Skip to content

Instantly share code, notes, and snippets.

View blackjack4494's full-sized avatar
🍌
I am here to bring bananas to the people

Tom-Oliver Heidel blackjack4494

🍌
I am here to bring bananas to the people
  • Hamburg/Bremen, Germany
View GitHub Profile
@Prajjwal
Prajjwal / ephemeral-file-sharing-services.md
Last active November 22, 2023 17:36
A List of Ephemeral File Sharing Services

A List of Ephemeral File Sharing Services

Contributions welcome.

~ Prajjwal Singh

Service CLI? Max Size Direct Access Files Expire? Can Limit Download Count? Password Protection HTTPS
c-v.sh curl -F 4 GB Yes Yes, by Mister Alg. No No Enforced
FileIO Yes 5 GB Yes Optionally Fixed @ 1 No Yes
@tanaikech
tanaikech / submit.md
Last active December 27, 2023 04:13
Downloading Files From Google Drive Under No Authorization Using Browser

Downloading Files From Google Drive Under No Authorization Using Browser

This is a sample script for downloading files from Google Drive under no authorization using browser. By using this sample, you can make other users download files from your Google Drive. Even if the other users are not Google users, they can download the files.

Demo

@leptos-null
leptos-null / LMApiaryDeviceCrypto.h
Last active April 12, 2024 03:28
Fully implemented mirror of YouTube's YTApiaryDeviceCrypto class
//
// LMApiaryDeviceCrypto.h
//
// Created by Leptos on 11/18/18.
// Copyright © 2018 Leptos. All rights reserved.
//
#import <Foundation/Foundation.h>
#define kYouTubeBase64EncodedProjectKey @"vOU14u6GkupSL2pLKI/B7L3pBZJpI8W92RoKHJOu3PY="
@leptos-null
leptos-null / YouTube_Music_Client.md
Last active April 12, 2024 03:31
Writing an iOS YouTube Music client

Writing an iOS YouTube Music client

I’ve been using YouTube Music as my main music streaming service for almost a year and a half. The iOS client is great- I’ve never had a single complaint. It’s potentially one of the most bug free apps I’ve ever used, it has an extremely friendly, and simple, graphical interface, and the service itself is great.

I was curious how the client worked in terms of networking, and while curiosity may treat cats poorly, it lands researchers in black sites can provide a lot of insight.

Step 0

The first thing I do when reverse engineering a client is monitor HTTP requests while the application starts up, and when doing the tasks interested in. On a jailbroken iOS device, I use FLEX by FlipBoard.

.rdata:00007FF72615EF30 00000036 C mp.php?hardware=%s&uid=%s&wait=%.0f&prot=%i&reauth=%i
.rdata:00007FF72616B378 0000003F C prime.php?hardware=%s&uid=%s&prot=%i&lastCheck=%f&numChecks=%i
.rdata:00007FF726175E80 00000070 C messages.php?qt=messages-delete&hardware=%s&uid=%s&language=%s&type=%s&del=%i&start=%i&max=%i&timezoneOffset=%i
.rdata:00007FF726175F10 0000005F C messages.php?qt=messages-read&start=%i&max=%i&hardware=%s&uid=%s&language=%s&timezoneOffset=%i
.rdata:00007FF726176180 00000079 C communities.php?qt=communities-getsettings&hardware=%s&uid=%s&language=%s&getsettings=1&id=%i&cprot=%i&timezoneOffset=%i
.rda
@Luc1412
Luc1412 / auth_flow.py
Last active March 15, 2024 11:16
This is the auth flow for valorant (async) + Some further research I did in the past
import re
import aiohttp
async def run(username, password):
session = aiohttp.ClientSession()
data = {
'client_id': 'play-valorant-web-prod',
'nonce': '1',
'redirect_uri': 'https://beta.playvalorant.com/opt_in',
'response_type': 'token id_token',