You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
Instantly share code, notes, and snippets.
π€
Search, Hack and Dev
Doctor Who
Jiab77
π€
Search, Hack and Dev
Without hope, without witness, without reward. I'm just a ghost.
Running ADB on and from your own Android device -- Part 2
Running ADB on and from your own Android device -- Part 2
I guess if you are reading this, it's because you liked the first part of this gist π
I hope this second part will please you even more!
Note
Google have decided to force all developpers to register to a central authority. This will endanger projects and services like F-droid and so by extention IzzyOnDroid repo and the Droid-ify project.
>
Running ADB on and from your own Android device -- Part 1
Running ADB on and from your own Android device -- Part 1
Almost everybody knows how to run adb on remote devices but do you know that you can mostly use the same technique for running adb on your own device?
Caution
If you have no idea about what adb is for Android devices, then this gist is not made for you. You must have an advanced knowledge level about Android devices to continue.
Important
You must have Android 11 or later before continue. Previous versions don't have built-in wireless debugging support.
As the title says, and contrary to the myths, it is possible to control your medias from your Fitbit smartwatch and it's not complicated at all!
Control your medias from your Fitbit smartwatch
As the title says, and contrary to the myths, it is possible to control your medias from your Fitbit smartwatch and it's not complicated at all!
TL;DR
As long as the smartwatch firmware and the companion app on your mobile gives the possibility to send app notifications to the smartwatch, you can control your medias from it!
GitHub Search Syntax for Finding API Keys/Secrets/Tokens
As a security professional, it is important to conduct a thorough reconnaissance. With the increasing use of APIs nowadays, it has become paramount to keep access tokens and other API-related secrets secure in order to prevent leaks. However, despite technological advances, human error remains a factor, and many developers still unknowingly hardcode their API secrets into source code and commit them to public repositories. GitHub, being a widely popular platform for public code repositories, may inadvertently host such leaked secrets. To help identify these vulnerabilities, I have created a comprehensive search list using powerful search syntax that enables the search of thousands of leaked keys and secrets in a single search.
Search Syntax:
(path:*.{File_extension1} OR path:*.{File_extension-N}) AND ({Keyname1} OR {Keyname-N}) AND (({Signature/pattern1} OR {Signature/pattern-N}) AND ({PlatformTag1} OR {PlatformTag-N}))
If you are like me, lazy but able to get some crazy ideas sometime π then you might have wondered how to get your connected friends on Second Life without being forced to connect on their website.
Get connected friends on Second Life from terminal
If you are like me, lazy but able to get some crazy ideas sometime π then you might have wondered how to get your connected friends on Second Life without being forced to connect on their website.
I must admit that what I'm gonna explain is working only because Linden Labs have REALLY no clue about how security should be implemented correctly...
The above sentence is valid whatever you have enabled or not the MFA on your account.
For example, if a bad actor gets hands on your session cookie, nothing will avoid that bad actor to impersonate your account without any time limit!
The main reason why you would follow this gist is because by default the UPS detection tool nut-scanner is not available by default on Ubuntu 18.04 and can't be compiled correctly from source due to non standard library linking used that does not find the shared library even if it is correctly installed / loaded on the system.
Maybe you have been more lucky than me on your side and then you can simply leave this gist π but on my side every fix attempts resulted in: