Skip to content

Instantly share code, notes, and snippets.

View TheShooter's full-sized avatar
⚔️
Warrior without war.

TheShooter

⚔️
Warrior without war.
  • zygote
  • bootloader
View GitHub Profile
@0xdevalias
0xdevalias / reverse-engineering-golang.md
Last active October 2, 2025 20:42
Some notes, tools, and techniques for reverse engineering Golang binaries
@0xdevalias
0xdevalias / bypassing-cloudflare-akamai-etc.md
Last active August 1, 2025 16:00
Some notes/resources for bypassing anti-bot/scraping features on Cloudflare, Akamai, etc.
@0xdevalias
0xdevalias / _deobfuscating-unminifying-obfuscated-web-app-code.md
Last active October 3, 2025 12:35
Some notes and tools for reverse engineering / deobfuscating / unminifying obfuscated web app code
@0xdevalias
0xdevalias / reverse-engineering-webpack-apps.md
Last active October 2, 2025 20:43
Some notes and techniques for reverse engineering Webpack (and a little bit about React/Vue/Angular) apps
@0xdevalias
0xdevalias / chatgpt-reverse-engineering-and-deep-dive-code-exploration.md
Last active October 2, 2025 20:44
Notes on reverse engineering ChatGPT's frontend web app + deep dive explorations of the code
@0xdevalias
0xdevalias / debugging-electron-apps.md
Last active October 2, 2025 20:47
Debugging Electron Apps (and related memory issues)
@AICDEV
AICDEV / flutter_ios.js
Last active October 1, 2025 13:02
Frida trace Flutter Functions on iOS
/**
* run the script to a running app: frida -U "appName" -l flutter_ios.js --no-pause
* start app direct with the script: frida -Uf bundleIdentifier -l flutter_ios.js --no-pause
*/
// #############################################
// HELPER SECTION START
var colors = {
"resetColor": "\x1b[0m",
"green": "\x1b[32m",
"yellow": "\x1b[33m",
@momenbasel
momenbasel / headersPentest
Last active July 1, 2023 14:28
HTTP headers is the language that all web servers speaks, it can be golden gem for security researcher.
X-Forwarded-Host
X-Forwarded-Port
X-Forwarded-Scheme
Origin: null
Origin: [siteDomain].attacker.com
X-Frame-Options: Allow
X-Forwarded-For: 127.0.0.1
X-Client-IP: 127.0.0.1
Client-IP: 127.0.0.1
---For injecting BXSS(blind XSS) || SQLI payloads---