Looks like 1Password 8 only allows you to export whole organsations with all the vaults you have access to. Exporting to .1pux format means you can use this script to separate vaults into their own exports.
./separate.sh 1password_export.1pux
I was curious about how hard it would be to implement something like pypipe[1] in go. Turns out, not that hard.
[1] https://github.com/bugen/pypipe
$ echo "foo bar" | go run main.go 4
1. The door order that must be achieved to successfully allow the team to infiltrate the building is: [door_3, door_0, door_4, door_1, door_2] and must be sequential. | |
2. The coils for the doors have restricted access on the Modbus network and can not be written. | |
3. The sensors are hardwired to coils, thus driving the coil will result in the sensor signal being altered. | |
4. SYSTEM REST: Upon mission completion, the system will reset after approximately two minutes. | |
5. FLAG: the flag will be available on the holding registers starting at address 4 upon completion of the mission. |
The image in this tweet is needed to solve this challenge: https://twitter.com/leonjza/status/1678419863436443648
These files are an example setup to have Tailscale webhooks deliver to a Telegram channel with https://github.com/adnanh/webhook fronted with Traefik, protected with an HTTP basic authentication setup.
Get a set of credentials to populate in the in the traefik.http.middlewares.basic-auth.basicauth.users
label with htpasswd -Bn user
. Remember to double escape the $
sign.
Then, in the Tailscale administrator console, add a new webhook endpoint that would point to something like https://user:pass@webhook.domain.com/hooks/tailscale
after configuring your docker-compose.yml
file appropriately.
# search h1 bounty programs | |
# | |
# 2023 @leonjza | |
# | |
# you need to grab a cookie and x-csrf-token value. | |
# one way to do that is (without auth): | |
# | |
# 1. browse to https://hackerone.com/directory/programs | |
# 2. open the console | |
# 3. search something |
diff --git a/docker/entrypoint.sh b/docker/entrypoint.sh | |
index 78571d9..765b13f 100644 | |
--- a/docker/entrypoint.sh | |
+++ b/docker/entrypoint.sh | |
@@ -1,55 +1,28 @@ | |
#!/bin/sh | |
+# Modified version of | |
+# https://github.com/xjasonlyu/tun2socks/blob/main/docker/entrypoint.sh | |
+ |
#!/usr/bin/env python3 | |
# | |
# original: https://gist.github.com/joswr1ght/595d49d5a7914cf7305b73512f37186a | |
import sys | |
def countips(netblock): | |
v = netblock.split('/') | |
# nothing? |
Forwards a remote iOS device, exposed via usbmuxd on Linux to a local macOS client.
The inverse (aka ssh -R) is left as an excercise to the reader, but shouldn't be too hard :)
This is basically a simple usbfluxd that only depends on socat.
Copy the bash script to a local file, say fwd_ios.sh
and make it executable with chmod +x fwd_ios.sh
.
#!/bin/bash | |
# simple script to enable remote management via an ssh | |
set -e | |
if [ "$EUID" -ne 0 ] | |
then echo "please run as root (eg: sudo $0)" | |
exit | |
fi |