Skip to content

Instantly share code, notes, and snippets.

@muellerberndt
muellerberndt / config-global.json
Created April 17, 2024 06:32
Inferno drainer config
{
"connect_buttons_class": "placeholder-button",
"drain_buttons_class": "placeholder-button",
"disconnect_buttons_class": "",
"connect_text": "Connect Wallet",
"connected_text": "Connected As {wallet}",
"loading_text": "Verifying",
"verify_text": "Please Verify",
"drain_button_waiting_click_text": "Claim",
"change_chain_text": "Please Switch Chain",
@muellerberndt
muellerberndt / deobfuscate.js
Last active February 4, 2025 20:42
Inferno deobfuscator
const fs = require('fs');
const vm = require('vm');
const acorn = require('acorn');
const escodegen = require('escodegen');
const estraverse = require('estraverse');
const { JSDOM } = require('jsdom');
function deobfuscate(obfuscatedCode) {
const ast = acorn.parse(obfuscatedCode, { ecmaVersion: 2020 });
@HarukaMa
HarukaMa / inferno.md
Last active February 16, 2025 06:24
Tinkering around Inferno Drainer

Wasted one afternoon to manually deobfuscate the js from one drainer website. (see here for the "deobfuscated" reference js and script used to generate the file)

You can use the code to decrypt the traffic and even create arbitrary payload to send to their backend server.

What's the domain of that backend server? You need to find it out yourself.

The code below is in public domain.

@sassdawe
sassdawe / PresentLight.json
Last active April 15, 2025 12:20
A light theme for Windows Terminal designed for the big screen!
{
"background": "#F9F9F9",
"black": "#AB3D2C",
"blue": "#275FE4",
"brightBlack": "#C21458",
"brightBlue": "#0099E1",
"brightCyan": "#7B86BB",
"brightGreen": "#3D942E",
"brightPurple": "#CE33C0",
"brightRed": "#FF0308",
@macshome
macshome / defang.md
Last active April 17, 2025 17:51
How to defang system protections on macOS

How to Defang macOS System Protections

If you want to change things on the root drive of a Mac you will need to take some steps to disable the built in security of the system. Most of these steps are the same regardless if you are on Intel or Apple Silicon. If there is a difference it is noted.

Note that all of these things put a Mac into an unsupported and less secure state.

Make sure you either perform these steps in a VM or that you reset the protections after you are done poking around

Protections and Terms

(This list is not exahustive on the details of each. Check the links at the end for more info.)

@bglnelissen
bglnelissen / SCX-3400.ppd
Last active March 31, 2025 19:56
Working ppd file for my RasperryPi CUPS server for the Samsung SCX-3400 Series, like my SCX-3405w
*PPD-Adobe: "4.3"
*% PPD file for Samsung SCX-3400 Series with CUPS
*% created by b.nelissen
*% based on: https://gitlab.com/ScumCoder/splix/-/blob/patches/splix/ppd/m2020.ppd
*% free to use and mod
*% ... it was a huge hassle to get this one working ...
*FormatVersion: "4.3"
*FileVersion: "2.0.0"
*LanguageVersion: English
@sekcompsci
sekcompsci / Comparison Espressif ESP MCUs.md
Last active April 19, 2025 04:37 — forked from fabianoriccardi/Comparison Espressif ESP MCUs.md
Comparison chips (SoCs) table for ESP8266/ESP32/ESP32-S2/ESP32-S3/ESP32-C3/ESP32-C6. Forked from @fabianoriccardi

Comparison chips (SoCs) table for ESP8266/ESP32/ESP32-S2/ESP32-S3/ESP32-C3/ESP32-C6

A minimal table to compare the Espressif's MCU families.

ESP8266 ESP32 ESP32-S2 ESP32-S3 ESP32-C3 ESP32-C6
Announcement Date 2014, August 2016, September 2019, September 2020, December
@xperylab
xperylab / decrypt_ufed_keychain.py
Created December 30, 2020 11:27
UFED KeychainDump Decrypter
################################################################################################
# #
# UFED keychain decrypter #
# #
# Copyright Matthieu Regnery 2020 #
# #
# This program is free software: you can redistribute it and/or modify #
# it under the terms of the GNU General Public License as published by #
# the Free Software Foundation, either version 3 of the License, or #
# (at your option) any later version. #
@saelo
saelo / 3_years_of_attacking_javascript_engines.txt
Created October 27, 2019 16:04
3 Years of Attacking JavaScript Engines
|=-----------------------------------------------------------------------=|
|=-------------=[ 3 Years of Attacking JavaScript Engines ]=-------------=|
|=-----------------------------------------------------------------------=|
|=------------------------------=[ saelo ]=------------------------------=|
|=-----------------------------------------------------------------------=|
The following are some brief notes about the changes that have taken place
since the release of the "Attacking JavaScript Engines" paper [1]. In
general, no big conceptional changes have happened since. Mitigations have
been added to break some of the presented techniques and, as expected, a
@lategoodbye
lategoodbye / mainline_guide.md
Last active April 1, 2025 06:49
Raspberry Pi: How to cross-compile and use Mainline Kernel

Raspberry Pi: How to cross-compile and use Mainline Kernel

Notes on how to set up a new Ubuntu LTS x64 environment, how to build a recent Mainline Kernel and place it on a Raspberry Pi OS SD card.

Procedure

  1. Install tools needed:
$ apt install git make gcc g++ device-tree-compiler bc bison flex libssl-dev libncurses-dev python3-ply python3-git libgmp3-dev libmpc-dev