HP laptop boot loader menu key: F9
Listing keys:
| <!--javascript --> | |
| ja	vascript:alert(1) | |
| ja
vascript:alert(1) | |
| ja
vascript:alert(1) | |
| javascript:alert() | |
| <!--::colon:: --> | |
| javascript:alert() | |
| javascript:alert() | |
| javascript:alert(1) |
| #!/bin/bash | |
| function awslogin { | |
| # set to yes to create one-time use profiles in /tmp | |
| # anything else will create them in $HOME/.aws/awschrome | |
| TEMP_PROFILE="no" | |
| # set to yes to always start in a new window | |
| NEW_WINDOW="no" |
I’ve been using YouTube Music as my main music streaming service for almost a year and a half. The iOS client is great- I’ve never had a single complaint. It’s potentially one of the most bug free apps I’ve ever used, it has an extremely friendly, and simple, graphical interface, and the service itself is great.
I was curious how the client worked in terms of networking, and while curiosity may treat cats poorly, it lands researchers in black sites can provide a lot of insight.
The first thing I do when reverse engineering a client is monitor HTTP requests while the application starts up, and when doing the tasks interested in. On a jailbroken iOS device, I use FLEX by FlipBoard.
| // | |
| // LMApiaryDeviceCrypto.h | |
| // | |
| // Created by Leptos on 11/18/18. | |
| // Copyright © 2018 Leptos. All rights reserved. | |
| // | |
| #import <Foundation/Foundation.h> | |
| #define kYouTubeBase64EncodedProjectKey @"vOU14u6GkupSL2pLKI/B7L3pBZJpI8W92RoKHJOu3PY=" |
Here we create the master key. We want only Certify capability: we use the master key only to create the subkeys, Sign - Encrypt - Authenticate capabilities will be assigned to the subkeys.
Run the following command to start the master key generation process. Select the set your own capabilities creation process (type 8)
▶ gpg --full-generate-key --expert
gpg (GnuPG) 2.2.9; Copyright (C) 2018 Free Software Foundation, Inc.
| # Put this file under ~/.oh-my-zsh/custom if it should be automatically run for every babun shell that is opened. | |
| # Credits to http://stackoverflow.com/questions/3831131/rubygems-cygwin-posix-path-not-found-by-ruby-exe#comment61900449_19424481 | |
| echo "Aliasing all ruby binaries." | |
| if [[ -n "$(which ruby 2>/dev/null)" ]]; then | |
| RUBY_BIN=$(cygpath -u $(ruby -e 'puts RbConfig::CONFIG["bindir"]')) | |
| for f in $(find ${RUBY_BIN: : -1} -regex ".*bat$"| xargs -n1 basename); do | |
| alias ${f%.bat}=${f} | |
| done |
No need for homebrew or anything like that. Works with https://www.git-tower.com and the command line.
gpg --list-secret-keys and look for sec, use the key ID for the next stepgit to use GPG -- replace the key with the one from gpg --list-secret-keys| { | |
| "APIGatewayServiceRolePolicy": { | |
| "Arn": "arn:aws:iam::aws:policy/aws-service-role/APIGatewayServiceRolePolicy", | |
| "AttachmentCount": 0, | |
| "CreateDate": "2019-10-22T18:22:01+00:00", | |
| "DefaultVersionId": "v6", | |
| "Document": { | |
| "Statement": [ | |
| { |
| Summary | How to control (or Understand) your GIST page's files list order. |
| Notice | not official documentation. |