Skip to content

Instantly share code, notes, and snippets.

View archcloudlabs's full-sized avatar
🐧

DLL_Cool_J archcloudlabs

🐧
View GitHub Profile
@shanewholloway
shanewholloway / README.md
Last active October 24, 2023 13:05
SHTC3 and RaspberryPI over Qwiic
@muff-in
muff-in / resources.md
Last active October 30, 2025 15:30
A curated list of Assembly Language / Reversing / Malware Analysis / Game Hacking-resources
@zobayer1
zobayer1 / fedora_post_install.md
Last active October 30, 2025 14:04
Fedora 36 post installation notes for software developers. Things you should do after installing your new Fedora 36 workstation.

Fedora 36 Post Installation (For Software Developers)

Top N things you should do after installing or upgrading to your new Fedora 36 workstation.


Settings

Change Hostname

@huntrar
huntrar / full-disk-encryption-arch-uefi.md
Last active October 31, 2025 12:51
Arch Linux Full-Disk Encryption Installation Guide [Encrypted Boot, UEFI, NVMe, Evil Maid]

Arch Linux Full-Disk Encryption Installation Guide

This guide provides instructions for an Arch Linux installation featuring full-disk encryption via LVM on LUKS and an encrypted boot partition (GRUB) for UEFI systems.

Following the main installation are further instructions to harden against Evil Maid attacks via UEFI Secure Boot custom key enrollment and self-signed kernel and bootloader.

Preface

You will find most of this information pulled from the Arch Wiki and other resources linked thereof.

Note: The system was installed on an NVMe SSD, substitute /dev/nvme0nX with /dev/sdX or your device as needed.

@cellularmitosis
cellularmitosis / README.md
Last active July 30, 2025 10:50
Jason Pepas' Technical Blog
@EdOverflow
EdOverflow / github_bugbountyhunting.md
Last active October 24, 2025 09:41
My tips for finding security issues in GitHub projects.

GitHub for Bug Bounty Hunters

GitHub repositories can disclose all sorts of potentially valuable information for bug bounty hunters. The targets do not always have to be open source for there to be issues. Organization members and their open source projects can sometimes accidentally expose information that could be used against the target company. in this article I will give you a brief overview that should help you get started targeting GitHub repositories for vulnerabilities and for general recon.

Mass Cloning

You can just do your research on github.com, but I would suggest cloning all the target's repositories so that you can run your tests locally. I would highly recommend @mazen160's GitHubCloner. Just run the script and you should be good to go.

$ python githubcloner.py --org organization -o /tmp/output
@tsiege
tsiege / The Technical Interview Cheat Sheet.md
Last active November 3, 2025 14:50
This is my technical interview cheat sheet. Feel free to fork it or do whatever you want with it. PLEASE let me know if there are any errors or if anything crucial is missing. I will add more links soon.

ANNOUNCEMENT

I have moved this over to the Tech Interview Cheat Sheet Repo and has been expanded and even has code challenges you can run and practice against!






\