This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/env python3 | |
# https://www.bleepingcomputer.com/news/security/researcher-hacks-over-35-tech-firms-in-novel-supply-chain-attack/ | |
# The following script finds all package.json files in the current dir and checks if there are referenced any | |
# dependencies that no public package is available for, making your application vulnerable to supply-chain attack. | |
# Simply run ./packagejson.py in your root repository direcotory. | |
import json | |
import requests | |
from pathlib import Path | |
import urllib.parse |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# Analysis of obfsuscated KoTOR II audio | |
# | |
# *** Stock mp3 encoded with lame | |
# position of LAME : 0x09c (156) | |
# position of Info : 0x024 (36) | |
# | |
# *** KoTOR II obfuscated audio (using bed_001ebo.wav) | |
# position of LAME : 0xc7 (199) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# Run from location where you have audio | |
# from the <game-dir>/streammusic directory | |
mp3s=( | |
[0-5]*.wav | |
mus_{a,b,t}*.wav | |
evil_ending.wav | |
credits.wav |