Skip to content

Instantly share code, notes, and snippets.

```yaml
version: "1.0"
agent_taxonomy:
description: >
Organizational multi-agent architecture with operational, social,
coordination, and risk-control roles.
internal_workers:
@morisono
morisono / openai-bing-search-assistant.py
Created May 13, 2026 00:00 — forked from richdrummer33/openai-bing-search-assistant.py
OpenAI Assistant 🤖 with Bing Search 🔎
import os
import asyncio
import requests
import time
import json
import openai
from urllib.parse import quote_plus
from openai import OpenAI
from dotenv import load_dotenv
@morisono
morisono / Advanced Searching.md
Created May 12, 2026 23:55 — forked from blackmagezeraf/Advanced Searching.md
This is a document where tips and tricks to efficiently searching on bing.com are compiled. I made this document so that I can look it up as a cheat sheet for times in need.

Advanced Searching (Bing , Google , DuckDuckGo)

Here is a table of some advanced searching tricks for Bing:

Symbol Example Function
+ +lifewire +help Finds web pages that contain all the terms preceded by the + symbol
"" "contact us" Finds the exact words in a phrase
() site:lifewire.com - (iPod tablet) Finds or excludes web pages that contain a group of words
AND, & house AND sale Finds web pages that contain all the terms or phrases
@morisono
morisono / digest_newsletter_2026-01-04.md
Created May 8, 2026 20:37 — forked from unclecode/digest_newsletter_2026-01-04.md
Tech Digest Newsletter - Level 2 Content Analysis (2026-01-04)

Tech Digest - January 04, 2026

2 curated items with deep-dive analysis


1. WhatsApp REST API: Programmatic Message Sending Without Official API Costs

@tom_doerr (Tom Dörr)

@morisono
morisono / _pocket-bell-table.md
Created May 7, 2026 10:39 — forked from t-okkn/_pocket-bell-table.md
いわゆる「ベル打ち」の日本語変換テーブルです

ベル打ち変換テーブル

ポケベルでの文字打ちを日本語に変換するためのjsonファイルです。
英数字については半角文字を使用しています。

60, 78, 79, 70, 89にはオリジナルの文字を割り当てています。

ポケベルコード 元の文字 オリジナル割当
60
78 -
@morisono
morisono / DVWAbruteforceBreaker.py
Created April 25, 2026 20:59 — forked from KnightChaser/DVWAbruteforceBreaker.py
Automated bruteforce attack script of DVWA(Damn Vulnerable Web Application), written with Python.
import requests
import sys
from bs4 import BeautifulSoup
from time import sleep
# fancy color!
class colorBrights:
BLACK = '\033[90m'
RED = '\033[91m'
GREEN = '\033[92m'

Hydra

Supported protocols

List1 list2 list3 list4 list5
asterisk icq oracle-listener rexec snmp
cisco imap[s] oracle-sid rlogin socks5
cisco-enable irc pcanywhere rpcap ssh
Retrieves all of the trust relationships for this domain - Does not Grab Forest Trusts
([System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain()).GetAllTrustRelationships()
Grab Forest Trusts.
([System.DirectoryServices.ActiveDirectory.Forest]::GetCurrentForest()).GetAllTrustRelationships()
@morisono
morisono / olecheck.py
Created April 23, 2026 09:47 — forked from decalage2/olecheck.py
olecheck - a simple script to identify potential CVE-2026-21509 samples
# script to scan MS Office files, looking for "Shell.Explorer" OLE objects which could match CVE-2026-21509
# using oletools - https://github.com/decalage2/oletools
# Philippe Lagadec 2026-01-28
# NOTES:
# According to the MS advisory https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21509
# the CVE-2026-21509 vulnerability is related to CLSID "EAB22AC3-30C1-11CF-A7EB-0000C05BAE0B",
# corresponding to the "Shell.Explorer" COM object, which can be used to open the legacy
# Internet Explorer engine (aka Trident/MSHTML) from any application.
# So to exploit CVE2026-21509 from a MS Office document, one could use either an OLE object