- using
pkgutil
# list all your installed packages
pkgutil --pkgs
# show your package info
pkgutil --pkg-info
Some notes, tools, and techniques for reverse engineering macOS binaries.
If you want to change things on the root drive of a Mac you will need to take some steps to disable the built in security of the system. Most of these steps are the same regardless if you are on Intel or Apple Silicon. If there is a difference it is noted.
Note that all of these things put a Mac into an unsupported and less secure state.
Make sure you either perform these steps in a VM or that you reset the protections after you are done poking around
(This list is not exahustive on the details of each. Check the links at the end for more info.)
# /etc/systemd/system/rails-puma.service | |
# rvm wrapper default systemd rails | |
# systemctl enable rails-puma | |
# systemctl start rails-puma | |
[Unit] | |
Description=Rails Puma Webserver | |
Wants=network-online.target | |
After=network.target network-online.target | |
This list contains the DVTPlugInCompatibilityUUID from various versions of Xcode. | |
The UUID is determined by running: defaults read /Applications/Xcode.app/Contents/Info DVTPlugInCompatibilityUUID | |
B395D63E-9166-4CD6-9287-6889D507AD6A : Xcode 9.2 (9C40b) | |
BAB79788-ACEE-4291-826B-EC4667A6BEC5 : Xcode 11.3.1 (11C505) | |
C80A9C11-3902-4885-944E-A035869BA910 : Xcode v11.6 (11E708) | |
C80A9C11-3902-4885-944E-A035869BA910 : Xcode v11.7 (11E801a) | |
6C8909A0-F208-4C21-9224-504F9A70056E : Xcode v12.0 (12A7209) | |
6C8909A0-F208-4C21-9224-504F9A70056E : Xcode v12.0.1 (12A7300) | |
6C8909A0-F208-4C21-9224-504F9A70056E : Xcode v12.1 (12A7403) | |
DF12405B-55B4-4E00-8029-6AEFA7DBAD0F : Xcode v12.2 (12B45b) |
All credits go to by Bryan Roessler for his original post that I followed on how to setup LetsEncrypt wildcard certificate auto-renewal with Namecheap. I highly recommend you read his tutorial first and if you bump into issues, check out this gist next.
Unfortunately the original article is not up-to-date and doesn't have the option to leave comments so I can't communicate with the author for updates so I decided to write the updates in a Gist. I highlighted the sections that required an updated with
Correction #:
. I managed to get the correct setup with the help of the amazing guys at LetsEncrypt community. Here's the help thread.
def bb_intersection_over_union(boxA, boxB): | |
# determine the (x, y)-coordinates of the intersection rectangle | |
xA = max(boxA[0], boxB[0]) | |
yA = max(boxA[1], boxB[1]) | |
xB = min(boxA[2], boxB[2]) | |
yB = min(boxA[3], boxB[3]) | |
# compute the area of intersection rectangle | |
interArea = abs(max((xB - xA, 0)) * max((yB - yA), 0)) | |
if interArea == 0: |
from pdfminer.pdfparser import PDFParser | |
from pdfminer.pdfdocument import PDFDocument | |
from pdfminer.pdfpage import PDFPage | |
from pdfminer.pdfpage import PDFTextExtractionNotAllowed | |
from pdfminer.pdfinterp import PDFResourceManager | |
from pdfminer.pdfinterp import PDFPageInterpreter | |
from pdfminer.pdfdevice import PDFDevice | |
from pdfminer.layout import LAParams | |
from pdfminer.converter import PDFPageAggregator | |
import pdfminer |
#EXTM3U | |
#PLAYLIST:CBC Radio Streams | |
#EXTINF:-1,CBC Music (Atlantic) | |
https://cbcliveradio2-lh.akamaihd.net/i/CBCR2_HFX@382379/master.m3u8 | |
#EXTINF:-1,CBC Music (Central) | |
https://cbcliveradio2-lh.akamaihd.net/i/CBCR2_WPG@385274/master.m3u8 |
// ninjaVanish hides from webdriver/headless browser detection | |
// | |
// Focused specifically on HeadlessChrome / Puppeteer. | |
// When using Puppeteer this should be instrumented with the | |
// `Page.evaluateOnNewDocument()` method which injects our code | |
// after the document loads but before any scripts run | |
// | |
// Techniques leveraged are: | |
// - Removes "Headless" from User-Agent | |
// - Deletes `navigator.webdriver` to mimick standard navigator object properties |