Skip to content

Instantly share code, notes, and snippets.

View scramblr's full-sized avatar
🎯
Focusing

scramblr scramblr

🎯
Focusing
View GitHub Profile
@scramblr
scramblr / browser.devtools.cheatsheet.md
Last active January 10, 2026 22:51
Browser Cheat Sheet For Devtools and Other "Advanced Developer" Functionality (Chrome, Firefox, and More)

Web Browser Cheat Sheets by SCRAMBLR

Document Last Updated: 12/27/2025

Chrome & Chromium-Based Browsers (Edge, Opera, Brave, Vivaldi)

1.) Ways To Filter Out Specific Types of Files and Extensions From The Network Tab (Like Images, Videos, Etc.)

This is especially useful for when you want to scroll down the items under "Network" tab and keep losing focus whenever an image or other binary-style file comes up, and the cursor moves over to the hex dump..
  • Method 1: Use this regex for the Network Tab's Filter: /-*.svg$/ /-*.png$/ /-*.jpg$/ /-*.ico$/ /-*.gif$/ /-*.woff[2]$/
@scramblr
scramblr / an5500-jailbreak.md
Last active December 24, 2025 12:11 — forked from up-n-atom/an5500-jailbreak.md
Axon Networks AN5500 Jailbreak

ℹ️ Last Updated: December 24 2025 by scramblr. Originally put together by UP-N-ATOM who can be found here: up-n-atom's github

ℹ️ The vulnerability & hacking method was originally discussed and confirmed with the help of https://discord.pon.wiki

ℹ️ A document Changelog has been established and can be found at the bottom of this document.

AXON NETWORKS AN5500 (C5500XK) JAILBREAK

This Device Jailbreak Is Accomplished via Rooting The Device with a PRIVILEGE ESCALATION Exploit Found in DHCP.

#!/usr/bin/python3
#
# spooftest.py version v1.2
# USAGE:
# server# chmod a+x spooftest.py
# server# ./spooftest.py <dest server> <num of packets to send>
#
#
# This is a small, simple script to test your server's abilities to spoof IPv4 packets or not.
# You should use this instead of things like caida project's tool, because they're rumored to
@scramblr
scramblr / testing.for.spoofing.without.caida
Last active June 7, 2024 13:01
Testing for IPHM (IP Header Modification) AKA IP Spoofing WITHOUT CAIDA
------------------[ Requirements to test for IP Spoofing ]------------------
1.) Server (Throw-Away) That Simply needs to run tcpdump.
2.) Server that you suspect/hope can IP Spoof AKA has IPHM IP Header Modification turned on.
On both servers we'll be running:
apt-get update
apt-get install net-tools bind9-dnsutils inetutils-tools tcpdump graphviz python3-scapy -y
apt-get install python3-scapy -y
- OR -
yum update
#!/usr/bin/python
#
# This is a small, simple script to test your server's abilities to spoof IPv4 packets or not.
# You should use this instead of things like caida project's tool, because they're rumored to
# collect data or hand it off to others who harass the server/network owners until they re-configure
# their networks and discontinue allowing spoofed packets.
#
# By default, this script sends spoofed packets to fuzzme.packet.tel - but it can be configured to
# send them anywhere. You can download a constantly running pcap by typing:
# wget http://fuzzme.packet.tel/fuzzme.packet.tel.last10minutes.pcap
@citizenrich
citizenrich / stuff.md
Last active August 31, 2022 14:28
pybombs on macos with python3.7

pybombs:

cd
rm -rf .pybombs
rm -rf prefix
pip3 install pybombs
# a lot of other deps are installed but not listed
pybombs recipes add gr-recipes git+https://github.com/gnuradio/gr-recipes.git  
pybombs recipes add gr-etcetera git+https://github.com/gnuradio/gr-etcetera.git
@philomuzzi
philomuzzi / dnsmasq.conf
Created January 11, 2015 03:57
dnsmasq.conf
#dwb收集整理
#索尼系列主机加速
address=/www.ign.com/63.219.18.170
address=/assets.ign.com/63.219.18.170
address=/assets1.ignimgs.com/63.219.18.170
address=/.ww.np.dl.playstation.net/63.219.18.170
address=/a0.ww.np.dl.playstation.net/23.49.148.62
address=/a1.ww.np.dl.playstation.net/23.49.148.62
address=/gs-sec.ww.np.dl.playstation.net/23.49.148.62