Skip to content

Instantly share code, notes, and snippets.

1. NEVER mention that you’re an AI.
2. Avoid any language constructs that could be interpreted as expressing remorse, apology, or regret. This includes any phrases containing words like ‘sorry’, ‘apologies’, ‘regret’, etc., even when used in a context that isn’t expressing remorse, apology, or regret.
3. If events or information are beyond your scope or knowledge cutoff date, provide a response stating ‘I don’t know’ without elaborating on why the information is unavailable.
Refrain from disclaimers about you not being a professional or expert.
4. Keep responses unique and free of repetition.
5. Never suggest seeking information from elsewhere.
@ciphertxt
ciphertxt / openmsedgeprofilemacos.sh
Created July 13, 2022 18:42
Opens a specific Microsoft Edge profile by name on macOS
# Navigate to the profiles directory
cd ~/Library/Application\ Support/Microsoft\ Edge
# List out the profile directories. Note that the directory name is what is used in the launch command, *not* necessarily the friendly name of the profile you see in Microsoft Edge.app
find ./ -type f -name Preferences
# Let's say "Profile 1" is one of our directories
"/Applications/Microsoft Edge.app/Contents/MacOS/Microsoft Edge" --profile-directory="Profile 1"
# Sync parent folder and subfolders recursively
rsync -avP Takeout/Google\ Photos/ /Volumes/Multimedia/Pictures/Google\ Photos
# Exclude json files and consolidate into a flat folder
rsync -avP --exclude='*.json' Takeout/Google\ Photos/*/ organize/datefix
@ciphertxt
ciphertxt / exiftool_examples.sh
Last active October 29, 2022 22:01
exiftool shortcuts
# Read time metadata
exiftool -a -G1 -s -time:all *.JPG
# Update time metadata
# ModifyDate
exiftool -overwrite_original -d "%Y:%m:%d %H:%M:%S" -v "-AllDates<ModifyDate" "-FileModifyDate<ModifyDate" *.JPG
# DateTimeOriginal
exiftool -overwrite_original -d "%Y:%m:%d %H:%M:%S" -v "-AllDates<DateTimeOriginal" "-FileModifyDate<DateTimeOriginal" *.JPG
Bordertown (Finnish)
Trapped (icelandic)
The Bureau (French)
Deutschland 83
Giri/Haji
Vera
Wallander
Young Wallenberg
Collateral
Detective Montalbano
#!/bin/bash
i=1;
for youtube_uri in "$@"
do
echo "Downloading video $i: $youtube_uri";
i=$((i + 1));
yt-dlp -f 'bestvideo[ext=mp4]+bestaudio[ext=m4a]/bestvideo+bestaudio/best[ext=mp4]/best' --merge-output-format mp4 "$youtube_uri" --add-metadata --embed-thumbnail
done
## Monitor Azure Storage
### https://aka.ms/azuremonitor/storage-metrics
## Azure Monitor Metrics Overview
### https://docs.microsoft.com/en-us/azure/azure-monitor/platform/data-platform-metrics
## Azure Storage monitoring data reference
### https://docs.microsoft.com/en-us/azure/storage/common/monitor-storage-reference
## Azure Monitoring REST API walkthrough
@ciphertxt
ciphertxt / Get-AzResourcesSupportingPolicies.ps1
Last active July 14, 2020 17:46
Enumerates resources in a subscription and finds diagnostic settings for resources that support them
$currentContext = Get-AzContext
$currentSub = $(Get-AzContext).Subscription.Name
$token = $currentContext.TokenCache.ReadItems() | Where-Object {$_.tenantid -eq $currentContext.Tenant.Id}
$GetScanDetails = @{
Headers = @{
Authorization = "Bearer $($token.AccessToken)"
'Content-Type' = 'application/json'
}
Method = 'Get'
@ciphertxt
ciphertxt / GetGrantedOATHPerms.ps1
Last active July 14, 2020 12:45
Spot check Granted OATH permissions. Attackers are utilizing malicious OATH grants for persistence.
Get-AzureADServicePrincipal `
-Filter "serviceprincipaltype eq 'Application'" -All $true -PipelineVariable sp `
| Get-AzureADServicePrincipalOAuth2PermissionGrant `
-top 1 `
| select @{N="SPDisplayname";E={$sp.displayname}}, @{N="SPObjectid";E={$sp.objectid}}, consenttype, scope
#https://twitter.com/rootsecdev/status/1282640558025060354