Skip to content

Instantly share code, notes, and snippets.

{
"created_at": "Mon May 30 07:55:10 +0000 2016",
"id": 737190602110963712,
"id_str": "737190602110963712",
"text": "URL shorteners. Again. Everyone with an inch of clue said these things were a bad idea from day 1. https:\/\/t.co\/R7AHg9Iltx",
"truncated": false,
"entities": {
"hashtags": [],
"symbols": [],
"user_mentions": [],
@nikcub
nikcub / README.md
Created May 4, 2016 22:06
Twitter refined Greasemonkey / user script

Chrome install - drag + drop onto extensions window at chrome://extensions

@nikcub
nikcub / README.md
Last active April 11, 2016 19:14
Wordpress Plugin Example Found Exploit
@nikcub
nikcub / sr2.md
Last active April 5, 2016 15:44
Silk Road 2.0 Unmasking Timeline

Silk Road 2.0 Unmasking Timeline

Legal docs at: http://files.nikcub.com/sr/

18 Feb 2014 - BlackHat Call for Papers opens [[1][1]]

04 Apr 2014 - BlackHat call for papers closes [[1][1]]

21 May 2014 - "You don't have to be the NSA to break Tor: Deanonymizing users on a buget" appears on BlackHat schedule [[2][2]]

@nikcub
nikcub / gist:7767735
Created December 3, 2013 11:33
vBulletin 5.0.0 all Beta releases SQL Injection Exploit 0day
vBulletin 5.0.0 all Beta releases SQL Injection Exploit 0day
#Category: web application
#Type: SQL Injection
#Requirements: Firefox/Live HTTP Headers/
#Dork: Powered by vBulletin™ Version 5.0.0 Beta (or) Use ur Brain you'll get more o_O
Step 1
Create an Account on vBulletin forum Verify the account and Activate it
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG/MacGPG2 v2.0.20 (Darwin)
Comment: GPGTools - https://gpgtools.org
mQMuBFJU3swRCADbRVdSEXGq7+TfRZG5N0WML4g0BJUSk92Yvm9hbLZBG4QZ90Ud
cr5TrM2gclOq5KL3DeSBqgX8d3o67d6fkIAAu70BObg2LcammEFUIxRPpkYgtnBr
MMJByXxUVE3ZX3z2Uc/8LHjYLSRJvzsVImLa85sNpNB58GVeTbqFdVYohOunsjpO
2vNlNK3yVBwqqi/stq+9cDexDkr4WXeBtuc0AiROF3Ar1KYeRyGB8nzXQfOFxr8q
xe7KQ89Sf9O8kf1ktlCNnb0MmTPPAMvM6hnWRtJuOxynM3AZyiOJqN+hod0QsN6y
twnLc6ZJ8jADCd0XFo0k7m3bTNHs5MiKXC+rAQChIlwunQqEXdlqUeT7xRNiseeb
repost of my comment on Facebook here: https://www.facebook.com/lisapadilla/posts/627211503961250?comment_id=7377112&offset=0&total_comments=45

for those that don't have permission to view it.

I'll go on the record in this thread to say that I lived in the same house as Arrington for the entire time he dated Jenn. I never once saw even a hint of physical abuse, let alone rape or any of the other things that have been suggested. He broke off the relationship and she was extremely attached to him and jealous of his new relationships. I have screen shots of previous Facebook posts Jenn has made where she has aired dirty laundry. She deleted at least one of those messages. Every time I have spoken to and caught up with Mike in the past few years he has mentioned the ongoing problem he has with her. I won't go into the details of what he told me, but I will say that I am very very skeptical of the post she made. Infact, when she made the post I immediately took a screenshot of it and emailed it to mike w

@nikcub
nikcub / gist:4696417
Created February 2, 2013 07:20
Twitter revoke all OAuth
go to settings > applications and paste the following javascript into your browser console or the address bar:
javascript:var a=document.querySelectorAll('button.revoke');for(var i=0, len=a.length; i<len; i++) { if(a[i].innerHTML=="Revoke access"){a[i].click();};
that will automatically click 'revoke' for all the applications
not that some browsers, such as chrome, will remove the 'javascript:' part if you paste it in, just type it back in and press enter. leave the browser open for 15-20 seconds and then refresh
@nikcub
nikcub / gist:4696395
Last active December 12, 2015 02:08
remove all twitter oauth
<h3>Step 1</h3>
<p>Visit the Twitter settings page for OAuth applications by going to Settings > Applications or https://twitter.com/settings/applications</p>
<p>Paste the following Javascript into your browser URL bar and hit enter</p>
<pre>javascript:var a=document.querySelectorAll('button.revoke');for(var i=0, len=a.length; i<len; i++) { if(a[i].innerHTML=="Revoke access"){a[i].click();};</pre>
<p>Note: Some browsers, such as 'chrome' will remove the javascript: part of that URL when you paste it in. Just type it back in.</p>
@nikcub
nikcub / terms-popup.txt
Created January 20, 2013 07:57
Mega popup terms
MEGA LIMITED TERMS OF SERVICE ("TERMS")
1. Welcome to MEGA. We are an Internet services provider and provide services made available at our website at https://mega.co.nz, subdomains and related sites ("website"), which enables users (depending which MEGA plan they are on), amongst other things, to encrypt by way of user controlled encryption ("UCE"), use our application programming interface ("API"), upload, store, manage, download and decrypt files, information, material and other data ("data") and give access to that data to others (all together, services). If you have questions about how to use our services or the great things you can do with Mega, see our FAQ first.
2. These terms are binding and apply to any use of the services and website by you and anyone that you allow to access your data or our services. By using our services or the website, you and they irrevocably agree to these terms. If you do not like these terms or don't want to be bound, you can't use our services and the website.
3. We can