Skip to content

Instantly share code, notes, and snippets.

View SleepTheGod's full-sized avatar
💭
chrome://quit

Taylor Christian Newsome SleepTheGod

💭
chrome://quit
View GitHub Profile
@SleepTheGod
SleepTheGod / ANSI-escape-sequences.md
Created January 15, 2025 11:49 — forked from ConnerWill/ANSI-escape-sequences.md
ANSI Escape Sequences cheatsheet

ANSI Escape Sequences

Standard escape codes are prefixed with Escape:

  • Ctrl-Key: ^[
  • Octal: \033
  • Unicode: \u001b
  • Hexadecimal: \x1B
  • Decimal: 27
@SleepTheGod
SleepTheGod / AdbCommands
Created October 4, 2024 05:02 — forked from Pulimet/AdbCommands
Adb useful commands list
Hi All!
I've recently launched a tool that wraps many of the commands here with a user interface. This desktop application is currently available for macOS. There's a roadmap outlining planned features for the near future.
Feel free to request any features you'd like to see, and I'll prioritize them accordingly.
One of the most important aspects of this application is that every command executed behind the scenes is displayed in a special log section. This allows you to see exactly what’s happening and learn from it.
Here's the link to the repository: https://github.com/Pulimet/ADBugger
App Description:
ADBugger is a desktop tool designed for debugging and QA of Android devices and emulators. It simplifies testing, debugging, and performance analysis by offering device management, automated testing, log analysis, and remote control capabilities. This ensures smooth app performance across various setups.
@SleepTheGod
SleepTheGod / apricorn_keep_alive.py
Created August 2, 2023 09:45 — forked from Rurik/apricorn_keep_alive.py
Apricorn Padlock Keep-Alive
import os
import time
while True:
try:
os.mkdir('F:\\A')
print("Directory 'A' created.")
except FileExistsError:
print("Directory 'A' already exists.")
@SleepTheGod
SleepTheGod / client.c
Created December 19, 2022 15:01 — forked from biddyweb/client.c
LizardStresser (Lizard Squad) Bot - Full source.
/*
Chippy1337 and @packetprophet present:
LizardStresser rekt
This is the cross compiled bot
LICENSE AGREEMENT:
If you lulz'd, you must sent BTC to
1N4MxbXsooU9aMU41NPrSbgZKpJjtwsnar
Death to skids
@SleepTheGod
SleepTheGod / SandboxBag
Created October 11, 2022 20:31 — forked from inC3ASE/SandboxBag
Library/Caches/com.apple.appstore
 streamtypedÅËÑ@ÑÑÑNSMutableDictionaryÑÑ NSDictionaryÑÑNSObjectÖÑiíÑÑÑNSStringïÑ+bagÜíÑÑÑ
NSMutableDataÑÑNSDataïñÇXƒÑ [115800c]<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<!DOCTYPE plist PUBLIC "-//Apple Computer//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
<plist version="1.0">
<dict>
<key>search</key><string>https://search.itunes.apple.com/WebObjects/MZSearch.woa/wa/search</string>
<key>advancedSearch</key><string>https://search.itunes.apple.com/WebObjects/MZSearch.woa/wa/advancedSearch?cc=us</string>
<key>searchHints</key><string>https://search.itunes.apple.com/WebObjects/MZSearchHints.woa/wa/hints</string>
<key>searchApi</key><string>https://search.itunes.apple.com/WebObjects/MZSearch.woa/wa/searchApi</string>
<key>p2-book-search</key><string>https://search.itunes.apple.com/WebObjects/MZSearch.woa/wa/search?media=ebook</string>
@SleepTheGod
SleepTheGod / log4j_rce_detection.md
Created October 4, 2022 11:13 — forked from Neo23x0/log4j_rce_detection.md
Log4j RCE CVE-2021-44228 Exploitation Detection

log4j RCE Exploitation Detection

You can use these commands and rules to search for exploitation attempts against log4j RCE vulnerability CVE-2021-44228

Grep / Zgrep

This command searches for exploitation attempts in uncompressed files in folder /var/log and all sub folders

sudo egrep -I -i -r '\$(\{|%7B)jndi:(ldap[s]?|rmi|dns|nis|iiop|corba|nds|http):/[^\n]+' /var/log
@SleepTheGod
SleepTheGod / index.html
Created September 13, 2022 19:40
Test Electron Fiddle JS
<!DOCTYPE html>
<html>
<head>
<meta charset="UTF-8">
<!-- https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP -->
<meta http-equiv="Content-Security-Policy" content="default-src 'self'; script-src 'self'; style-src 'self' 'unsafe-inline'">
<link href="./styles.css" rel="stylesheet">
<title>Hello World!</title>
</head>
<body>
@SleepTheGod
SleepTheGod / LSR.md
Last active January 13, 2025 04:50 — forked from Raffy27/LSR.md
Local Storage Reassembly - Discord

Local Storage Reassembly

General

The purpose of this writeup is to document a method that can be exploited in order to transfer files to a Discord user's Windows system, without said user's explicit consent. This method does not allow for immediate and direct execution of the file, therefore it does not qualify as an individual security vulnerability.

Technique

LSR requires an image file that will not be modified by Discord. Images that have already been compressed are not modified in any way, EOF data is not trimmed or altered. Using such an image, any file can be split into chunks that (combined with the image) don't exceed 8Mb, which is the upload limit for regular Discord accounts. These images containing EOF data can be sent to a user without being altered - file hashes do not match, so remote caching can not be used, and the original image has already been compressed, thus no additional compression will take place. As soon as the user views the given conversation and the images load, they a

@SleepTheGod
SleepTheGod / pgp.py
Created July 13, 2022 14:02 — forked from bbhunter/pgp.py
OSINT Tool | Get emails by domain using public PGP repositories
import requests
import sys
import re
def get_mails(domain):
url = 'https://pgp.circl.lu/pks/lookup?search={}&fingerprint=on&op=index'.format(domain)
res = requests.get(url).text
mails = re.findall(r'<a href=".*">(.*)<\/a>', res)