#!/usr/bin/env php | |
<?php | |
// API Credentials | |
// You can either provide them as environment variables | |
// or hard-code them in the empty strings below. | |
$apiUrl = getenv('BS_URL') ?: ''; // http://bookstack.local/ | |
$clientId = getenv('BS_TOKEN_ID') ?: ''; | |
$clientSecret = getenv('BS_TOKEN_SECRET') ?: ''; |
/* | |
Developer: Marzavec ( https://github.com/marzavec ) | |
Description: A simple browser-based subdomain bruteforcing script, using DoH providers. Developed as a 5 minute hack, just to see it's preformance. Many improvements could be made, such as adding error handling or informing the user when the script is done. | |
Usage: Open the browsers dev console (usually F12), paste this script, change the `rootTld`, press enter to run. Ezpz. | |
*/ | |
const rootTld = 'lyka.pro'; // change to your target's root tld | |
// url to newline seperated wordlist | |
const wordlistUrl = 'https://raw.githubusercontent.com/rbsec/dnscan/master/subdomains.txt'; |
This process is rather easy, but it's important that you fill out the placeholders correctly.
You need to send it this email to dmca-notifications@twitch.tv
It is extremely important that the links are directly from the official twitch page to refer to the emotes, don’t use external pages like twitchemotes.com or similar.
#!/bin/bash | |
# Revokes any Twitch OAuth2 token. | |
# Usage: ./revoke-twitch-token.sh | |
# The script will prompt for the token to avoid leaking a valid token | |
# to history or environment in case an error occurs while attempting to revoke. | |
command -v jq >/dev/null 2>&1 || { echo >&2 "Please install 'jq'."; exit 1; } | |
command -v curl >/dev/null 2>&1 || { echo >&2 "Please install 'curl'."; exit 1; } |
- KVH Themes
- KVH
- KVH Orange
- Application Themes
- Battle.net
- Discord
There is an increasing count of applications which use Authy for two-factor authentication. However many users who aren't using Authy, have their own authenticator setup up already and do not wish to use two applications for generating passwords.
Since I use 1Password for all of my password storing/generating needs, I was looking for a solution to use Authy passwords on that. I couldn't find any completely working solutions, however I stumbled upon a gist by Brian Hartvigsen. His post had a neat code with it to generate QR codes (beware, through Google) for you to use on your favorite authenticator.
His method is to extract the secret keys using Authy's Google Chrome app via Developer Tools. If this was not possible, I guess people would be reverse engineering the Android app or something like that. But when I tried that code, nothing appeared on the screen. My gues
*update: TBC, but this new might affect how easy it is to use this technique past August 2024: Authy is shutting down its desktop app | The 2FA app Authy will only be available on Android and iOS starting in August
This gist, based in part on a gist by Brian Hartvigsen, allows you to export from Authy your TOTP tokens you have stored there.
Those can be "standard" 6-digits / 30 secs tokens, or Authy's own version, the 7-digits / 10 secs tokens.
Sources:
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=709588
- https://askubuntu.com/questions/216230/remote-desktop-to-ubuntu-has-wrong-keyboard-mapping
km-0414.ini
[noshift]
Key8=65406:0
Key9=65307:27
Key10=49:49
-
Download the NeverWare's ChromeOS build from http://www.neverware.com/freedownload
-
Extract the *.bin.zip
-
Convert it to VDI.
vboxmanage convertdd chromiumos_image.bin chromiumos_image.vdi
-
mv chromiumis_image.vdi C:\t\v\chromeos\