Some notes and tools for reverse engineering / deobfuscating / unminifying obfuscated web app code.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| list of ai sites | |
| ChatGPT | |
| There are many websites and online resources related to artificial intelligence (AI). Here is a list of some popular AI-related websites and platforms as of my last knowledge update in January 2022. Please note that the availability and popularity of websites can change over time, so it's a good idea to verify their current status and relevance: | |
| OpenAI (https://openai.com): OpenAI is known for developing advanced AI models and technologies. They provide research papers, news, and information about their projects. | |
| TensorFlow (https://www.tensorflow.org): TensorFlow is an open-source machine learning framework developed by Google. Their website includes documentation, tutorials, and resources for AI and machine learning. | |
| PyTorch (https://pytorch.org): PyTorch is an open-source deep learning framework developed by Facebook's AI Research lab. The website offers documentation, tutorials, and resources for PyTorch users. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| # !!!注意!!!: | |
| # このスクリプトはCドライブ配下のファイル・フォルダを探索するため「システムに負荷がかかる場合があります」 | |
| # 実行は自己責任でお願いします。 | |
| # 使い方: | |
| # powershell -ExecutionPolicy Bypass -File .\Scan-Bundle.ps1 <start_directory> | |
| param( | |
| [Parameter(Mandatory = $true)] | |
| [string]$TargetDirectory | |
| ) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/bin/bash | |
| # Prompts the user for a URL if not provided as a command-line argument. | |
| # Extracts the ID from the given URL to use in API requests. | |
| function promptForURL() { | |
| local url="$1" | |
| until [ -n "$url" ]; do | |
| read -p "URL: " url | |
| done | |
| id=$(sed 's|.*gofile.io/d/||g' <<< "$url") |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/bin/bash | |
| url="$1" | |
| #prompt for url if not provided | |
| until [ ! -z "$url" ] ; do | |
| read -p "url=" url | |
| done | |
| id=$(sed 's|.*gofile.io/d/||g' <<< "$url") |
This script allow for user specific message deletion from an entire server or a single channel using the browser console. This script uses discord search API and it will only delete messages of a chosen user.
Go to user settings > appearance in discord and enable Developer mode.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| 𝐋𝐢𝐬𝐭 𝐨𝐟 𝟓𝟎 𝐓𝐨𝐩 𝐃𝐢𝐠𝐢𝐭𝐚𝐥 𝐅𝐨𝐫𝐞𝐧𝐬𝐢𝐜𝐬 𝐓𝐎𝐎𝐋𝐒 . | |
| 1. Autopsy: https://www.autopsy.com/ | |
| 2. EnCase: https://lnkd.in/dRwh9VwZ | |
| 3. AccessData Forensic Toolkit (FTK): https://lnkd.in/dwhkAFKt | |
| 4. X-Ways Forensics: https://www.x-ways.net/ | |
| 5. Sleuth Kit: https://www.sleuthkit.org/ | |
| 6. Volatility: https://lnkd.in/dXX7-Vwc | |
| 7. Wireshark: https://www.wireshark.org/ | |
| 8. Cellebrite UFED: https://lnkd.in/dqm7x8cs |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| ============================================================================ | |
| https://www.sans.org/tools/ | |
| ============================================================================ | |
| FTK Imager, ANJP, EZ Tools, SIFT, Regripper, Windows Event Log Explorer, Volatility, Plaso, DensityScout, SigCheck | |
| ============================================================================ | |
| Live System Analysis for computers with Windows 10 operating system with tools such as Sysinternals, Powershell, WM | |
| Collecting triage data and parsing methods with KAPE | |
| Physical Imaging with FTK Imager | |
| Logical Imaging with FTK Imager | |
| Memory Imaging with FTK Imager, DumpIT, WinPmem |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| // ==UserScript== | |
| // @name Jitai | |
| // @version 1.3.2 | |
| // @description Display WaniKani reviews in randomized fonts, for more varied reading training. | |
| // @author Samuel (@obskyr) | |
| // @copyright 2016-2018, obskyr | |
| // @license MIT | |
| // @namespace http://obskyr.io/ | |
| // @homepageURL https://gist.github.com/obskyr/9f3c77cf6bf663792c6e | |
| // @icon http://i.imgur.com/qyuR9bD.png |
NewerOlder
