If you don't know what Wireguard is, well, you should. It's fast, easy to setup and highly configurable. We will configure Wireguard for multiple users with various restrictions using iptables.
This should fit most setups (not mine though 😉)
(async () => { | |
function deleteFriend(friendId) { | |
return fetch("https://niantic-social-api.nianticlabs.com/niantic/graphql", { | |
headers: { | |
authorization: "Bearer " + localStorage.getItem("sessionToken"), | |
"content-type": "application/json", | |
}, | |
body: | |
'{"query":"mutation RemoveFriendMutation(\\n $input: UnfriendNianticUserRequest!\\n) {\\n unfriendNianticUser(input: $input) {\\n friends {\\n userId\\n nianticId\\n displayName\\n gameProfiles {\\n game\\n codename\\n }\\n avatarUrl\\n }\\n success\\n }\\n}\\n","variables":{"input":{"userId":"' + | |
friendId + |
If you don't know what Wireguard is, well, you should. It's fast, easy to setup and highly configurable. We will configure Wireguard for multiple users with various restrictions using iptables.
This should fit most setups (not mine though 😉)
#!/bin/bash | |
# | |
# Command line tool to communicate with iOS device as like ADB | |
# This is wrapper script for libimobiledevice and ios-deploy. | |
# | |
## Usage: | |
## idb [-s DEVID] [-b BUNDLE_ID] COMMAND [PARAMS...] | |
## idb devices | |
## idb logcat | |
## idb reboot |
js_include conf.d/oauth2.js; | |
server { | |
listen 80; | |
server_name localhost; | |
root /usr/share/nginx/html; | |
location / { | |
auth_request /_auth_init; | |
} |
So you want to decrypt switch content ? Well, the good news is that all the tools required to do that are written up! The great news is, since this is crypto we're talking about, you'll have to find the keys. Yourself. Like it's easter.
So here you can find a template of the $HOME/.switch/prod.keys
file that hactool uses to decrypt content. It contains all the SHA256 and location of the keys and seeds, so you can find them yourselves.
Note that all the seeds (the keys that end with _source
) are used along with the master_key_##
to derive an actual key.
If you have somehow obtained the key without the seed, you can rename xxx_source
to xxx_##
(where ## is the master key number) and put your key there.
First of all, please note that token expiration and revoking are two different things.
A JWT token that never expires is dangerous if the token is stolen then someone can always access the user's data.
Quoted from JWT RFC:
From aa0d9705564580ad6059e9e9e793a25764dd3a9f Mon Sep 17 00:00:00 2001 | |
From: Andrew <[email protected]> | |
Date: Mon, 9 Mar 2015 20:53:59 -0400 | |
Subject: [PATCH] Updated smiley parsing code | |
--- | |
pisg/modules/Pisg/Parser/Logfile.pm | 51 ++++++++++++++++++++++++++++++----- | |
1 file changed, 44 insertions(+), 7 deletions(-) | |
diff --git a/pisg/modules/Pisg/Parser/Logfile.pm b/pisg/modules/Pisg/Parser/Logfile.pm |
#!/usr/bin/env sh | |
## | |
# This is script with usefull tips taken from: | |
# https://github.com/mathiasbynens/dotfiles/blob/master/.osx | |
# | |
# install it: | |
# curl -sL https://raw.github.com/gist/2275613/hack.sh | sh | |
# |
// | |
// Regular Expression for URL validation | |
// | |
// Author: Diego Perini | |
// Created: 2010/12/05 | |
// Updated: 2018/09/12 | |
// License: MIT | |
// | |
// Copyright (c) 2010-2018 Diego Perini (http://www.iport.it) | |
// |