Skip to content

Instantly share code, notes, and snippets.

View phosphore's full-sized avatar
🎯
Focusing

Lorenzo Stella phosphore

🎯
Focusing
View GitHub Profile
<?php
// get the post UID from the URL
$uid = param('post');
if(!$uid) die(a::json(array(
'status' => 'error',
'msg' => 'The post could not be found',
)));
@taoeffect
taoeffect / gist:8855230
Created February 7, 2014 00:20
DNSChain + DNSCrypt! :-D
dnscrypt-proxy --local-address=127.0.0.1:53 --resolver-address=23.226.227.93:443 --provider-name=2.dnscrypt-cert.okturtles.com --provider-key=1D85:3953:E34F:AFD0:05F9:4C6F:D1CC:E635:D411:9904:0D48:D19A:5D35:0B6A:7C81:73CB
@phosphore
phosphore / gmailcheck.sh
Created August 3, 2014 15:16
A simple bash script that uses google's tts service to notify new emails. [IT-it]
#!/bin/bash
rm /home/pi/bash/tmp/atom
wget --no-check-certificate -q -P/home/pi/bash/tmp/ https://user:[email protected]/mail/feed/atom
email=$((`perl -ne 'while(/author/g){++$count}; print "$count\n"' /home/pi/bash/tmp/atom`/2))
sender=`grep -oPm1 "(?<=<name>)[^<]+" /home/pi/bash/tmp/atom | tr '\n' ','`
echo $sender
if [ "$email" == 1 ]; then
email=$email
mpg123 -q attention.mp3
/bin/bash ./speech2text.sh "C'è una nuova mail da $sender ."
@juanbrujo
juanbrujo / fullCalendarDisablePrevNext.js
Last active August 14, 2024 05:32
jQuery FullCalendar.js: disable prev/next button for past/future dates
$('#calendar').fullCalendar({
viewRender: function(currentView){
var minDate = moment(),
maxDate = moment().add(2,'weeks');
// Past
if (minDate >= currentView.start && minDate <= currentView.end) {
$(".fc-prev-button").prop('disabled', true);
$(".fc-prev-button").addClass('fc-state-disabled');
}
else {
@EdOverflow
EdOverflow / github_bugbountyhunting.md
Last active November 8, 2024 20:13
My tips for finding security issues in GitHub projects.

GitHub for Bug Bounty Hunters

GitHub repositories can disclose all sorts of potentially valuable information for bug bounty hunters. The targets do not always have to be open source for there to be issues. Organization members and their open source projects can sometimes accidentally expose information that could be used against the target company. in this article I will give you a brief overview that should help you get started targeting GitHub repositories for vulnerabilities and for general recon.

Mass Cloning

You can just do your research on github.com, but I would suggest cloning all the target's repositories so that you can run your tests locally. I would highly recommend @mazen160's GitHubCloner. Just run the script and you should be good to go.

$ python githubcloner.py --org organization -o /tmp/output
@williballenthin
williballenthin / macOS_savedstate.py
Last active September 5, 2024 13:19
parse macOS savedState files
'''
parse SavedState artifacts extracted from OSX.
author: Willi Ballenthin ([email protected])
license: Apache 2.0
'''
import re
import sys
import json
import struct