Only needs two external libraries
https://github.com/saghul/aiodns
https://github.com/secynic/ipwhois
| <?php | |
| $finder = PhpCsFixer\Finder::create() | |
| ->exclude('libs') | |
| ->exclude('utils') | |
| ->name('*.phtml') | |
| ->in(__DIR__) | |
| //->append([ | |
| //__DIR__.'/dev-tools/doc.php', | |
| // __DIR__.'/php-cs-fixer', disabled, as we want to be able to run bootstrap file even on lower PHP version, to show nice message |
| # Generate a new pgp key: (better to use gpg2 instead of gpg in all below commands) | |
| gpg --gen-key | |
| # maybe you need some random work in your OS to generate a key. so run this command: `find ./* /home/username -type d | xargs grep some_random_string > /dev/null` | |
| # check current keys: | |
| gpg --list-secret-keys --keyid-format LONG | |
| # See your gpg public key: | |
| gpg --armor --export YOUR_KEY_ID | |
| # YOUR_KEY_ID is the hash in front of `sec` in previous command. (for example sec 4096R/234FAA343232333 => key id is: 234FAA343232333) |
| #!/usr/bin/python3 | |
| import sys | |
| import time | |
| from datetime import date, timedelta | |
| from datetime import datetime | |
| import os | |
| import re | |
| import urllib.request | |
| import requests | |
| import json |
Download the file then move it and make executable and restart nautilus to see the Copy Path icon
wget https://gist.githubusercontent.com/meramsey/f1d20da371de82e801df19c92a673e63/raw/2bb9cb9007f21e85b00aade70d5db21c41b44f44/nautilus-copy-paths.py
sudo mv nautilus-copy-paths.py /usr/share/nautilus-python/extensions/nautilus-copy-paths.py
sudo chmod +x /usr/share/nautilus-python/extensions/nautilus-copy-paths.py
nautilus -q| adb shell am | |
| Activity manager (activity) commands: | |
| help | |
| Print this help text. | |
| start-activity [-D] [-N] [-W] [-P <FILE>] [--start-profiler <FILE>] | |
| [--sampling INTERVAL] [--streaming] [-R COUNT] [-S] | |
| [--track-allocation] [--user <USER_ID> | current] <INTENT> | |
| Start an Activity. Options are: | |
| -D: enable debugging | |
| -N: enable native debugging |
hi, i'm daniel. i'm a 15-year-old high school junior. in my free time, i hack billion dollar companies and build cool stuff.
3 months ago, I discovered a unique 0-click deanonymization attack that allows an attacker to grab the location of any target within a 250 mile radius. With a vulnerable app installed on a target's phone (or as a background application on their laptop), an attacker can send a malicious payload and deanonymize you within seconds--and you wouldn't even know.
I'm publishing this writeup and research as a warning, especially for journalists, activists, and hackers, about this type of undetectable attack. Hundreds of applications are vulnerable, including some of the most popular apps in the world: Signal, Discord, Twitter/X, and others. Here's how it works:
By the numbers, Cloudflare is easily the most popular CDN on the market. It beats out competitors such as Sucuri, Amazon CloudFront, Akamai, and Fastly. In 2019, a major Cloudflare outage k