Skip to content

Instantly share code, notes, and snippets.

import r2 from '@mcro/r2'
import puppeteer from 'puppeteer'
import * as _ from 'lodash'
const sleep = ms => new Promise(res => setTimeout(res, ms))
const onFocus = page => {
return page.evaluate(() => {
return new Promise(res => {
if (document.hasFocus()) {
res()
// ------------
// ♥ settings ♥
// ------------
settings.tabsThreshold = 0;
settings.smoothScroll = true;
settings.scrollStepSize = 200;
settings.scrollFriction = 0;
settings.startToShowEmoji = 0;
settings.defaultSearchEngine = 'd';
#!/usr/bin/env python3
import re
import os
import subprocess
import statistics
class NoQueryPlanOutput(Exception):
pass
@PsychoTea
PsychoTea / PanicParser.py
Last active February 26, 2024 01:43
Parses an iOS .ips panic log and gives useful stack trace output
import sys
import json
import re
kslide = 0x0
if len(sys.argv) < 2:
print("Usage: PanicParser.py [file path]")
exit()
# wget -i this_file
http://www.oreilly.com/programming/free/files/files/microservices-for-java-developers.pdf
http://www.oreilly.com/programming/free/files/modern-java-ee-design-patterns.pdf
http://www.oreilly.com/programming/free/files/object-oriented-vs-functional-programming.pdf
http://www.oreilly.com/programming/free/files/java-the-legend.pdf
http://www.oreilly.com/programming/free/files/functional-programming-python.pdf
http://www.oreilly.com/programming/free/files/reactive-microservices-architecture-orm.pdf
http://www.oreilly.com/programming/free/files/migrating-cloud-native-application-architectures.pdf
http://www.oreilly.com/programming/free/files/software-architecture-patterns.pdf
@a7ul
a7ul / jamf.md
Last active September 2, 2025 18:19
removing all restrictions on jamf managed macos device - Provided you have root access.

REMOVE JAMF RESTRICTIONS ON MAC

REMOVE ONLY RESTRICTIONS

sudo jamf removeMDMProfile removes all restrictions

sudo jamf manage brings back all restrictions and profiles

REMOVE ALL RESTRICTIONS AND DISABLE JAMF BINARIES WHILE KEEPING YOUR ACCESS TO VPN AND OTHER SERVICES

sudo jamf removeMDMProfile removes all restrictions

@Yegorov
Yegorov / ya.py
Created January 13, 2018 16:08
Download file from Yandex.Disk through share link
#!/usr/bin/env python3
# -*- coding: utf-8 -*-
# https://toster.ru/q/72866
# How to
# wget http://gist.github.com/...
# chmod +x ya.py
# ./ya.py download_url path/to/directory
import os, sys, json
@timvisee
timvisee / falsehoods-programming-time-list.md
Last active March 8, 2026 07:21
Falsehoods programmers believe about time, in a single list

Falsehoods programmers believe about time

This is a compiled list of falsehoods programmers tend to believe about working with time.

Don't re-invent a date time library yourself. If you think you understand everything about time, you're probably doing it wrong.

Falsehoods

  • There are always 24 hours in a day.
  • February is always 28 days long.
  • Any 24-hour period will always begin and end in the same day (or week, or month).
@joshkehn
joshkehn / dataisbeautiful.csv
Last active February 29, 2020 21:40
Posts from /r/dataisbeautiful as of 2017-09-03
We can't make this file beautiful and searchable because it's too large.
"created","post","score","comments","oc","author","title"
"2017-09-03T20:38:25","6xwz6r","1","0","TRUE","WhosaWhatsa","2017 YTD U.S. Feature Film Release with Most IMDB Votes [OC]"
"2017-09-03T19:58:32","6xwrh3","4","4","TRUE","_HexMan","Police Shootings since January 1, 2015 [OC]"
"2017-09-03T18:44:34","6xwdcp","1","1","TRUE","potato_pototo","Average Indian movie length by language[OC]"
"2017-09-03T18:37:12","6xwbxp","3","2","TRUE","seis-matters","Recordings of Five North Korea Nuclear Tests [OC]"
"2017-09-03T18:22:33","6xw8z7","5","1","FALSE","pecanpiecat","The worth of $100 by state"
"2017-09-03T17:43:34","6xw0t5","2","1","TRUE","wisequokka","Time series seismic data of the North Korean H-bomb test [OC]"
"2017-09-03T17:30:03","6xvxyi","0","0","FALSE","thevizinista","Floral Designer"
"2017-09-03T15:41:26","6xva9b","1","2","TRUE","Living_Granger","Capital punishment since 1991: Number of executioners and abolitionist countries. [OC]"
"2017-09-03T15:17:27","6xv56f","0","0","FALSE","d0mth0ma5","North Korean tr
@EdOverflow
EdOverflow / github_bugbountyhunting.md
Last active January 22, 2026 02:43
My tips for finding security issues in GitHub projects.

GitHub for Bug Bounty Hunters

GitHub repositories can disclose all sorts of potentially valuable information for bug bounty hunters. The targets do not always have to be open source for there to be issues. Organization members and their open source projects can sometimes accidentally expose information that could be used against the target company. in this article I will give you a brief overview that should help you get started targeting GitHub repositories for vulnerabilities and for general recon.

Mass Cloning

You can just do your research on github.com, but I would suggest cloning all the target's repositories so that you can run your tests locally. I would highly recommend @mazen160's GitHubCloner. Just run the script and you should be good to go.

$ python githubcloner.py --org organization -o /tmp/output