Skip to content

Instantly share code, notes, and snippets.

View witchfindertr's full-sized avatar
🏠
Germany

witchfindertr

🏠
Germany
  • london
View GitHub Profile
@witchfindertr
witchfindertr / AppStore_API.md
Created February 5, 2025 21:54 — forked from jaoye/AppStore_API.md
[AppStore API] AppStore API #AppStore
// ==UserScript==
// @name bypass tiktok block
// @namespace http://tampermonkey.net/
// @version 2025-01-19
// @description replaces the `store-country-code` cookie with a non-US one
// @author jj
// @match https://www.tiktok.com/*
// @icon https://www.google.com/s2/favicons?sz=64&domain=tiktok.com
// @grant GM_cookie
// ==/UserScript==
@witchfindertr
witchfindertr / engelle.py
Created April 28, 2024 07:51 — forked from cometothed4rkside/engelle.py
Twitter'da troll engellemek için python kodları
import requests
import getpass
import argparse
import threading
import json
import requests
from bs4 import BeautifulSoup
import re
import json
import urllib3
@witchfindertr
witchfindertr / Twitter Guest Search.py
Created April 28, 2024 07:42 — forked from K0lb3/Twitter Guest Search.py
public Twitter search as json
import requests
import re
class Twitter:
def __init__(self):
self.s = requests.Session()
self.get_tokens()
def get_tokens(self):
@witchfindertr
witchfindertr / page_turn.dart
Created August 29, 2023 18:13 — forked from slightfoot/page_turn.dart
Page Turn Effect - By Simon Lightfoot. Replicating this behaviour. https://www.youtube.com/watch?v=JqvtZwIJMLo
// MIT License
//
// Copyright (c) 2019 Simon Lightfoot
//
// Permission is hereby granted, free of charge, to any person obtaining a copy
// of this software and associated documentation files (the "Software"), to deal
// in the Software without restriction, including without limitation the rights
// to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
// copies of the Software, and to permit persons to whom the Software is
// furnished to do so, subject to the following conditions:
@witchfindertr
witchfindertr / negative-keywords-porn.js
Created May 18, 2022 23:04 — forked from jonathonbyrdziak/negative-keywords-porn.js
Giant List of Negative Porn Keywords To Exclude From Google Adwords
// Giant List of Negative Porn Keywords To Exclude From Google Adwords
adult film
adult movie
adult video
anal
ass
bara
barely legal
bdsm
bestiality
@witchfindertr
witchfindertr / find-replace-text-in-PowerPoint.cs
Created November 15, 2021 13:49 — forked from aspose-com-gists/find-replace-text-in-PowerPoint.cs
Find and Replace Text in PowerPoint Presentation using C#
// Load presentation
Presentation pres = new Presentation("mytextone.pptx");
string strToFind = "search string";
string strToReplaceWith = "replace string";
// Loop through each slide
foreach (Slide slide in pres.Slides)
{
// Get all text frames in the slide
class Helpers {
constructor() {
this.cvt_buf = new ArrayBuffer(8);
this.cvt_f64a = new Float64Array(this.cvt_buf);
this.cvt_u64a = new BigUint64Array(this.cvt_buf);
this.cvt_u32a = new Uint32Array(this.cvt_buf);
}
ftoi(f) {
@witchfindertr
witchfindertr / disable-xss-auditor.sh
Created March 6, 2021 11:39 — forked from mbijon/disable-xss-auditor.sh
CLI command to start Chrome with XSS Auditor disabled. Use for XSS/security testing
'/Applications/Google Chrome.app/Contents/MacOS/Google Chrome' --disable-xss-auditor --enable-devtools-experiments --disable-features=enable-automatic-password-saving
@witchfindertr
witchfindertr / Various-Macro-Based-RCEs.md
Created December 27, 2020 16:49 — forked from mgeeky/Various-Macro-Based-RCEs.md
Various Visual Basic Macros-based Remote Code Execution techniques to get your meterpreter invoked on the infected machine.

This is a note for myself describing various Visual Basic macros construction strategies that could be used for remote code execution via malicious Document vector. Nothing new or fancy here, just a list of techniques, tools and scripts collected in one place for a quick glimpse of an eye before setting a payload.

All of the below examples had been generated for using as a remote address: 192.168.56.101.

List:

  1. Page substiution macro for luring user to click Enable Content
  2. The Unicorn Powershell based payload