Skip to content

Instantly share code, notes, and snippets.

@sile
sile / main.md
Last active December 19, 2025 00:26
2025年の趣味開発環境

2025年の趣味開発環境

2025年は趣味開発環境の変化が大きかったので備忘録として残しておく。

前提:

  • 趣味開発はほぼ毎日している
  • 開発するのはコマンドラインツールやライブラリが多い
  • 言語はほぼRust
  • 開発はほぼAndroid上
@Blackshome
Blackshome / low-battery-notifications-and-actions.yaml
Last active December 19, 2025 00:22
low-battery-notifications-and-actions.yaml
blueprint:
name: Low Battery Notifications & Actions
description: >
# 🪫 Low Battery Notifications & Actions
**Version: 3.3**
🚀 Stay Charged, Stay Smart! Let's automate and take charge of your battery maintenance!🔋⚡
@omarmciver
omarmciver / new-data-vhdx-wsl2.md
Last active December 19, 2025 00:22
New VHDX attach to WSL2

Creating and Maintaining a VHDX Drive in WSL

This guide explains how to create, mount, and maintain a VHDX drive for use with WSL (Windows Subsystem for Linux).

Prerequisites

  • Windows 10/11 with WSL2 installed
  • Administrative access
  • PowerShell
  • Sufficient disk space
@3deep5me
3deep5me / main.tf
Created February 11, 2025 10:18
Hetzner Object Storage with AWS Terraform Provider
resource "aws_s3_bucket" "main" {
bucket = "my-bucket-a9c8ae4e2"
object_lock_enabled = true
}
resource "aws_s3_bucket_acl" "main" {
bucket = aws_s3_bucket.main.id
acl = "private"
}
@terjanq
terjanq / README.md
Last active December 19, 2025 00:11
TokyoWesterns CTF 2020 | writeups by @terjanq

TokyoWesterns CTF 2020 | writeups by @terjanq

Urlcheck v1 (98 points, 160 solves)

The goal was to bypass WAF protection to access local resources.

app.re_ip = re.compile('\A(\d+)\.(\d+)\.(\d+)\.(\d+)\Z')

def valid_ip(ip):
 matches = app.re_ip.match(ip)
@aallan
aallan / mac-vendor.txt
Last active December 19, 2025 00:09
List of MAC addresses with vendors identities
000000 Officially Xerox
000001 SuperLAN-2U
000002 BBN (was internal usage only, no longer used)
000003 XEROX CORPORATION
000004 XEROX CORPORATION
000005 XEROX CORPORATION
000006 XEROX CORPORATION
000007 XEROX CORPORATION
000008 XEROX CORPORATION
000009 powerpipes?
@hackermondev
hackermondev / writeup.md
Last active December 19, 2025 00:26
How we pwned X (Twitter), Vercel, Cursor, Discord, and hundreds of companies through a supply-chain attack

hi, i'm daniel. i'm a 16-year-old high school senior. in my free time, i hack billion dollar companies and build cool stuff.

about a month ago, a couple of friends and I found serious critical vulnerabilities on Mintlify, an AI documentation platform used by some of the top companies in the world.

i found a critical cross-site scripting vulnerability that, if abused, would let an attacker to inject malicious scripts into the documentation of numerous companies and steal credentials from users with a single link open.

(go read my friends' writeups (after this one))
how to hack discord, vercel, and more with one easy trick (eva)
Redacted by Counsel: A supply chain postmortem (MDL)

@AalbatrossGuy
AalbatrossGuy / extract_sig.md
Last active December 19, 2025 00:05
Extracting Signatures from PDFs

Signature Extraction From PDFs

The core principle behind extracting a signature from a PDF involves identifying and isolating the signature's visual representation, whether it's a digitally embedded signature or a scanned image of a handwritten signature.

Digital signatures

They are embedded within the PDF structure as data objects, often associated with a signature handler that uses Public/Private Key cryptography. These data objects include information about what parts of the document were signed, the signer’s identity, and a cryptographic hash. The extraction involves locating these fields, reading their content, and interpreting the digital certificate and signature metadata. Digital signatures are generally interactive with form field of type /Sig th