- maim
- xclip
Set this on your i3 config file ~/.i3/config
# Screenshots
| / | |
| $$$lang-translate.service.js.aspx | |
| $367-Million-Merger-Blocked.html | |
| $defaultnav | |
| ${idfwbonavigation}.xml | |
| $_news.php | |
| $search2 | |
| £º | |
| .0 |
| import urllib.request, json, sys, textwrap | |
| # Run like | |
| # python3 pubsploit.py CVE-2017-0143 | |
| def cveSearch(cve): | |
| with urllib.request.urlopen('http://cve.circl.lu/api/cve/'+cve) as url: | |
| data = json.loads(url.read().decode()) | |
| try: | |
| if data['cvss']: | |
| print("{} | CVSS {}".format(cve,data['cvss'])) |
| //Exploit Code by Shawar Khan | |
| var data_chunks = ''; | |
| // Capturing Records from API | |
| fetch('https://redacted.com/api/v3/records/all').then((resp) => resp.text()).then(function(data) { | |
| // Holds the records in as String | |
| var allrecords = data; | |
| // converting response to JSON |
| adb devices | |
| adb shell | |
| # enter shell prompt | |
| pm uninstall -k --user 0 com.google.android.googlequicksearchbox | |
| pm uninstall -k --user 0 com.xiaomi.mipicks | |
| pm uninstall -k --user 0 com.android.browser |
| ` | |
| ~/ | |
| ~ | |
| ×™× | |
| ___ | |
| __ | |
| _ |
A combination of my own methodology and the Web Application Hacker's Handbook Task checklist, as a Github-Flavored Markdown file
| . | |
| .. | |
| ........ | |
| @ | |
| * | |
| *.* | |
| *.*.* | |
| 🎠|