An experiment comparing chromedb and go-rod when taking screenshots.
https://github.com/chromedp/chromedp vs https://github.com/go-rod/rod, using https://tranco-list.eu/
For the results below, false means there was no error taking the screenshot.
Title: Local Privilege Escalation Vulnerability in Razer Synapse 4 | |
CVE-ID: CVE-2025-27811 | |
Reported Date: 22 February 2025 | |
Reported By: Leon Jacobs, Orange Cyberdefense's SensePost Team | |
Vendor: Razer Inc. | |
Product: Razer Synapse 4 | |
Affected Version: v4.0.86.2502180127 (and potentially earlier) | |
Affected Component: razer_elevation_service.exe | |
Component Version (Affected): v1.1.0.5 |
An experiment comparing chromedb and go-rod when taking screenshots.
https://github.com/chromedp/chromedp vs https://github.com/go-rod/rod, using https://tranco-list.eu/
For the results below, false means there was no error taking the screenshot.
I was curious about how hard it would be to implement something like pypipe[1] in go. Turns out, not that hard.
[1] https://github.com/bugen/pypipe
$ echo "foo bar" | go run main.go 4
1. The door order that must be achieved to successfully allow the team to infiltrate the building is: [door_3, door_0, door_4, door_1, door_2] and must be sequential. | |
2. The coils for the doors have restricted access on the Modbus network and can not be written. | |
3. The sensors are hardwired to coils, thus driving the coil will result in the sensor signal being altered. | |
4. SYSTEM REST: Upon mission completion, the system will reset after approximately two minutes. | |
5. FLAG: the flag will be available on the holding registers starting at address 4 upon completion of the mission. |
The image in this tweet is needed to solve this challenge: https://twitter.com/leonjza/status/1678419863436443648
These files are an example setup to have Tailscale webhooks deliver to a Telegram channel with https://github.com/adnanh/webhook fronted with Traefik, protected with an HTTP basic authentication setup.
Get a set of credentials to populate in the in the traefik.http.middlewares.basic-auth.basicauth.users
label with htpasswd -Bn user
. Remember to double escape the $
sign.
Then, in the Tailscale administrator console, add a new webhook endpoint that would point to something like https://user:[email protected]/hooks/tailscale
after configuring your docker-compose.yml
file appropriately.
# search h1 bounty programs | |
# | |
# 2023 @leonjza | |
# | |
# you need to grab a cookie and x-csrf-token value. | |
# one way to do that is (without auth): | |
# | |
# 1. browse to https://hackerone.com/directory/programs | |
# 2. open the console | |
# 3. search something |
diff --git a/docker/entrypoint.sh b/docker/entrypoint.sh | |
index 78571d9..765b13f 100644 | |
--- a/docker/entrypoint.sh | |
+++ b/docker/entrypoint.sh | |
@@ -1,55 +1,28 @@ | |
#!/bin/sh | |
+# Modified version of | |
+# https://github.com/xjasonlyu/tun2socks/blob/main/docker/entrypoint.sh | |
+ |
#!/usr/bin/env python3 | |
# | |
# original: https://gist.github.com/joswr1ght/595d49d5a7914cf7305b73512f37186a | |
import sys | |
def countips(netblock): | |
v = netblock.split('/') | |
# nothing? |