Skip to content

Instantly share code, notes, and snippets.

View initialrise's full-sized avatar
🙂
existing

Rabindra initialrise

🙂
existing
  • Kathmandu, Nepal
View GitHub Profile
@TameemS
TameemS / debloatMEmu.md
Last active July 11, 2024 15:18
Debloating & Optimizing MEmu

Inspired by this

More of my guides: Debloating LDPlayer - Debloating Nox (Updated)

Edit 22/8/2021: I have updated MEmu and it seems like it reinstalls the apps and re-enables the services. Repeat steps 5, 7, 8, and 9 if you update MEmu.

Debloating MEmu

In my experience, Nox can be quite slow and choppy, and looks like I'm not the only person with this problem. A lot of people say that MEmu performs better than Nox, and I could agree with that. I have no chopping issues with it so far. But like Nox, there are kinda shady stuff going on.

@0xdevalias
0xdevalias / _deobfuscating-unminifying-obfuscated-web-app-code.md
Last active July 22, 2024 15:26
Some notes and tools for reverse engineering / deobfuscating / unminifying obfuscated web app code
@ounissi-zakaria
ounissi-zakaria / postMessageTracker.js
Created March 22, 2024 21:08
User Script that tracks postMessage event listeners and makes it easy to track/debug them
// ==UserScript==
// @name PostMessage Tracker
// @namespace Violentmonkey Scripts
// @match *://*/*
// @version 1.0
// @author Ounissi zakaria (https://twitter.com/zakaria_ounissi)
// @description Each time an event listener is added for `message` it adds a menu command to tha message handler.
// @grant GM.registerMenuCommand
// @run-at document-start
// ==/UserScript==
@thesamesam
thesamesam / xz-backdoor.md
Last active July 21, 2024 05:59
xz-utils backdoor situation (CVE-2024-3094)

FAQ on the xz-utils backdoor (CVE-2024-3094)

This is a living document. Everything in this document is made in good faith of being accurate, but like I just said; we don't yet know everything about what's going on.

Background

On March 29th, 2024, a backdoor was discovered in xz-utils, a suite of software that