Skip to content

Instantly share code, notes, and snippets.

View tomschall's full-sized avatar
:octocat:
Ask me...

Tom Schall tomschall

:octocat:
Ask me...
  • Fachhochschule Nordwestschweiz
  • Bern - Switzerland
  • X @tomschall79
View GitHub Profile
@tomschall
tomschall / javascript-runtime-hacking.md
Created May 15, 2025 05:32
JavaScript Runtime Hacking – 10 Powerful Methods

🔧 JavaScript Runtime Hacking – 10 Powerful Methods

A curated list of powerful techniques to manipulate JavaScript code at runtime – great for debugging, prototyping, or reverse engineering frontend behavior directly in the browser (yes, even on mobile).

These methods allow you to inspect, intercept, or override behavior in real time, without changing the actual source code or deploying anything new.


1. Monkey Patching 🐒

@tomschall
tomschall / solr-response-interceptor-xhr-patch.md
Last active May 14, 2025 15:17
Solr Response Interceptor (XHR Patch)

Solr Response Interceptor (XHR Patch)

A small browser-side debug script to intercept and modify Solr responses on /search_endpoint/ – useful for UI testing or facet debugging without touching the backend.

💡 Concept

  • Intercepts XMLHttpRequest
  • Captures the response once it's ready (readyState === 4)
  • Replaces the response with a modified JSON object
  • Logs both the original and the modified versions for comparison

🚀 SSH Cheat Sheet

A handy reference for ssh, ssh-keygen, and ssh-agent commands.


🔑 SSH Basics

Connect to a remote server

@tomschall
tomschall / Docker with XDebug.md
Created September 12, 2024 11:33 — forked from megahirt/Docker with XDebug.md
Debugging PHP with XDebug v3 inside Docker using VSCode

Debugging PHP with XDebug v3 inside Docker using VSCode

Assumptions / Prerequisites

  • XDebug v3+ inside Docker (e.g. php:7.3-apache Docker image)
  • Running Docker v20.10+
  • VSCode with PHP Debug Extension (Felix Becker)
  • Using Docker Compose for orchestration

Objective

Oh shit, git!

Git is hard: screwing up is easy, and figuring out how to fix your mistakes is fucking impossible. Git documentation has this chicken and egg problem where you can't search for how to get yourself out of a mess, unless you already know the name of the thing you need to know about in order to fix your problem.

So here are some bad situations I've gotten myself into, and how I eventually got myself out of them in plain english*.

Email

/^[a-z|A-Z]+\w(\.[a-z|A-Z]+\w)?@[a-z|A-Z]+\w\.[a-z|A-Z]{2,3}$/gm
@tomschall
tomschall / contribute.md
Last active February 20, 2024 11:25
Searching for an open source project on github to contribute to

Go to github

Surf to github issues and explore issues, delete all filters and set some new ones

github issues

Surf to link, look at labels

filter react repo

Awesome Hacker Skills everyone should learn

Hacking and “being a hacker” have fascinated me for over seven years now, and since then, I have started a career in Red Teaming. This job is particularly interesting, because you have to know many things about (offensive) cybersecurity. Basically, you get to hack entire companies. You do this to test their defenses and uncover vulnerabilities.

During my work in this field, I’ve acquired many skills and learned quite a few hacks which I want to share in this blog post.

As a fair warning: If you are already working in cybersecurity for a long time, you might not get a whole lot of new knowledge from this post, but you might want to check out some of my other blog posts. Additionally, this could be the blog post you share with your friends and family to get them interested in the amazing job you are doing.

I will also sort the skills from useful for almost everyone to interesting for techies. And since learning how to hack computers is a whole other topic, we wi

Exploring Google Hacking Techniques using Dork

It is basically a search string that uses advanced search query to find information that are not easily available on the websites. It is also regarded as illegal google hacking activity which hackers often uses for purposes such as cyber terrorism and cyber theft.

Dork

They are like search criteria in which a search engine returns results related to your dork.

People often take Google as just a search engine used to find text, images, videos, and news. However, in the infosec world, it has a very vast role. Google can also be used as a very useful hacking tool.

# Delete local tags.
git tag -d $(git tag -l)
# Fetch remote tags.
git fetch
# Delete remote tags.
git push origin --delete $(git tag -l) # Pushing once should be faster than multiple times
# Delete local tags.
git tag -d $(git tag -l)