Skip to content

Instantly share code, notes, and snippets.

<?xml version="1.0" encoding="UTF-8"?>
<opml version="1.1">
<head>
<title>sethforprivacy-subscriptions.opml</title>
</head>
<body>
<outline text="Bitcoin" title="Bitcoin">
<outline text="@lightcoin" title="@lightcoin" description="" type="rss" version="RSS" htmlUrl="https://lightco.in/" xmlUrl="https://lightco.in/feed/"/>
<outline text="6102bitcoin" title="6102bitcoin" description="" type="rss" version="RSS" htmlUrl="https://6102bitcoin.com" xmlUrl="https://6102bitcoin.com/index.xml"/>
<outline text="Athena Alpha" title="Athena Alpha" description="" type="rss" version="RSS" htmlUrl="https://www.athena-alpha.com/" xmlUrl="https://www.athena-alpha.com/feed/"/>
@theotherside
theotherside / octal_x86.txt
Created February 19, 2022 14:47 — forked from seanjensengrey/octal_x86.txt
x86 is an octal machine
# source:http://reocities.com/SiliconValley/heights/7052/opcode.txt
From: mark@omnifest.uwm.edu (Mark Hopkins)
Newsgroups: alt.lang.asm
Subject: A Summary of the 80486 Opcodes and Instructions
(1) The 80x86 is an Octal Machine
This is a follow-up and revision of an article posted in alt.lang.asm on
7-5-92 concerning the 80x86 instruction encoding.
The only proper way to understand 80x86 coding is to realize that ALL 80x86

How to setup a practically free CDN

I've been using [Backblaze][bbz] for a while now as my online backup service. I have used a few others in the past. None were particularly satisfactory until Backblaze came along.

It was - still is - keenly priced at a flat $5 (£4) per month for unlimited backup (I've currently got just under half a terabyte backed-up). It has a fast, reliable client. The company itself is [transparent about their operations][trans] and [generous with their knowledge sharing][blog]. To me, this says they understand their customers well. I've never had reliability problems and everything about the outfit exudes a sense of simple, quick, solid quality. The service has even saved the day on a couple of occasions where I've lost files.

Safe to say, I'm a happy customer. If you're not already using Backblaze, [I highly recommend you do][recommend].

Taking on the big boys with B2

@theotherside
theotherside / phoenix.c
Created April 22, 2021 13:48 — forked from Siguza/phoenix.c
Phœnix exploit / iOS 9.3.5
// Bugs by NSO Group / Ian Beer.
// Exploit by Siguza & tihmstar.
// Thanks also to Max Bazaliy.
#include <stdint.h> // uint32_t, uint64_t
#include <stdio.h> // fprintf, stderr
#include <string.h> // memcpy, memset, strncmp
#include <unistd.h> // getpid
#include <mach/mach.h>
#include <stdlib.h>
@theotherside
theotherside / uninstall.py
Created July 21, 2020 14:17 — forked from Areizen/uninstall.py
Uninstall Device administrator applications
#!/usr/bin/python3
import frida
import subprocess
import sys
if len(sys.argv) !=2:
print(f"[-] Usage : python3 {sys.argv[0]} <package_to_uninstall>")
sys.exit(-1)
def message(message, data):
# run in satellite/api/examples directory
# note 0bin.net pasting requires zerobinpaste tool
# https://github.com/sametmax/0bin/blob/master/docs/.build/html/_sources/en/zerobinpaste_tool.txt
import time
from watchdog.observers import Observer
from watchdog.events import FileSystemEventHandler
import tweepy
import glob
import os
import subprocess
@theotherside
theotherside / windows_hardening.cmd
Created May 12, 2020 11:42 — forked from mackwage/windows_hardening.cmd
Script to perform some hardening of Windows OS
:: Windows 10 Hardening Script
:: This is based mostly on my own personal research and testing. My objective is to secure/harden Windows 10 as much as possible while not impacting usability at all. (Think being able to run on this computer's of family members so secure them but not increase the chances of them having to call you to troubleshoot something related to it later on). References for virtually all settings can be found at the bottom. Just before the references section, you will always find several security settings commented out as they could lead to compatibility issues in common consumer setups but they're worth considering.
:: Obligatory 'views are my own'. :)
:: Thank you @jaredhaight for the Win Firewall config recommendations!
:: Thank you @ricardojba for the DLL Safe Order Search reg key!
:: Thank you @jessicaknotts for the help on testing Exploit Guard configs and checking privacy settings!
:: Best script I've found for Debloating Windows 10: https://github.com/Sycnex/Windows10Debloater
:
@theotherside
theotherside / _Instructions_Reproduce.md
Created April 29, 2020 11:55
GhostLoader - AppDomainManager - Injection - 攻壳机动队

GhostLoader Steps :)

1. Create C:\Tools
2. Copy Some .NET, any .NET binary to C:\Tools
3. In this example, we use FileHistory.exe, but any .NET app will do.
4. Ensure FileHistory.exe.config is in the same path
5. Execute C:\Tools\FileHistory.exe
@theotherside
theotherside / T2.keys
Created March 16, 2020 11:44 — forked from xerub/T2.keys
=== iBridge2,1,iBridge2,3,iBridge2,4,iBridge2,5,iBridge2,7,iBridge2,8_3.5_16P5200_Restore.ipsw
Firmware/dfu/iBEC.j137.RELEASE.im4p
3723c95ba25706b4650a92177afc28af57e0a236fd0e46b83cffb6140392b63355562b5ed671bda6b5929ff728f0b324
Firmware/dfu/iBSS.j140k.RELEASE.im4p
34d7aa36e00b5c772bf7381c821253a714ed2714552a48a478b391faac32bc0eef2577d5a04e01f462648754eb9af69e
Firmware/dfu/iBSS.j137.RELEASE.im4p
4bb3ecf8b19401a009b5c0003b64ac3bae8258f6d9c42b91831927e348957dfde01384caa3fbee1b6e665d168b46fc47
Firmware/dfu/iBEC.j680.RELEASE.im4p
893d17aa768a6ebd8f85b4251ef8f692c766f7b1868bd974a3dc9fcd0dd9608e4e0709bd9208752d9515a636c129378c
@theotherside
theotherside / keybase.md
Created January 27, 2020 20:01
keybase.md

Keybase proof

I hereby claim:

  • I am theotherside on github.
  • I am theotherside (https://keybase.io/theotherside) on keybase.
  • I have a public key ASAuiSbcYY_FFKbzhlqw_bHzd5yacKh7sES1pCpZsNDMkAo

To claim this, I am signing this object: