I hereby claim:
- I am arbu on github.
- I am arbu (https://keybase.io/arbu) on keybase.
- I have a public key ASCBcdsWrJxwy6GjSVUh219S3_uA8Qu6B9WZDKsnsgswKwo
To claim this, I am signing this object:
import Data.List | |
data Formula = Atom String | Unary String Formula | Binary String Formula Formula | |
instance Show Formula where | |
show (Atom name) = name | |
show (Unary op remaining) = op ++ " " ++ (show remaining) | |
show (Binary op left right) = "(" ++ (show left) ++ " " ++ op ++ " " ++ (show right) ++ ")" | |
unaries = ["-"] |
#! /usr/bin/env python3 | |
import os.path, json | |
from Crypto.Cipher import AES | |
ACCOUNTS_KEY = b'\x01\x06\x04\x05\x02\x07\x04\x03\x0c=\x0eK\xfe\xf9\xd4!' | |
def decrypt_ejs(ejs, key): | |
if hasattr(ejs, "read"): | |
ejs = ejs.read() |
I hereby claim:
To claim this, I am signing this object:
This guide shows how to setup an Android VM in order to intercept all HTTPS requests. This was originally intended to reverse PlayServices but should work with any app that does not use certificate pinning (i.e. every app that relies on the system certificate authorities).
Inspired by this guide how to install Android x86 in VirtualBox, this guide how to install a system certificate on Android and this guide how to use mitmproxy with VirtualBox.