Skip to content

Instantly share code, notes, and snippets.

View neomafo88's full-sized avatar
🏠
Remote

Neoma Fong neomafo88

🏠
Remote
View GitHub Profile
@mathix420
mathix420 / medium.user.js
Last active December 5, 2025 15:17
Bypass Medium Paywall - Working late 2023 - Greasy Fork, Violentmonkey, Tampermonkey - Click the RAW button to install
// ==UserScript==
// @name Medium Paywall Bypass
// @namespace Violentmonkey Scripts
// @run-at document-start
// @match *://*.medium.com/*
// @match *://medium.com/*
// @match *://*/*
// @grant none
// @version 3.0
// @inject-into content
@aspose-com-gists
aspose-com-gists / readme.md
Created September 6, 2023 15:44
Extract RAR Files in Python
@0x07dc
0x07dc / torrc
Last active October 26, 2024 17:56
Torrc Exit Node Country Codes List (Filter Exit Nodes)
# This file was generated by Tor; if you edit it, comments will not be preserved
# The old torrc file was renamed to torrc.orig.1, and Tor will ignore it
ClientOnionAuthDir D:\Program Files\Tor Browser\Browser\TorBrowser\Data\Tor\onion-auth
DataDirectory D:\Program Files\Tor Browser\Browser\TorBrowser\Data\Tor
GeoIPFile D:\Program Files\Tor Browser\Browser\TorBrowser\Data\Tor\geoip
GeoIPv6File D:\Program Files\Tor Browser\Browser\TorBrowser\Data\Tor\geoip6
# SafeSocks 1 # Apparently only needed for Socks4 proxies -- Tor is using Socks5
TestSocks 1
@domenukk
domenukk / funsafe.sh
Last active August 21, 2023 03:14
Funsafe Rust Jail (for HackIM CTF 2023)
#!/bin/bash
echo "Your code please."
FOLDER=$(mktemp -d)
cp flag.txt "$FOLDER"
cd "$FOLDER"
mkdir src
cat <<EOF > Cargo.toml
[package]
name = "funsafe"
@X-Junior
X-Junior / Statc_Stealer.py
Created August 16, 2023 16:09
Statc Stealer String Decryptor
import struct , sys , pefile , validators , re , base64
from capstone import *
from capstone.x86 import *
'''
Author: Mohamed Ashraf (@X__Junior)
Usage:
python3 Statc_Stealer.py path_to_sample
'''
@indeedhat
indeedhat / install.sh
Created July 18, 2023 11:17
Install atheros ar9271 driver ubuntu 22.04 (jammy)
# Add this line in /etc/apt/sources.list
# deb http://httpredir.debian.org/debian/ bullseye main contrib non-free
sudo apt-key adv --keyserver keyserver.ubuntu.com --recv-keys 648ACFD622F3D138
sudo apt-key adv --keyserver keyserver.ubuntu.com --recv-keys 0E98404D386FA1D9
sudo apt-key adv --keyserver keyserver.ubuntu.com --recv-keys 605C66F00D6C9793
sudo apt-get update --allow-unauthenticated
# this will produce an error... go with it
sudo apt-get install firmware-atheros
@0xdevalias
0xdevalias / _deobfuscating-unminifying-obfuscated-web-app-code.md
Last active December 8, 2025 12:48
Some notes and tools for reverse engineering / deobfuscating / unminifying obfuscated web app code
@ssttevee
ssttevee / download.ts
Last active June 17, 2025 13:51
Download all files in public dropbox folder (in dev console)
async function retry(n, fn, ...args) {
for (let i = 0; ; i++) {
try {
return await fn(...args);
} catch (e) {
if (i + 1 >= n) {
throw e;
}
await new Promise(r => setTimeout(r, (2**i) * 1000));
@aemmitt-ns
aemmitt-ns / ida.rs
Last active June 5, 2023 16:39
use radius2 api to solve IDA ctf challenge
use radius2::{Radius, RadiusOption, State, vc};
fn main() {
let options = [RadiusOption::SimAll(true)];
let mut radius = Radius::new_with_options(Some("challenge"), &options);
let mut state = radius.callsym_state("main");
let flag = state.symbolic_value("flag", 8*0x18);
state.constrain_bytes(&flag, "[ -~]");
radius.set_argv_env(&mut state, &[vc(0), flag.clone()], &[]);
#!/bin/sh
/Library/Frameworks/Python.framework/Versions/3.11/bin/python3.11 << "EOF"
# install_certifi.py
#
# sample script to install or update a set of default Root Certificates
# for the ssl module. Uses the certificates provided by the certifi package:
# https://pypi.org/project/certifi/