Skip to content

Instantly share code, notes, and snippets.

@showmethemoney2022
showmethemoney2022 / install.sh
Created April 24, 2018 17:36 — forked from nksCH/install.sh
installing theos on device and some other tools
export $THEOS=/var/theos
apt-get install nano vim -y --force-yes
echo "deb https://coolstar.org/publicrepo/ ./" >> /etc/apt/sources.list.d/cydia.list
echo "deb http://nix.howett.net/theos/ ./" >> /etc/apt/sources.list.d/cydia.list
apt-get update
apt-get upgrade
apt-get install nano vim -y --force-yes
apt-get install perl net.howett.theos org.coolstar.iostoolchain curl top screen wget -y --force-yes
echo "export $THEOS=/var/theos" >> /root/.bash_login
mkdir -p $THEOS/sdks
@showmethemoney2022
showmethemoney2022 / douyinsig.py
Created May 2, 2018 12:58 — forked from a232319779/douyinsig.py
douyin checksum calc.
# -*- coding: utf-8 -*-
# @Time : 2017/12/23 16:07
# @Author : ddvv
# @Site :
# @File : douyincore.py
# @Software: PyCharm
import hashlib
class calcSig(object):

Generating Authy passwords on other authenticators


There is an increasing count of applications which use Authy for two-factor authentication. However many users who aren't using Authy, have their own authenticator setup up already and do not wish to use two applications for generating passwords.

Since I use 1Password for all of my password storing/generating needs, I was looking for a solution to use Authy passwords on that. I couldn't find any completely working solutions, however I stumbled upon a gist by Brian Hartvigsen. His post had a neat code with it to generate QR codes for you to use on your favorite authenticator.

His method is to extract the secret keys using Authy's Google Chrome app via Developer Tools. If this was not possible, I guess people would be reverse engineering the Android app or something like that. But when I tried that code, nothing appeared on the screen. My guess is that Brian used the

@showmethemoney2022
showmethemoney2022 / hijack.c
Created August 16, 2021 15:18 — forked from knightsc/hijack.c
Example of how to hijack a thread on macOS to run code in a remote process
#include <stdio.h>
#include <stdlib.h>
#include <sys/stat.h>
#include <unistd.h>
#include <mach/mach.h>
#include <mach/mach_vm.h>
#include <dlfcn.h>
#include <objc/runtime.h>
@showmethemoney2022
showmethemoney2022 / inject.c
Created August 18, 2021 04:48 — forked from knightsc/inject.c
An example of how to inject code to call dlopen and load a dylib into a remote mach task. Tested on 10.13.6 and 10.14.3
#include <dlfcn.h>
#include <stdio.h>
#include <unistd.h>
#include <sys/types.h>
#include <mach/mach.h>
#include <mach/error.h>
#include <errno.h>
#include <stdlib.h>
#include <sys/sysctl.h>
#include <sys/mman.h>
/* eslint-disable prefer-const */
import md5 from 'blueimp-md5'
import bigInt from 'big-integer'
class MyRsa {
constructor () {
// this.n = BigInt('0x8686980c0f5a24c4b9d43020cd2c22703ff3f450756529058b1cf88f09b8602136477198a6e2683149659bd122c33592fdb5ad47944ad1ea4d36c6b172aad6338c3bb6ac6227502d010993ac967d1aef00f0c8e038de2e4d3bc2ec368af2e9f10a6f1eda4f7262f136420c07c331b871bf139f74f3010e3c4fe57df3afb71683')
// this.e = BigInt('0x10001')
this.n = bigInt('8686980c0f5a24c4b9d43020cd2c22703ff3f450756529058b1cf88f09b8602136477198a6e2683149659bd122c33592fdb5ad47944ad1ea4d36c6b172aad6338c3bb6ac6227502d010993ac967d1aef00f0c8e038de2e4d3bc2ec368af2e9f10a6f1eda4f7262f136420c07c331b871bf139f74f3010e3c4fe57df3afb71683', 16)
this.e = bigInt('10001', 16)