Movatterモバイル変換


[0]ホーム

URL:


Skip to content
Search Gists
Sign in Sign up

Instantly share code, notes, and snippets.

Discover gists

@aallan
aallan /mac-vendor.txt
Last activeDecember 19, 2025 00:09
List of MAC addresses with vendors identities
000000Officially Xerox
000001SuperLAN-2U
000002BBN (was internal usage only, no longer used)
000003XEROX CORPORATION
000004XEROX CORPORATION
000005XEROX CORPORATION
000006XEROX CORPORATION
000007XEROX CORPORATION
000008XEROX CORPORATION
000009powerpipes?
@hackermondev
hackermondev /writeup.md
Last activeDecember 19, 2025 00:09
How we pwned X (Twitter), Vercel, Cursor, Discord, and hundreds of companies through a supply-chain attack

hi, i'm daniel. i'm a 16-year-old high school senior. in my free time, ihack billion dollar companies and build cool stuff.

about a month ago, a couple of friends and I found serious critical vulnerabilities on Mintlify, an AI documentation platform used by some of the top companies in the world.

i found a critical cross-site scripting vulnerability that, if abused, would let an attacker to inject malicious scripts into the documentation of numerous companies and steal credentials from users with a single link open.

(go read my friends' writeups (after this one))
how to hack discord, vercel, and more with one easy trick (eva)
Redacted by Counsel: A supply chain postmortem (MDL)

@AalbatrossGuy
AalbatrossGuy /extract_sig.md
Last activeDecember 19, 2025 00:05
Extracting Signatures from PDFs

The core principle behind extracting a signature from a PDF involves identifying and isolating the signature's visual representation, whether it's a digitally embedded signature or a scanned image of a handwritten signature.

Digital signatures

They are embedded within the PDF structure as data objects, often associated with a signature handler that uses Public/Private Key cryptography. These data objects include information about what parts of the document were signed, the signer’s identity, and a cryptographic hash. The extraction involves locating these fields, reading their content, and interpreting the digital certificate and signature metadata. Digital signatures are generally interactive with form field of type/Sig th

@kajain99
kajain99 /gist:c02deb3370f7488aefcad1a2b0517cfa
CreatedDecember 16, 2025 08:20
Pihole compose file for ugreen
services:
pihole:
image: pihole/pihole:latest
container_name: pihole
restart: unless-stopped
ports:
- "53:53/tcp"
- "53:53/udp"
- "90:80"
@guilhermelaz
guilhermelaz /Agente de IA Simples - Evolution API.json
Last activeDecember 19, 2025 00:02
Workflow N8N - Agente de IA integrado ao Whatsapp com Evolution API
{
"name":"Agente de IA Simples - Evolution API",
"nodes": [
{
"parameters": {
"httpMethod":"POST",
"path":"agente01",
"options": {}
},
"type":"n8n-nodes-base.webhook",
### Run this script on Windows (outside of the devcontainer!) to clear out Docker data and shrink the Docker VHD.
# Check if running as administrator, if not, relaunch as admin
if (-NOT ([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole]"Administrator")) {
Write-Host"Script requires administrator privileges. Relaunching as administrator..."-ForegroundColor Yellow
# Get the current script path
$scriptPath=$MyInvocation.MyCommand.Path
# Relaunch the script as administrator
@aamiaa
aamiaa /CompleteDiscordQuest.md
Last activeDecember 18, 2025 23:59
Complete Recent Discord Quest

Note

This does not works in browser for quests which require you to play a game! Use thedesktop app to complete those.

How to use this script:

  1. Accept a quest under Discover -> Quests
  2. PressCtrl+Shift+I to open DevTools
  3. Go to theConsole tab
  4. Paste the following code and hit enter:
@StevenACoffman
StevenACoffman /Homoglyphs.md
Last activeDecember 18, 2025 23:53
Unicode Look-alikes
Original LetterLook-Alike(s)
aа ạ ą ä à á ą
cс ƈ ċ
dԁ ɗ
eе ẹ ė é è
gġ
hһ
NewerOlder

[8]ページ先頭

©2009-2025 Movatter.jp