Skip to content

Instantly share code, notes, and snippets.

@guest20
guest20 / mini-unit-test.js
Created August 19, 2025 13:48 — forked from marianoguerra/mini-unit-test.js
Mini Unit Test
export const test = (name, fn) => {
try {
console.group(name);
fn();
} catch (error) {
console.error(error);
} finally {
console.groupEnd();
}
};
@guest20
guest20 / kicad-diff-pcb.sh
Created July 24, 2025 06:26 — forked from todbot/kicad-diff-pcb.sh
Git diff for Kicad PCB layouts
#!/bin/bash
#
# kicad-diff-pcb -- Git diff for Kicad PCB layouts
# 22 Jul 2025 - @todbot / Tod Kurt
#
# Install steps:
# 1. Make sure `kicad-cli` is in your PATH
# 2. Save this file somewhere in your PATH, I prefer "~/bin"
# 3. Make this script executable: "chmod +x kicad-diff-pcb"
# 4. Add the following to your ~/.gitconfig
@guest20
guest20 / crkbd-programming-keyboard.md
Created May 25, 2025 00:43 — forked from fathulfahmy/crkbd-programming-keyboard.md
40 keys split keyboard layout made with programming in mind

Example 1:

image image image

Example 2:

layout0 layout1 layout2

@guest20
guest20 / windows_hardening.cmd
Created January 11, 2019 19:20 — forked from mackwage/windows_hardening.cmd
Script to perform some hardening of Windows OS
::
::#######################################################################
::
:: Change file associations to protect against common ransomware attacks
:: Note that if you legitimately use these extensions, like .bat, you will now need to execute them manually from cmd or powershell
:: Alternatively, you can right-click on them and hit 'Run as Administrator' but ensure it's a script you want to run :)
:: ---------------------
ftype htafile="%SystemRoot%\system32\NOTEPAD.EXE" "%1"
ftype WSHFile="%SystemRoot%\system32\NOTEPAD.EXE" "%1"
ftype batfile="%SystemRoot%\system32\NOTEPAD.EXE" "%1"
@guest20
guest20 / github_bugbountyhunting.md
Created October 8, 2017 16:49 — forked from EdOverflow/github_bugbountyhunting.md
My tips for finding security issues in GitHub projects.

GitHub for Bug Bounty Hunters

GitHub repositories can disclose all sorts of potentially valuable information for bug bounty hunters. The targets do not always have to be open source for there to be issues. Organization members and their open source projects can sometimes accidentally expose information that could be used against the target company. in this article I will give you a brief overview that should help you get started targeting GitHub repositories for vulnerabilities and for general recon.

Mass Cloning

You can just do your research on github.com, but I would suggest cloning all the target's repositories so that you can run your tests locally. I would highly recommend @mazen160's GitHubCloner. Just run the script and you should be good to go.

$ python githubcloner.py --org organization -o /tmp/output
@guest20
guest20 / lookupadmins.py
Created August 4, 2017 13:06 — forked from ropnop/lookupadmins.py
Python script using Impacket to enumerate local administrators over SAMR
#!/usr/bin/env python
#
# Title: lookupadmins.py
# Author: @ropnop
# Description: Python script using Impacket to query members of the builtin Administrators group through SAMR
# Similar in function to Get-NetLocalGroup from Powerview
# Won't work against Windows 10 Anniversary Edition unless you already have local admin
# See: http://www.securityweek.com/microsoft-experts-launch-anti-recon-tool-windows-10-server-2016
#
# Heavily based on original Impacket example scripts written by @agsolino and available here: https://github.com/CoreSecurity/impacket
@guest20
guest20 / goauth.pl
Last active March 2, 2017 21:16 — forked from throughnothing/goauth.pl
Google OAuth example with Mojolicious
use Mojolicious::Lite;
# Sample Google OAuth contacts app using Mojolicious
# For more info see:
# https://developers.google.com/google-apps/contacts/v3/
# https://developers.google.com/oauthplayground/
my $config = plugin Config => { default => {
# Google OAuth API Key Values
# Get yours from: https://code.google.com/apis/console#access