An experiment comparing chromedb and go-rod when taking screenshots.
https://github.com/chromedp/chromedp vs https://github.com/go-rod/rod, using https://tranco-list.eu/
For the results below, false means there was no error taking the screenshot.
An experiment comparing chromedb and go-rod when taking screenshots.
https://github.com/chromedp/chromedp vs https://github.com/go-rod/rod, using https://tranco-list.eu/
For the results below, false means there was no error taking the screenshot.
I was curious about how hard it would be to implement something like pypipe[1] in go. Turns out, not that hard.
[1] https://github.com/bugen/pypipe
$ echo "foo bar" | go run main.go 4
1. The door order that must be achieved to successfully allow the team to infiltrate the building is: [door_3, door_0, door_4, door_1, door_2] and must be sequential. | |
2. The coils for the doors have restricted access on the Modbus network and can not be written. | |
3. The sensors are hardwired to coils, thus driving the coil will result in the sensor signal being altered. | |
4. SYSTEM REST: Upon mission completion, the system will reset after approximately two minutes. | |
5. FLAG: the flag will be available on the holding registers starting at address 4 upon completion of the mission. |
The image in this tweet is needed to solve this challenge: https://twitter.com/leonjza/status/1678419863436443648
These files are an example setup to have Tailscale webhooks deliver to a Telegram channel with https://github.com/adnanh/webhook fronted with Traefik, protected with an HTTP basic authentication setup.
Get a set of credentials to populate in the in the traefik.http.middlewares.basic-auth.basicauth.users
label with htpasswd -Bn user
. Remember to double escape the $
sign.
Then, in the Tailscale administrator console, add a new webhook endpoint that would point to something like https://user:pass@webhook.domain.com/hooks/tailscale
after configuring your docker-compose.yml
file appropriately.
# search h1 bounty programs | |
# | |
# 2023 @leonjza | |
# | |
# you need to grab a cookie and x-csrf-token value. | |
# one way to do that is (without auth): | |
# | |
# 1. browse to https://hackerone.com/directory/programs | |
# 2. open the console | |
# 3. search something |
diff --git a/docker/entrypoint.sh b/docker/entrypoint.sh | |
index 78571d9..765b13f 100644 | |
--- a/docker/entrypoint.sh | |
+++ b/docker/entrypoint.sh | |
@@ -1,55 +1,28 @@ | |
#!/bin/sh | |
+# Modified version of | |
+# https://github.com/xjasonlyu/tun2socks/blob/main/docker/entrypoint.sh | |
+ |
#!/usr/bin/env python3 | |
# | |
# original: https://gist.github.com/joswr1ght/595d49d5a7914cf7305b73512f37186a | |
import sys | |
def countips(netblock): | |
v = netblock.split('/') | |
# nothing? |
Forwards a remote iOS device, exposed via usbmuxd on Linux to a local macOS client.
The inverse (aka ssh -R) is left as an excercise to the reader, but shouldn't be too hard :)
This is basically a simple usbfluxd that only depends on socat.
Copy the bash script to a local file, say fwd_ios.sh
and make it executable with chmod +x fwd_ios.sh
.