Skip to content

Instantly share code, notes, and snippets.

@incogbyte
incogbyte / encoding_waf_evasion.py
Created January 27, 2025 11:28
Python script that generates diff encodings techniques. Those techniques can be used to bypass HTTP WAF.
import urllib.parse
"""
By @incogbyte
Python script that generates diff encodings techniques.
Those techniques can be used to bypass HTTP WAF.
"""
def generate_encodings(input_string):
encodings = {}
@mjkstra
mjkstra / arch_linux_installation_guide.md
Last active November 10, 2025 22:56
A modern, updated installation guide for Arch Linux with BTRFS on an UEFI system
@KaoRz
KaoRz / avr.cfg
Last active August 23, 2022 02:23
IDA - AVR configuration for ATtiny85
.ATtiny85
; IDA avr configuration for ATtiny85 (Author: @KaoRz)
; Documentation: https://www.microchip.com/en-us/product/ATTINY85
SUBARCH=25
RAM=512 ; SRAM: 512 bytes
ROM=8192 ; Flash: 8 KB
EEPROM=512 ; EEPROM: 512 bytes
@sekcompsci
sekcompsci / Comparison Espressif ESP MCUs.md
Last active October 26, 2025 11:39 — forked from fabianoriccardi/Comparison Espressif ESP MCUs.md
Comparison chips (SoCs) table for ESP8266/ESP32/ESP32-S2/ESP32-S3/ESP32-C3/ESP32-C6. Forked from @fabianoriccardi

Comparison chips (SoCs) table for ESP8266/ESP32/ESP32-S2/ESP32-S3/ESP32-C3/ESP32-C6

A minimal table to compare the Espressif's MCU families.

ESP8266 ESP32 ESP32-S2 ESP32-S3 ESP32-C3 ESP32-C6
Announcement Date 2014, August 2016, September 2019, September 2020, December
Cheef's Grand APDU List Smartcard Selected Information APDU list
Reference: http://web.archive.org/web/20090630004017/http://cheef.ru/docs/HowTo/APDU.info
#------------+------------------------+------------------------+----------------------+--------------------------------+
|ClaIns P1 P2|Lc Send Data |Le Recv Data | Specification | Description |
+------------+------------------------+------------------------+----------------------+--------------------------------+
| 04 | ISO 7816-9 6.3 | DEACTIVATE FILE |
| A0 04 00 00 00 | 3GPP TS 11.11 | INVALIDATE |
| A0 04 00 00 00 | SAGEM SCT U34 6.15 | INVALIDATE |
+------------+------------------------+------------------------+----------------------+--------------------------------+
@c3mdigital
c3mdigital / plugin.php
Last active October 24, 2021 02:10 — forked from joncave/plugin.php
<?php
/* Plugin Name: Damn Vulnerable WordPress Plugin
* Description: Intentionally vulnerable plugin for plugin author education
* Version: 0.1
* Plugin URI: http://make.wordpress.org/plugins/2013/04/09/intentionally-vulnerable-plugin/
* Author: Jon Cave
* Author URI: http://joncave.co.uk
* License: GPLv2+
*
* DO NOT RUN THIS PLUGIN ON AN INTERNET ACCESSIBLE SITE