HP laptop boot loader menu key: F9
Listing keys:
<!--javascript --> | |
ja	vascript:alert(1) | |
ja
vascript:alert(1) | |
ja
vascript:alert(1) | |
javascript:alert() | |
<!--::colon:: --> | |
javascript:alert() | |
javascript:alert() | |
javascript:alert(1) |
#!/bin/bash | |
function awslogin { | |
# set to yes to create one-time use profiles in /tmp | |
# anything else will create them in $HOME/.aws/awschrome | |
TEMP_PROFILE="no" | |
# set to yes to always start in a new window | |
NEW_WINDOW="no" |
I’ve been using YouTube Music as my main music streaming service for almost a year and a half. The iOS client is great- I’ve never had a single complaint. It’s potentially one of the most bug free apps I’ve ever used, it has an extremely friendly, and simple, graphical interface, and the service itself is great.
I was curious how the client worked in terms of networking, and while curiosity may treat cats poorly, it lands researchers in black sites can provide a lot of insight.
The first thing I do when reverse engineering a client is monitor HTTP requests while the application starts up, and when doing the tasks interested in. On a jailbroken iOS device, I use FLEX by FlipBoard.
// | |
// LMApiaryDeviceCrypto.h | |
// | |
// Created by Leptos on 11/18/18. | |
// Copyright © 2018 Leptos. All rights reserved. | |
// | |
#import <Foundation/Foundation.h> | |
#define kYouTubeBase64EncodedProjectKey @"vOU14u6GkupSL2pLKI/B7L3pBZJpI8W92RoKHJOu3PY=" |
Here we create the master key. We want only Certify
capability: we use the master key only to create the subkeys, Sign - Encrypt - Authenticate
capabilities will be assigned to the subkeys.
Run the following command to start the master key generation process. Select the set your own capabilities
creation process (type 8
)
▶ gpg --full-generate-key --expert
gpg (GnuPG) 2.2.9; Copyright (C) 2018 Free Software Foundation, Inc.
# Put this file under ~/.oh-my-zsh/custom if it should be automatically run for every babun shell that is opened. | |
# Credits to http://stackoverflow.com/questions/3831131/rubygems-cygwin-posix-path-not-found-by-ruby-exe#comment61900449_19424481 | |
echo "Aliasing all ruby binaries." | |
if [[ -n "$(which ruby 2>/dev/null)" ]]; then | |
RUBY_BIN=$(cygpath -u $(ruby -e 'puts RbConfig::CONFIG["bindir"]')) | |
for f in $(find ${RUBY_BIN: : -1} -regex ".*bat$"| xargs -n1 basename); do | |
alias ${f%.bat}=${f} | |
done |
No need for homebrew or anything like that. Works with https://www.git-tower.com and the command line.
gpg --list-secret-keys
and look for sec
, use the key ID for the next stepgit
to use GPG -- replace the key with the one from gpg --list-secret-keys
{ | |
"APIGatewayServiceRolePolicy": { | |
"Arn": "arn:aws:iam::aws:policy/aws-service-role/APIGatewayServiceRolePolicy", | |
"AttachmentCount": 0, | |
"CreateDate": "2019-10-22T18:22:01+00:00", | |
"DefaultVersionId": "v6", | |
"Document": { | |
"Statement": [ | |
{ | |
"Action": [ |
Summary | How to control (or Understand) your GIST page's files list order. |
Notice | not official documentation. |