I'm not going to be maintaining this document anymore. I'm leaving it as-is since much of the FAQ section is still accurate and has yet to be incorporated into other resources.
Use CanI.RootMy.TV to find an exploit for your TV.
I'm not going to be maintaining this document anymore. I'm leaving it as-is since much of the FAQ section is still accurate and has yet to be incorporated into other resources.
Use CanI.RootMy.TV to find an exploit for your TV.
| @echo off | |
| rem Automates instructions from google found here https://support.google.com/chrome/a/answer/9844476?hl=en | |
| rem Removes the 'Managed by your organization' from Google Chrome and prevents persistence | |
| echo Make sure you have backed up your registry. Ready to go ahead? | |
| pause | |
| cls | |
| echo Working... | |
| echo Exiting Chrome (if running) | |
| taskkill /f /im chrome.exe | |
| if exist "C:\Program Files (x86)\Google\Policies" RMDIR /S /Q "C:\Program Files (x86)\Google\Policies" |
| #!/bin/bash | |
| # Copyright (c) 2018 Allen Wild | |
| # SPDX-License-Identifier: MIT | |
| # | |
| # based on https://github.com/stevejenkins/unifi-linux-utils/blob/master/unifi_ssl_import.sh | |
| # and https://source.sosdg.org/brielle/lets-encrypt-scripts | |
| set -e | |
| UNIFI_DIR=/usr/lib/unifi |
Hola is a free browser extension and a Windows program that has 10 million users. It was created in 2012 and I did a review of it (that post has been taken down after I learned the dark truth). Initially I liked it, because I could watch Hulu and CBS online for free and legally (well, mostly legally anyways).
However, quickly the extension became bad. It started injecting ads into pages and that was when I disabled it. I was considering starting a similar paid service, a "startup" as some would call it, and was very curious about how it worked.
I reverse engineered their code and have gotten a list of proxies and the username and password that I have published HERE for all the people to see, use and abuse.
Now the dirty secret: Hola Networks Limited, that created Hola.org, runs a company called Luminati, that charges $20/GB for their premium VPN service. Okay, that’s not that bad, a little bit greedy but nothing sinister, you’re thinking? Well, it gets w
| #!/data/data/com.termux/files/usr/bin/bash | |
| # | |
| # This is a termux-url-opener script to do diffrent tasks on my Android phone | |
| # | |
| # | |
| # | |
| # How to use this script | |
| ############################# | |
| # | |
| # Install git |
| // This is super hackish, and will likely break as Discord's internal API changes | |
| // Anything using this or what it returns should be prepared to catch some exceptions | |
| const getInternalInstance = e => e[Object.keys(e).find(k => k.startsWith("__reactInternalInstance"))]; | |
| function getOwnerInstance(e, {include, exclude=["Popout", "Tooltip", "Scroller", "BackgroundFlash"]} = {}) { | |
| if (e === undefined) { | |
| return undefined; | |
| } | |
| // Set up filter; if no include filter is given, match all except those in exclude |
| <!DOCTYPE html> | |
| <html> | |
| <head> | |
| <title>Paste Image</title> | |
| <script type="text/javascript"> | |
| var imageObj = new Image(); | |
| window.onload = function() { | |
| document.getElementById("pasteTarget"). | |
| addEventListener("paste", handlePaste); | |
| var canvas = document.getElementById('canvasTarget'); |
| var request = require('request'); | |
| var unzip = require('unzip'); | |
| var csv2 = require('csv2'); | |
| request.get('http://s3.amazonaws.com/alexa-static/top-1m.csv.zip') | |
| .pipe(unzip.Parse()) | |
| .on('entry', function (entry) { | |
| entry.pipe(csv2()).on('data', console.log); | |
| }) | |
| ; |
| /* Transforms any string into a "ID" usable string by replacing portuguese special characters into their simple equivalents and stripping all remaining special chars. */ | |
| String.prototype.IDize = function () { | |
| var texto = this; | |
| var chrEspeciais = new Array("\u00e1", "\u00e0", "\u00e2", "\u00e3", "\u00e4", "\u00e9", "\u00e8", "\u00ea", "\u00eb", "\u00ed", "\u00ec", "\u00ee", "\u00ef", "\u00f3", "\u00f2", "\u00f4", "\u00f5", "\u00f6", "\u00fa", "\u00f9", "\u00fb", "\u00fc", "\u00e7", "\u00c1", "\u00c0", "\u00c2", "\u00c3", "\u00c4", "\u00c9", "\u00c8", "\u00ca", "\u00cb", "\u00cd", "\u00cc", "\u00ce", "\u00cf", "\u00d3", "\u00d2", "\u00d4", "\u00d5", "\u00d6", "\u00da", "\u00d9", "\u00db", "\u00dc", "\u00c7"); | |
| var chrNormais = new Array("a", "a", "a", "a", "a", "e", "e", "e", "e", "i", "i", "i", "i", "o", "o", "o", "o", "o", "u", "u", "u", "u", "c", "A", "A", "A", "A", "A", "E", "E", "E", "E", "I", "I", "I", "I", "O", "O", "O", "O", "O", "U", "U", "U", "U", "C"); | |
| for(index in chrEspeciais) { | |
| texto = texto |
| ================ run.vbs ================ | |
| REM 0 = hide window, 1 = show window (useful for debugging) | |
| Set WshShell = CreateObject("WScript.Shell") | |
| WshShell.Run """" & "run.bat" & """" & sargs, 0, False | |
| Set WshShell = Nothing | |
| ================ run.bat ================ | |
| REM Batch script to start VirtualBox instance of ReviewBoard in headless mode |