Skip to content

Instantly share code, notes, and snippets.

View cstrouse's full-sized avatar
💭
Bug Bounty

Casey Strouse cstrouse

💭
Bug Bounty
View GitHub Profile
@0xdevalias
0xdevalias / reverse-engineering-macos.md
Last active June 8, 2025 23:34
Some notes, tools, and techniques for reverse engineering macOS binaries
const fs = require("fs");
const { SourceMapConsumer, SourceMapGenerator } = require("source-map");
function reverseSourceMap(sourceMap) {
return SourceMapConsumer.with(sourceMap, null, (consumer) => {
const reversedMap = new SourceMapGenerator();
consumer.eachMapping((mapping) => {
reversedMap.addMapping({
generated: {
line: mapping.originalLine,
@0xdevalias
0xdevalias / bypassing-cloudflare-akamai-etc.md
Last active May 25, 2025 01:37
Some notes/resources for bypassing anti-bot/scraping features on Cloudflare, Akamai, etc.
@0xdevalias
0xdevalias / _deobfuscating-unminifying-obfuscated-web-app-code.md
Last active June 9, 2025 05:28
Some notes and tools for reverse engineering / deobfuscating / unminifying obfuscated web app code

GitHub Search Syntax for Finding API Keys/Secrets/Tokens

As a security professional, it is important to conduct a thorough reconnaissance. With the increasing use of APIs nowadays, it has become paramount to keep access tokens and other API-related secrets secure in order to prevent leaks. However, despite technological advances, human error remains a factor, and many developers still unknowingly hardcode their API secrets into source code and commit them to public repositories. GitHub, being a widely popular platform for public code repositories, may inadvertently host such leaked secrets. To help identify these vulnerabilities, I have created a comprehensive search list using powerful search syntax that enables the search of thousands of leaked keys and secrets in a single search.

Search Syntax:

(path:*.{File_extension1} OR path:*.{File_extension-N}) AND ({Keyname1} OR {Keyname-N}) AND (({Signature/pattern1} OR {Signature/pattern-N}) AND ({PlatformTag1} OR {PlatformTag-N}))

Examples:

**1.

@0xdevalias
0xdevalias / reverse-engineering-webpack-apps.md
Last active June 5, 2025 16:10
Some notes and techniques for reverse engineering Webpack (and a little bit about React/Vue/Angular) apps
@DanaEpp
DanaEpp / guid_reaper.py
Created October 20, 2022 17:56
Tool to dump v1 GUIDs and generate a wordlist of GUIDs for use in bruteforce attacks against APIs with predictable GUIDs
#!/bin/env python3
import argparse
import datetime
import re
import sys
import uuid
###############################################################################
# Based off of Daniel Thatcher's guid tool
@vgmoose
vgmoose / a_readme.md
Last active June 3, 2025 20:20
Yet another How to Create a Windows 11 Install USB from Ubuntu Linux or Mac

Creating a Windows 11 Install USB in 2022

I have been installing Windows for a long time. Does it get easier? I want to say it gets easier, but it seems like there's always some new wrinkle! These instructions are as much a note to my future self as they may be useful to anyone else.

For me, I was not able to get any exfat-based installs, or even any of the GUI helpers to make this process any more straightforward. Maybe on your target Windows / host OS those helpers will work, but the below process (as of current year) is consistent, and not overly complicated.

Overview:

  1. Downloading an official ISO image from MS:
  2. Formatting the drive (at least 8GB) as GPT, and one FAT-format partition (aka MS-DOS)
@astreknet
astreknet / OpenBSD_on_Apple_M2_QEMU.md
Last active October 25, 2024 21:27
OpenBSD on Apple M2 with QEMU

OpenBSD on Apple M2 with QEMU

Minimalist installation of OpenBSD on the Apple M2 using QEMU

Ingredients

Installation

  1. install QEMU with Homebrew brew install qemu, also possible with MacPorts
  2. Write a script with execute permissions chmod +x qemu_aarch64_install_openbsd.sh for installing the image.
@e-minguez
e-minguez / qemu-command-openbsd71-utm
Created August 1, 2022 08:43
qemu command running under the hood via UTM for an OpenBSD 7.1 arm64
qemu-system-aarch64 -L /Applications/UTM.app/Contents/Resources/qemu -S -qmp tcp:127.0.0.1:4444,server,nowait -nodefaults -vga none -spice "unix=on,addr=/Users/edu/Library/Group Containers/WDNLXAD4W8.com.utmapp.UTM/1AEA40F1-1FDC-4EF7-9D4B-D2FA79DFC7E5.spice,disable-ticketing=on,image-compression=off,playback-compression=off,streaming-video=off,gl=off" -device virtio-ramfb -cpu host -smp cpus=2,sockets=1,cores=2,threads=1 -machine virt, -accel hvf -accel tcg,tb-size=512 -drive if=pflash,format=raw,unit=0,file=/Applications/UTM.app/Contents/Resources/qemu/edk2-aarch64-code.fd,readonly=on -drive "if=pflash,unit=1,file=/Users/edu/Library/Containers/com.utmapp.UTM/Data/Documents/OpenBSD 7.1.utm/Images/efi_vars.fd" -boot menu=on -m 2048 -name "OpenBSD 7.1" -device nec-usb-xhci,id=usb-bus -device usb-tablet,bus=usb-bus.0 -device usb-mouse,bus=usb-bus.0 -device usb-kbd,bus=usb-bus.0 -device qemu-xhci,id=usb-controller-0 -chardev spicevmc,name=usbredir,id=usbredirchardev0 -device usb-redir,chardev=usbredirchardev0,id=