Instantly share code, notes, and snippets.
Discover gists
aallan /mac-vendor.txt
Last activeDecember 19, 2025 00:09
List of MAC addresses with vendors identities This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.Learn more about bidirectional Unicode characters
| 000000Officially Xerox | |
| 000001SuperLAN-2U | |
| 000002BBN (was internal usage only, no longer used) | |
| 000003XEROX CORPORATION | |
| 000004XEROX CORPORATION | |
| 000005XEROX CORPORATION | |
| 000006XEROX CORPORATION | |
| 000007XEROX CORPORATION | |
| 000008XEROX CORPORATION | |
| 000009powerpipes? |
hackermondev /writeup.md
Last activeDecember 19, 2025 00:09
How we pwned X (Twitter), Vercel, Cursor, Discord, and hundreds of companies through a supply-chain attackhi, i'm daniel. i'm a 16-year-old high school senior. in my free time, ihack billion dollar companies and build cool stuff.
about a month ago, a couple of friends and I found serious critical vulnerabilities on Mintlify, an AI documentation platform used by some of the top companies in the world.
i found a critical cross-site scripting vulnerability that, if abused, would let an attacker to inject malicious scripts into the documentation of numerous companies and steal credentials from users with a single link open.
(go read my friends' writeups (after this one))
how to hack discord, vercel, and more with one easy trick (eva)
Redacted by Counsel: A supply chain postmortem (MDL)
kajain99 /gist:c02deb3370f7488aefcad1a2b0517cfa
CreatedDecember 16, 2025 08:20
Pihole compose file for ugreen This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.Learn more about bidirectional Unicode characters
| services: | |
| pihole: | |
| image: pihole/pihole:latest | |
| container_name: pihole | |
| restart: unless-stopped | |
| ports: | |
| - "53:53/tcp" | |
| - "53:53/udp" | |
| - "90:80" |
guilhermelaz /Agente de IA Simples - Evolution API.json
Last activeDecember 19, 2025 00:02
Workflow N8N - Agente de IA integrado ao Whatsapp com Evolution API This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.Learn more about bidirectional Unicode characters
| { | |
| "name":"Agente de IA Simples - Evolution API", | |
| "nodes": [ | |
| { | |
| "parameters": { | |
| "httpMethod":"POST", | |
| "path":"agente01", | |
| "options": {} | |
| }, | |
| "type":"n8n-nodes-base.webhook", |
dbsanfte /Docker-VHD-Cleanup.ps1
CreatedSeptember 23, 2025 08:29
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.Learn more about bidirectional Unicode characters
| ### Run this script on Windows (outside of the devcontainer!) to clear out Docker data and shrink the Docker VHD. | |
| # Check if running as administrator, if not, relaunch as admin | |
| if (-NOT ([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole]"Administrator")) { | |
| Write-Host"Script requires administrator privileges. Relaunching as administrator..."-ForegroundColor Yellow | |
| # Get the current script path | |
| $scriptPath=$MyInvocation.MyCommand.Path | |
| # Relaunch the script as administrator |
NewerOlder