Skip to content

Instantly share code, notes, and snippets.

@sh4dowb
sh4dowb / selenium-save-profile-session.py
Last active Apr 4, 2020
workaround for selenium to save the goddamn session / profile completely on firefox / geckodriver --- selenium firefox geckodriver persistent profile
View selenium-save-profile-session.py
# Selenium does not use the given profile, but copies it, and uses a temporary profile.
# As a result, new cookies and sessions etc. are not saved.
# To fix it, we get the actual profile firefox is using, kill firefox manually so geckodriver
# doesn't delete profile data. Copying the profile when it's being used is generally not a good idea.
# After killing firefox profile and databases are unlocked, we copy the "temporary" profile
# to our old profile.
#
# driver.profile doesn't provide the actual temporary profile, but another copy of it. And firefox
# does not use that one. that's why I got it from process list.
#
@sh4dowb
sh4dowb / phpkoru.deobfuscate.php
Created Mar 25, 2020
PHPkoru.com deobfuscator. Make sure to run it isolated, to prevent any attacks from eval'd code
View phpkoru.deobfuscate.php
<?php
$input = file_get_contents("untitled.php");
//edit this filename
$fge_ebg13 = "str_rot13";
$onfr64_qrpbqr = "base64_decode";
$eha_pbqr = "cnVuX2NvZGU=";
@sh4dowb
sh4dowb / format_btc.php
Created Nov 15, 2019
PHP fade/mute zeroes in decimals
View format_btc.php
<?php
function formatBtc($val){
$val = number_format($val, 8); // round to 8 decimal points
$rtval = rtrim($val, "0"); // get rid of zeroes at the end
$x = strlen($val) - strlen($rtval); // get how many zeroes were deleted
if($x > 0){
$rtval .= '<span style="color:#ffffff6f;">'; // start a "faded" <span>
// or try class="text-muted" for bootstrap
for($i = 0;$i < $x;$i++) // add deleted zeroes back
$rtval .= "0";
@sh4dowb
sh4dowb / captcha_readme.txt
Last active Nov 15, 2019
PHP simple high performance captcha (uses memcache)
View captcha_readme.txt
Include AHGBold.tff
Run memcached at default port (11211)
Example captcha: https://i.ibb.co/sPQjW0K/index.png
@sh4dowb
sh4dowb / ilce-listesi.json
Last active Feb 24, 2020
UETDS Eşya Taşımacılığı Ülke ve İlçe Listesi JSON
View ilce-listesi.json
[
{"kod":99133,"il_kodu":"1","ad":"Şakirpaşa Havalimanı","il_adi":"ADANA"},
{"kod":2033,"il_kodu":"1","ad":"ÇUKUROVA","il_adi":"ADANA"},
{"kod":2032,"il_kodu":"1","ad":"SARIÇAM","il_adi":"ADANA"},
{"kod":1806,"il_kodu":"1","ad":"İMAMOĞLU","il_adi":"ADANA"},
{"kod":1757,"il_kodu":"1","ad":"ALADAĞ","il_adi":"ADANA"},
{"kod":1748,"il_kodu":"1","ad":"YÜREĞİR","il_adi":"ADANA"},
{"kod":1734,"il_kodu":"1","ad":"YUMURTALIK","il_adi":"ADANA"},
{"kod":1687,"il_kodu":"1","ad":"TUFANBEYLİ","il_adi":"ADANA"},
{"kod":1588,"il_kodu":"1","ad":"SAİMBEYLİ","il_adi":"ADANA"},
@sh4dowb
sh4dowb / ud64_deobfuscator.php
Created Sep 4, 2019
UD64 Deobfuscator / Unknowndevice64 PHP obfuscation deobfuscator
View ud64_deobfuscator.php
<html>
<head>
<meta charset="UTF-8">
<style>*{font-family:Arial;}a{text-decoration:none;}</style>
<link rel="stylesheet" href="https://unpkg.com/purecss@1.0.0/build/base-min.css">
<meta name="description" content="UD64, Unknowndevice64 deobfuscator/decrypter.">
<meta name="keywords" content="ud64 deobfuscate, ud64 cleaner, ud64 beautifier, ud64 decrypt">
<title>UD64 - Unknowndevice64 Deobfuscator</title>
<body>
<center>
@sh4dowb
sh4dowb / retrieve_password.py
Created Sep 1, 2019
Chromium Linux Password Retriever (Decryption support)
View retrieve_password.py
# source: https://stackoverflow.com/questions/23153159/decrypting-chromium-cookies
# just put a few answers together for a working script
# python3 retrieve_password.py
# outputs passwords.csv
import secretstorage
import sqlite3
import os
import csv
from Crypto.Cipher import AES
@sh4dowb
sh4dowb / turkey_city_county_list.json
Created Jul 6, 2019
Türkiye İl ve İlçe Listesi Plakalı JSON Güncel 2019 - Turkey City and County List with Plate Numbers JSON 2019
View turkey_city_county_list.json
[
{
"city": "Adana",
"plate_code": 1,
"counties": [
"Aladağ",
"Ceyhan",
"Çukurova",
"Feke",
"İmamoğlu",
View keybase.md

Keybase proof

I hereby claim:

  • I am sh4dowb on github.
  • I am sh4dowb (https://keybase.io/sh4dowb) on keybase.
  • I have a public key whose fingerprint is 235F EC18 2625 0A10 BC7B CE98 C063 2563 2475 8B9D

To claim this, I am signing this object:

@sh4dowb
sh4dowb / README
Last active Aug 22, 2021
satellite_track.py and site source code for https://cagriari.com/satellite/
View README
needs;
rtl_fm
sox
wxtoimg (https://wxtoimgrestored.xyz/beta/wxtoimg-armhf-2.11.2-beta.deb)
wxmap on your server for map generation (https://wxtoimgrestored.xyz/beta/wxtoimg-amd64-2.11.2-beta.deb)
(because wxmap on ARM is not working, at least for me)
python3
requests
noaa-apt
n2yo account and api key