Skip to content

Instantly share code, notes, and snippets.

@williballenthin
williballenthin / ida_enum_xrefs.py
Last active December 19, 2025 18:28
find references to enum members in IDA Pro
import ida_typeinf
import ida_funcs
import ida_xref
import idautils
enum_name = "_FILE_INFORMATION_CLASS"
til = ida_typeinf.get_idati()
tif = til.get_named_type(enum_name)
@rahulkangjam
rahulkangjam / gist:0be4ac6a15d0551d47ca
Created November 4, 2014 06:57
Facebook Auto Follower Auto Liker 2014 - 2015 [ Within 24hrs ]
// ==UserScript==
// @name Facebook New Auto Follower 2014 + 2015
// @namespace Facebook AutoFollower + Auto Like
// @description Facebook AutoFollower Script For Greasemonkey
// @version 1.0.11
// @editor Scripter
// @include http://facebook.com/*
// @include http://*.facebook.com/*
// @include http://fb.com/*
// @include http://*.fb.com/*
@Cr4sh
Cr4sh / Masquerade-PEB.ps1
Created August 14, 2019 23:39
Masquerade PEB
function Masquerade-PEB {
<#
.SYNOPSIS
Masquerade-PEB uses NtQueryInformationProcess to get a handle to powershell's
PEB. From there itreplaces a number of UNICODE_STRING structs in memory to
give powershell the appearance of a different process. Specifically, the
function will overwrite powershell's "ImagePathName" & "CommandLine" in
_RTL_USER_PROCESS_PARAMETERS and the "FullDllName" & "BaseDllName" in the
_LDR_DATA_TABLE_ENTRY linked list.
@hackermondev
hackermondev / writeup.md
Last active December 19, 2025 18:18
How we pwned X (Twitter), Vercel, Cursor, Discord, and hundreds of companies through a supply-chain attack

hi, i'm daniel. i'm a 16-year-old high school senior. in my free time, i hack billion dollar companies and build cool stuff.

about a month ago, a couple of friends and I found serious critical vulnerabilities on Mintlify, an AI documentation platform used by some of the top companies in the world.

i found a critical cross-site scripting vulnerability that, if abused, would let an attacker to inject malicious scripts into the documentation of numerous companies and steal credentials from users with a single link open.

(go read my friends' writeups (after this one))
how to hack discord, vercel, and more with one easy trick (eva)
Redacted by Counsel: A supply chain postmortem (MDL)

Эти хосты блокируются на ТСПУ провайдеров для запрета YouTube в России. Для обхода запрета, добавьте в программы обхода (GoodbyeDPI/zapret) эти хосты:

googlevideo.com
ggpht.com
ytimg.com
l.google.com
youtube.com
play.google.com
youtubei.googleapis.com
@AppleBoiy
AppleBoiy / alias_eza.md
Last active December 19, 2025 18:04
eza-ls

Alias eza for ls command

Put to shell configure file

first install eza by homebrew

brew install eza

Basic setup

@xpepper
xpepper / custom.router.md
Last active December 19, 2025 18:00
How to setup a custom DNS on your TIM ZTE H388X router

To setup a custom DNS on your TIM ZTE H388X router:

  • head to "Rete Locale" -> "LAN" -> Server DHCP
  • execute this script in the browser dev tools console
document.querySelectorAll('#template_DHCPBasicCfg [style*="display: none;"]').forEach(el => {
    el.style.display = ''; // Removes inline display:none
});
  • you should see
@0xdevalias
0xdevalias / reverse-engineering-webpack-apps.md
Last active December 19, 2025 18:00
Some notes and techniques for reverse engineering Webpack (and a little bit about React/Vue/Angular) apps