Some notes, tools, and techniques for reverse engineering macOS binaries.
Discover gists
| # GitHub Copilot Instructions for React and Next.js Projects | |
| This file provides guidelines for GitHub Copilot to ensure consistent, clean, and performant code generation for React and Next.js applications. | |
| ## General Principles | |
| - **Clean Code:** Prioritize **readability, maintainability, and reusability**. | |
| - **Conciseness:** Aim for concise and expressive code. | |
| - **Descriptive Naming:** Use clear and descriptive names for variables, functions, components, and files (e.g., `getUserProfile`, `ProductCard`, `useAuth`). | |
| - **DRY (Don't Repeat Yourself):** Extract reusable logic into functions, custom hooks, or components. |
| #!/usr/bin/env python3 | |
| import hashlib | |
| import json | |
| import os | |
| import shlex | |
| import shutil | |
| import subprocess | |
| import sys | |
| from typing import Optional |
Ref: https://rnsaffn.com/poison3/
Functions are set up for Netlify, but should work with some refactoring on other platforms.
pffunction, this function serves up poisoned data to anyone that visits (/.netlify/functions/pf)import type { Handler } from '@netlify/functions'; const URL = 'https://RNSAFFN.com/poison2/';
To enable Poison Fountain for Apache on RHEL/CentOS, copy the poison_fountain.conf file in this gist
to /etc/httpd/conf.d/poison_fountain.conf
(if you've already configured mod_proxy then omit the two LoadModule lines).
Then tell SELinux that apache is allowed to make outbound http requests by running:
setsebool -P httpd_can_network_connect on
Then restart apache:
As a security professional, it is important to conduct a thorough reconnaissance. With the increasing use of APIs nowadays, it has become paramount to keep access tokens and other API-related secrets secure in order to prevent leaks. However, despite technological advances, human error remains a factor, and many developers still unknowingly hardcode their API secrets into source code and commit them to public repositories. GitHub, being a widely popular platform for public code repositories, may inadvertently host such leaked secrets. To help identify these vulnerabilities, I have created a comprehensive search list using powerful search syntax that enables the search of thousands of leaked keys and secrets in a single search.
(path:*.{File_extension1} OR path:*.{File_extension-N}) AND ({Keyname1} OR {Keyname-N}) AND (({Signature/pattern1} OR {Signature/pattern-N}) AND ({PlatformTag1} OR {PlatformTag-N}))
**1.
This document provides a comprehensive guide for creating Orchestrator Agents in OpenCode. Based on the reference implementation (@agent/orchestrator.md), this guide details the structure, patterns, and best practices for building intelligent routing agents.
An Orchestrator Agent serves as a central dispatch system. Unlike standard agents that execute tasks, an orchestrator's sole purpose is to analyze user requests and delegate work to specialized subagents.
Running games through Steam's Proton is great. But what if there is a secondary exe or configuration application bundled with the game? How can you launch it if Steam itself only launches the game?
Simply run this command in a terminal:
cd /path/to/steam/steamapps/compatdata/20920/pfx
STEAM_COMPAT_DATA_PATH="/path/to/steam/steamapps/compatdata/20920" WINEPREFIX=$PWD \
"$HOME/.steam/root/steamapps/common/Proton 5.0/proton" run ./drive_c/path/to/custom_application.exe