Skip to content

Instantly share code, notes, and snippets.

View niilante's full-sized avatar
🌊
I'm a builder more than a Mason

Richard Nii Lante Lawson niilante

🌊
I'm a builder more than a Mason
View GitHub Profile
<html>
<head>
<title>API Example</title>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<script src="http://ajax.googleapis.com/ajax/libs/jquery/2.1.1/jquery.min.js"></script>
<script type="text/javascript">
var accessToken = "<your agent's client access token>";
var baseUrl = "https://api.api.ai/v1/";
<?php
namespace App\Console\Commands;
use Illuminate\Console\Command;
class ScrapeFunko extends Command
{
/**
* The name and signature of the console command.
@niilante
niilante / FirebasePhoneAuthIonicV3.md
Created October 21, 2018 03:08 — forked from kkrishnan90/FirebasePhoneAuthIonicV3.md
Firebase Phone Auth using Ionic V3 - Sending and reading OTP

General Steps to be followed as a flow process to complete Firebase Phone OTP Auth in Ionic V3

Step 1 : Get the phone number through input from the user. Step 2 : Pass this phone number to the firebase and receive a callback with verification ID. Step 3 : Pass on this verification ID through navParams to the next page where the user will enter the OTP sent to the entered mobile number. Step 4 : Verify the OTP that is sent with firebase for success() or failure() .

STEP 1 & 2 & 3

phone-verification.html

@niilante
niilante / Zsh
Created December 28, 2019 01:33 — forked from sarthaksavvy/Zsh
Terminal Alias
export DEFAULT_USER="$(whoami)"
# Alias for composer
alias cr=composer
alias cri="composer install"
alias crd="composer dump-autoload"
alias cru="composer update"
# Alias for artisan commands
alias pa="php artisan"
@niilante
niilante / database.rules.json
Created April 22, 2020 22:57 — forked from codediodeio/database.rules.json
Common Database Rules for Firebase
// No Security
{
"rules": {
".read": true,
".write": true
}
}
@niilante
niilante / KMS_office.cmd
Created June 3, 2020 08:29 — forked from CHEF-KOCH/KMS_office.cmd
KMS server Windows
@echo off
title Microsoft Office 2019 versions are supported!&cls&echo
============================================================================&echo
#Project: Activating Microsoft software products for FREE without software&echo
============================================================================&echo.&echo
#Supported products:&echo - Microsoft Office Standard 2019&echo - Microsoft Office Professional Plus 2019&echo.&echo.&(if exist
"%ProgramFiles%\Microsoft Office\Office16\ospp.vbs" cd /d "%ProgramFiles%\Microsoft Office\Office16")&(if exist
"%ProgramFiles(x86)%\Microsoft Office\Office16\ospp.vbs" cd /d "%ProgramFiles(x86)%\Microsoft Office\Office16")&(for /f %%x in ('dir /b
..\root\Licenses16\ProPlus2019VL*.xrm-ms') do cscript ospp.vbs /inslic:"..\root\Licenses16\%%x" >nul)&(for /f %%x in ('dir /b
..\root\Licenses16\ProPlus2019VL*.xrm-ms') do cscript ospp.vbs /inslic:"..\root\Licenses16\%%x" >nul)&echo.&echo
#!/bin/bash
COUNTER=1
SOURCE="source:/folder"
DESTINATION="destination:/folder"
while [ $COUNTER -lt 100 ]; do
Researchers are easily able to hack WhatsApp and Telegram using the known telecom flaw
We continuously receive queries from readers about how to hack WhatsApp. The world’s most popular cross platform messaging App is seen to be ultimate hack by many because it has recently enabled 256-bit encryption.
For ordinary souls this encryption would take days and months to decode a sentence or a complete message. Ditto with another secure messaging service called Telegram. Though Telegram is not as popular as WhatsApp, it has its ardent group of followers who use it for its encryption as well as snooping free service.
Though both of these Apps are end-to-end encrypted both of them suffer from hardware side vulnerability which can be exploited to hack and hijack both WhatsApp and Telegram.
The vulnerability lies in Signalling System 7, or SS7, the technology used by telecom operators, on which the highly secure messaging system and telephone calls rely. SS7 is a set of telephony signalling protocols developed i
http://www.hidemyass.com/proxylist/
http://www.samair.ru/proxy/
http://www.proxy4free.com/page1.html
http://www.stayinvisible.com/
http://www.proxz.com/
Unlock Locked Pattern Without Losing Data!
Requirements:
- Aroma File Manager
- A memory card for device.
- Your android device must be either locked by pattern lock or password lock.
How To?
1. After you download “Aroma File Manager” place it in your card [SD CARD] Insert card into your locked android device.