转自: https://fann.im/blog/2018/05/15/app-store-front-code/
X-Apple-Store-Front header is needed to scrape in App Store.
// 29 or 26 or 9
CN 143465-19,29
US 143441-1,29
JP 143462-9,29
KR 143466-13,29
转自: https://fann.im/blog/2018/05/15/app-store-front-code/
X-Apple-Store-Front header is needed to scrape in App Store.
// 29 or 26 or 9
CN 143465-19,29
US 143441-1,29
JP 143462-9,29
KR 143466-13,29
| // ==UserScript== | |
| // @name bypass tiktok block | |
| // @namespace http://tampermonkey.net/ | |
| // @version 2025-01-19 | |
| // @description replaces the `store-country-code` cookie with a non-US one | |
| // @author jj | |
| // @match https://www.tiktok.com/* | |
| // @icon https://www.google.com/s2/favicons?sz=64&domain=tiktok.com | |
| // @grant GM_cookie | |
| // ==/UserScript== |
| import requests | |
| import getpass | |
| import argparse | |
| import threading | |
| import json | |
| import requests | |
| from bs4 import BeautifulSoup | |
| import re | |
| import json | |
| import urllib3 |
| import requests | |
| import re | |
| class Twitter: | |
| def __init__(self): | |
| self.s = requests.Session() | |
| self.get_tokens() | |
| def get_tokens(self): |
| // MIT License | |
| // | |
| // Copyright (c) 2019 Simon Lightfoot | |
| // | |
| // Permission is hereby granted, free of charge, to any person obtaining a copy | |
| // of this software and associated documentation files (the "Software"), to deal | |
| // in the Software without restriction, including without limitation the rights | |
| // to use, copy, modify, merge, publish, distribute, sublicense, and/or sell | |
| // copies of the Software, and to permit persons to whom the Software is | |
| // furnished to do so, subject to the following conditions: |
| // Giant List of Negative Porn Keywords To Exclude From Google Adwords | |
| adult film | |
| adult movie | |
| adult video | |
| anal | |
| ass | |
| bara | |
| barely legal | |
| bdsm | |
| bestiality |
| // Load presentation | |
| Presentation pres = new Presentation("mytextone.pptx"); | |
| string strToFind = "search string"; | |
| string strToReplaceWith = "replace string"; | |
| // Loop through each slide | |
| foreach (Slide slide in pres.Slides) | |
| { | |
| // Get all text frames in the slide |
| class Helpers { | |
| constructor() { | |
| this.cvt_buf = new ArrayBuffer(8); | |
| this.cvt_f64a = new Float64Array(this.cvt_buf); | |
| this.cvt_u64a = new BigUint64Array(this.cvt_buf); | |
| this.cvt_u32a = new Uint32Array(this.cvt_buf); | |
| } | |
| ftoi(f) { |
| '/Applications/Google Chrome.app/Contents/MacOS/Google Chrome' --disable-xss-auditor --enable-devtools-experiments --disable-features=enable-automatic-password-saving |
This is a note for myself describing various Visual Basic macros construction strategies that could be used for remote code execution via malicious Document vector. Nothing new or fancy here, just a list of techniques, tools and scripts collected in one place for a quick glimpse of an eye before setting a payload.
All of the below examples had been generated for using as a remote address: 192.168.56.101.
List: