code being run: https://vimeo.com/152923160/settings


First, I would google for an image that represented what I had to draw. Then ran this code in pry to convert it into a set of x, y coordinates that should be dark:

require 'chunky_png'
canvas = ChunkyPNG::Canvas.from_file('scarface.png').grayscale
@nstarke
nstarke / release-android-debuggable.md
Last active November 23, 2025 00:49
How to make a Release Android App debuggable

How to make a Release Android App debuggable

Let's say you want to access the application shared preferences in /data/data/com.mypackage.
You could try to run adb shell and then run-as com.mypackage ( or adb shell run-as com.mypackge ls /data/data/com.mypackage/shared_prefs), but on a production release app downloaded from an app store you're most likely to see:

run-as: Package 'com.mypackage' is not debuggable
@russelldb
russelldb / tmux.md
Last active February 26, 2025 01:56 — forked from andreyvit/tmux.md
tmux cheatsheet

tmux cheat sheet

(C-x means ctrl+x, M-x means alt+x)

Prefix key

The default prefix is C-b. If you (or your muscle memory) prefer C-a, you need to add this to ~/.tmux.conf:

remap prefix to Control + a

@fntlnz
fntlnz / self-signed-certificate-with-custom-ca.md
Last active January 4, 2026 09:53
Self Signed Certificate with Custom Root CA

Create Root CA (Done once)

Last update: Nov 2025.

Create Root Key

Attention: this is the key used to sign the certificate requests, anyone holding this can sign certificates on your behalf. So keep it in a safe place!

openssl ecparam -genkey -name secp384r1 | openssl ec -aes256 -out rootCA.key
@inaz2
inaz2 / fastbins_malloc_hook.c
Last active January 6, 2020 12:05
overwrite malloc_hook by fastbins unlink attack
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
void jackpot() { puts("jackpot!"); }
int main()
{
puts("[+] allocate p1, p2");
char *p1 = malloc(0x100);
@varhub
varhub / Android - Enable ADB from recovery.md
Created December 23, 2016 17:54
Android - Enable ADB from recovery

Android - Enable ADB from recovery

Credits to @TheOnlyAnil-@Firelord[^stackoverflow]

  • Requirements: a) stock recovery + rooted phone b) custom recovery

  • Files changed:

#include <iostream>
#include <cstdio>
#include <cassert>
//
// init
//
const int STACK_SIZE = 1000;
thread_local int stack[STACK_SIZE];
int BP;