Skip to content

Instantly share code, notes, and snippets.

View scramblr's full-sized avatar
🎯
Focusing

scramblr scramblr

🎯
Focusing
View GitHub Profile
@scramblr
scramblr / browser.devtools.cheatsheet.md
Last active December 27, 2025 19:49
Browser Cheat Sheet For Devtools and Other "Advanced Developer" Functionality (Chrome, Firefox, and More)

Web Browser Cheat Sheets by SCRAMBLR

Document Last Updated: 12/27/2025

Chrome & Chromium-Based Browsers (Edge, Opera, Brave, Vivaldi)

1.) Ways To Filter Out Specific Types of Files and Extensions From The Network Tab (Like Images, Videos, Etc.)

This is especially useful for when you want to scroll down the items under "Network" tab and keep losing focus whenever an image or other binary-style file comes up, and the cursor moves over to the hex dump..
  • Method 1: Use this regex for the Network Tab's Filter: /-*.svg$/ /-*.png$/ /-*.jpg$/ /-*.ico$/ /-*.gif$/ /-*.woff[2]$/
@scramblr
scramblr / chrome.devtools.cheatsheet.md
Last active December 27, 2025 13:04
A list of frequently used options or syntax for DevTools in Chrome/Chromium

#Web Browser Cheat Sheets#

Chrome & Chromium Based Browsers (Edge, Opera, Brave, Vivaldi)

Here's a starting point for my personal Chrome/Chromium Cheatsheet Last Updated: 12/267/2025

###1.) Filtering Out Images & Other files that make it so you can't "Arrow Down" through the requests found on the Network Page###

  • Method 1: Use this regex for the Network Tab's Filter: /-.svg$/ /-.png$/ /-.jpg$/ /-.ico$/ /-.gif$/ /-.woff[0-9]$/
  • Method 2: This regex works better and negative filters everything, leaving it visible if needed by checking the "Invert" box:
@scramblr
scramblr / an5500-jailbreak.md
Last active December 24, 2025 12:11 — forked from up-n-atom/an5500-jailbreak.md
Axon Networks AN5500 Jailbreak

ℹ️ Last Updated: December 24 2025 by scramblr. Originally put together by UP-N-ATOM who can be found here: up-n-atom's github

ℹ️ The vulnerability & hacking method was originally discussed and confirmed with the help of https://discord.pon.wiki

ℹ️ A document Changelog has been established and can be found at the bottom of this document.

AXON NETWORKS AN5500 (C5500XK) JAILBREAK

This Device Jailbreak Is Accomplished via Rooting The Device with a PRIVILEGE ESCALATION Exploit Found in DHCP.

http://[2a01:4f8:c012:8025::1]:8080/announce
http://[2a04:ac00:1:3dd8::1:2710]:2710/announce
http://1337.abcvg.info:80/announce
http://207.241.226.111:6969/announce
http://207.241.231.226:6969/announce
http://49.12.76.8:8080/announce
http://aboutbeautifulgallopinghorsesinthegreenpasture.online:80/announce
http://bittorrent-tracker.e-n-c-r-y-p-t.net:1337/announce
http://bt.okmp3.ru:2710/announce
http://bvarf.tracker.sh:2086/announce
#!/usr/bin/python3
#
# spooftest.py version v1.2
# USAGE:
# server# chmod a+x spooftest.py
# server# ./spooftest.py <dest server> <num of packets to send>
#
#
# This is a small, simple script to test your server's abilities to spoof IPv4 packets or not.
# You should use this instead of things like caida project's tool, because they're rumored to
@scramblr
scramblr / testing.for.spoofing.without.caida
Last active June 7, 2024 13:01
Testing for IPHM (IP Header Modification) AKA IP Spoofing WITHOUT CAIDA
------------------[ Requirements to test for IP Spoofing ]------------------
1.) Server (Throw-Away) That Simply needs to run tcpdump.
2.) Server that you suspect/hope can IP Spoof AKA has IPHM IP Header Modification turned on.
On both servers we'll be running:
apt-get update
apt-get install net-tools bind9-dnsutils inetutils-tools tcpdump graphviz python3-scapy -y
apt-get install python3-scapy -y
- OR -
yum update
@scramblr
scramblr / public.torrent.trackers.april.2024.txt
Created April 5, 2024 16:51
Large.List.Of.Public.Trackers
udp://tracker.dler.com:6969/announce
udp://exodus.desync.com:6969/announce
http://t.acg.rip:6699/announce
http://tracker.files.fm:6969/announce
https://tracker.tamersunion.org:443/announce
https://trackers.mlsub.net:443/announce
udp://ipv6.fuuuuuck.com:6969/announce
udp://ec2-18-191-163-220.us-east-2.compute.amazonaws.com:6969/announce
udp://tracker.0x7c0.com:6969/announce
udp://tracker.fnix.net:6969/announce
@scramblr
scramblr / index.php
Last active December 24, 2025 12:17
IP Echo Server Written in PHP - Including Geographic Lookup
<?php
// Retrieve client IP address, preferring HTTP_X_FORWARDED_FOR if available
$client_ip = $_SERVER['HTTP_X_FORWARDED_FOR'] ?? $_SERVER['REMOTE_ADDR'] ?? 'UNKNOWN';
$remote_addr = htmlspecialchars($_SERVER['REMOTE_ADDR'] ?? '');
$remote_port = htmlspecialchars($_SERVER['REMOTE_PORT'] ?? '');
$remote_user = htmlspecialchars($_SERVER['REMOTE_USER'] ?? '');
$redirect_remote_user = htmlspecialchars($_SERVER['REDIRECT_REMOTE_USER'] ?? '');
$http_user_agent = htmlspecialchars($_SERVER['HTTP_USER_AGENT'] ?? '');
// Perform Lookup on PTR (Reverse DNS) Record for Remote IP Address
open -na "Google Chrome Canary" --args --user-data-dir=/Users/dave/.burp-chrome --allow-insecure-localhost --allow-running-insecure-content --disable-add-to-shelf --disable-background-networking --disable-bundled-ppapi-flash --disable-captive-portal-bypass-proxy --disable-clear-browsing-data-counters --disable-client-side-phishing-detection --disable-cloud-import --disable-component-cloud-policy --disable-component-extensions-with-background-pages --disable-component-update --disable-contextual-search --disable-datasaver-prompt --disable-default-apps --disable-device-discovery-notifications --disable-dinosaur-easter-egg --disable-domain-reliability --disable-eol-notification --disable-extensions-http-throttling --disable-http2 --disable-logging --disable-login-animations --disable-network-portal-notification --disable-ntp-popular-sites --disable-offer-upload-credit-cards --disable-office-editing-component-extension --disable-offline-auto-reload --disable-offline-auto-reload-visible-only --disable-password-gen
#!/bin/sh
#
# This is a small Twilio Lookup Script by me, SCRAMBLR. It's a work in progress
# and I'll be adding more functionality soon. The first major thing I'll be adding
# is the ability to pick and choose which features you deploy on each request, as
# some are way more expensive than others.
#
# This started out as a small sideproject/script for myself, but I figure the community
# might find it useful. If not, fuck you! ;)
#