Skip to content

Instantly share code, notes, and snippets.

@q158073378252010
q158073378252010 / shu-ipa-install.plist
Last active June 6, 2023 05:04 — forked from nameldk/shu-ipa-install.plist
use shu and shortcut to install ipa file. need rename ipa file to 1.ipa
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
<plist version="1.0">
<dict>
<key>items</key>
<array>
<dict>
<key>assets</key>
<array>
<dict>
@q158073378252010
q158073378252010 / disable_youtube_autoplay.js
Created December 22, 2020 07:15 — forked from jeffmbellucci/disable_youtube_autoplay.js
Turn off/disable YouTube autoplay feature
// To run, install GreaseMonkey or TamperMonkey extension in your browser
// Copy this code into new user script, and enable
// ==UserScript==
// @name Disable Youtube autoplay
// @version 1.0
// @description This script turns off Youtube's newest autoplay feature after the page loads
// @author Jeff Bellucci
// @match *://www.youtube.com/*
// @run-at document-start
@q158073378252010
q158073378252010 / go-to-fhs.md
Created August 17, 2020 10:19 — forked from phlinhng/go-to-fhs.md
V2Ray 从原有 go.sh 遷移至 install-realese.sh 教程
  1. 转移配置文件目录至新目录 /usr/local/etc/v2ray
mkdir -p /usr/local/etc/v2ray
mv /etc/v2ray/config.json /usr/local/etc/v2ray/config.json
  1. 移除旧脚本安装的 v2ray-core(由于旧脚本停用,只能手动移除)
systemctl stop v2ray
systemctl disable v2ray
rm -f /etc/systemd/system/v2ray.service
||a.alimama.cn
||acjs.aliyun.com
||adash.m.taobao.com
||adashbc.m.taobao.com
||adash-c.ut.taobao.com
||adashx.m.taobao.com
||adashx4yt.m.taobao.com
||adashxgc.ut.taobao.com
||adsh.m.taobao.com
||afp.adchina.com
@q158073378252010
q158073378252010 / 62078.md
Created April 16, 2020 17:21
How to finally disable this ******* Wi-Fi Sync port (62078) on iOS (testers wanted)

Hi there,

Why should I disable this port?

Apple enable this port by default if you want Wi-Fi Sync. The problem is, I (and probably you) never used this so this port should not be open. Enabling this port by default is a security risk as there is always an undocumented service (lockdownd) listening on this port.

This is an non-exhaustive list of what you are exposing to if you don't close this port:

  • If an attacker get the pairing keys of your iDevice, he can dump the whole content of your device transparently as soon as he is on the same network as you (at Home, Work, in a Café, in a Fast Food etc) or if he have access to your cellular network (yes, the port is open on all interfaces including cellular) e.g. if the NSA have access to AT&T network or if DGSE have access to Orange network (which is true: http://www.france24.com/fr/20140320-dgse-renseignement-espionage-nsa-donnees-operateur-orange-snowden/ ) or even if your neighbor have set up a IMSI-Catcher.
  • It make the iOS device easily identifiab
@q158073378252010
q158073378252010 / 01nginx-tls-sni.md
Created April 10, 2020 10:34 — forked from kekru/01nginx-tls-sni.md
nginx TLS SNI routing, based on subdomain pattern

Nginx TLS SNI routing, based on subdomain pattern

Nginx can be configured to route to a backend, based on the server's domain name, which is included in the SSL/TLS handshake (Server Name Indication, SNI).
This works for http upstream servers, but also for other protocols, that can be secured with TLS.

prerequisites

  • at least nginx 1.15.9 to use variables in ssl_certificate and ssl_certificate_key.
  • check nginx -V for the following:
    ...
    TLS SNI support enabled
@q158073378252010
q158073378252010 / ByeZhihuSecurity.js
Created March 27, 2020 00:36 — forked from oa414/ByeZhihuSecurity.js
去除知乎点开外链的安全中心跳转
// ==UserScript==
// @name ByeZhihuSecurity
// @namespace http://tampermonkey.net/
// @version 0.1
// @description 去除知乎点开外链的安全中心跳转
// @author Lin Xiangyu
// @match https://www.zhihu.com/*
// @grant none
// ==/UserScript==
@q158073378252010
q158073378252010 / Export ZTE F460 firmware.md
Created December 22, 2019 15:23 — forked from Malayke/Export ZTE F460 firmware.md
中兴 F460 电信光猫固件提取

破解完光猫不过隐,继续琢磨,查了些智能设备安全的教程,分析智能设备或嵌入式设备安全,第一步是要提取固件,所以接下来要提取固件了。

通过/proc虚拟文件系统读取MTD分区表:

/ # cat /proc/mtd
dev:    size   erasesize  name
mtd0: 08000000 00020000 "whole flash"
mtd1: 00200000 00020000 "u-boot"