- Implementation:
- M-of-n parties deterministically compile web interface bundle and sign it
- Interface installs service worker mandates all future updates are
- signed with m-of-n valid keys certified by a pinned CA
- newer timestamp than current version
- Protections
- Compromised insider tampering with frontends
- BGP attacks
- DNS takeover
""" | |
Bypass Chrome v20 appbound encryption and extract cookies using Chrome Remote Debugging without admin rights. | |
Including HTTP Only and Secure cookies. | |
Developed by: github.com/thewh1teagle | |
License: MIT | |
For educational purposes only. | |
Usage: | |
pip install websocket-client requests | |
python main.py |
// ==UserScript== | |
// @name Itch Collection CSV Exporter | |
// @namespace https://github.com/abraxas86/tampermonkey-scripts/blob/main/itch.io/ | |
// @version 4.5 | |
// @description Scroll down to the bottom of your collection, click the button, get CSV of your collection! | |
// @author Abraxas86 | |
// @match https://itch.io/c/* | |
// @match https://itch.io/my-purchases | |
// @match https://itch.io/b/* | |
// @match https://itch.io/bundle/* |
This gist has migrated to the repo below.
Please submit new entries as pull requests to https://github.com/jauderho/nts-servers.
Initial source: https://docs.ntpsec.org/latest/NTS-QuickStart.html
We've been deadlocked for a while on the pipeline operator proposal, for a few reasons. Partially it's just low implementor interest, as this is fundamentally just syntactic sugar, but also because there are three competing proposals and the proponents of each haven't been convinced by the others yet.
In this essay I hope to briefly outline the problem space, summarize the three proposals, and talk about what's gained/lost by each of them. (Spoiler: they're all nearly identical; we're arguing over very small potatoes.)
Param ( [String]$URL = 'https://coffeetales.net', [String]$Mode = 'Default' ) | |
If ( 'Default' -ieq $Mode ) { | |
#[String]$WindowsPowershellPath = | |
# [IO.Path]::Combine( | |
# ([String[]]@( [Environment]::SystemDirectory, 'WindowsPowerShell', 'v1.0', 'powershell.exe' )) | |
# ) | |
[String]$PowerShellPath = Get-Process -Id $PID | Select-Object -ExpandProperty Path | |
Start-Process ` |
{ | |
"extensions": [ | |
{ | |
"id": "10", | |
"lang": "de", | |
"source": "Wie Manga!" | |
}, | |
{ | |
"id": "100019686565354829", | |
"lang": "de", |
- Install Age Of Empires 2 The Conquerors Expansion
- Patch game with userpatch: http://userpatch.aiscripters.net
- Install and launch Hamachi: https://www.vpn.net
- Create or join a Hamachi network
- SERVER: Install ForceBindIP: https://r1ch.net/projects/forcebindip
- SERVER: Create shortcut like: "C:\Program Files (x86)\ForceBindIP\ForceBindIP.exe" XX.XX.XX.XX "C:\Program Files (x86)\Age Of Empires 2 & The Conquerors Expansion - Full Game\Age2_x1\age2_x1.exe"
Where XX.XX.XX.XX is your Hamachi IP
- Start game, select MultiPlayer and TCP/IP DirectPlay method.
- SERVER: Create a game and give your Hamachi IP to other players
- CLIENT: Click on Show games and enter Hamachi IP of the server
https://api.mangarockhd.com/query/web401/
Parameter msid
seems to be always equal to 71 and can be queried by /manga_detail