sudo apt install zsh-autosuggestions zsh-syntax-highlighting zsh
#!/usr/bin/env bash | |
echo " | |
---------------------- | |
NODE & NPM | |
---------------------- | |
" | |
# add nodejs LTS ppa (personal package archive) from nodesource | |
curl -fsSL https://deb.nodesource.com/setup_lts.x | sudo -E bash - |
async function readRequestBody(request) { | |
const { headers } = request; | |
const contentType = headers.get('content-type') || ''; | |
if (contentType.includes('application/json')) { | |
return JSON.stringify(await request.json()); | |
} else if (contentType.includes('form')) { | |
const formData = await request.formData(); | |
const body = {}; | |
for (const entry of formData.entries()) { | |
body[entry[0]] = entry[1]; |
apiVersion: networking.k8s.io/v1 | |
kind: Ingress | |
metadata: | |
name: tienda-ingress | |
spec: | |
rules: | |
- http: | |
paths: | |
- path: /* | |
pathType: ImplementationSpecific |
steps: | |
- name: 'gcr.io/cloud-builders/docker' | |
entrypoint: 'bash' | |
args: | |
- -c | |
- | | |
docker build -t XXXXXX-docker.pkg.dev/project/image-registry/image-name -f dockerfile.prod --platform=linux/amd64 --build-arg ORDERS_DATABASE_URL=$$DATABASE_URL . | |
secretEnv: ['DATABASE_URL'] | |
- name: 'gcr.io/cloud-builders/docker' |
steps: | |
- name: "gcr.io/cloud-builders/docker" | |
args: | |
[ | |
"build", | |
"-t", | |
"XXXXX-docker.pkg.dev/project-name/registry/image-name", | |
"-f", | |
"dockerfile.prod", | |
"--platform=linux/amd64", |
repository_url
es la url del repositorio y directory_name
es el nombre de la carpeta donde quieres que se guarde el sub-módulo (no debe de existir en el proyecto)git submodule add <repository_url> <directory_name>
I recently stumbled upon an application developed with Flutter, and since it was my first time seeing it, I surprisingly couldn't intercept its requests. After some digging on google, I created this tutorial with the steps that personally worked for me and I wanted to share them in hope to help someone else.
Note that the applications that I tested didn't have certificate pinning implemented. I'll update this file once I get to test an application that has it (if I'll be able to bypass it 😃 ).
To simplify the explanation I refer to the machine that hosts Burp as Kali, but you can use whatever linux machine you want.
There are 2 ways to intercept HTTP connections from a Flutter application installed on an Android device (I'm sure there are more but these are the ones I know). Intercepting requests by changing the proxy settings of the device, through the classic settings of Android, doesn't work in this case, since Flutter applic