config/packages/security.yaml
security:
firewalls:
main:
logout:
path: logout
csrf_parameter: token
csrf_token_generator: security.csrf.token_manager| cd ~/Library/Android/sdk/platform-tools/ | |
| # Get the hash of the mitmproxy-ca certificate. | |
| openssl x509 -inform PEM -subject_hash_old -in ~/.mitmproxy/mitmproxy-ca.pem | head -1 | |
| # We will use this hash value, append '.0' (dot zero) and use this as the filename for the resulting Android certificate | |
| cat ~/.mitmproxy/mitmproxy-ca.pem > c8750f0d.0 | |
| openssl x509 -inform PEM -text -in ~/.mitmproxy/mitmproxy-ca.pem -out /dev/null >> c8750f0d.0 | |
| # In an other terminal, we will start the emulator with writable /system volume |
| // $ frida -l antiroot.js -U -f com.example.app --no-pause | |
| // CHANGELOG by Pichaya Morimoto ([email protected]): | |
| // - I added extra whitelisted items to deal with the latest versions | |
| // of RootBeer/Cordova iRoot as of August 6, 2019 | |
| // - The original one just fucked up (kill itself) if Magisk is installed lol | |
| // Credit & Originally written by: https://codeshare.frida.re/@dzonerzy/fridantiroot/ | |
| // If this isn't working in the future, check console logs, rootbeer src, or libtool-checker.so | |
| Java.perform(function() { | |
| var RootPackages = ["com.noshufou.android.su", "com.noshufou.android.su.elite", "eu.chainfire.supersu", |
| # Create a pod containing the PHP-FPM application (my-php-app) | |
| # and nginx, each mounting the `shared-files` volume to their | |
| # respective /var/www/html directories. | |
| kind: Pod | |
| apiVersion: v1 | |
| metadata: | |
| name: phpfpm-nginx-example | |
| spec: | |
| volumes: |
I’m looking for any tips or tricks for making chrome headless mode less detectable. Here is what I’ve done so far:
Set my args as follows:
const run = (async () => {
const args = [
'--no-sandbox',
'--disable-setuid-sandbox',
'--disable-infobars',| SELECT table, | |
| formatReadableSize(sum(bytes)) as size, | |
| min(min_date) as min_date, | |
| max(max_date) as max_date | |
| FROM system.parts | |
| WHERE active | |
| GROUP BY table |
| ## | |
| ## How to install mcrypt in php7.2 / php7.3 | |
| ## Linux / MacOS / OSX | |
| ## | |
| ## https://lukasmestan.com/install-mcrypt-extension-in-php7-2/ | |
| # |
| # | |
| # Run `make ENVIRONMENT=machinename` to override the default | |
| # | |
| ENVIRONMENT=default | |
| TLS_VERIFY=$(shell docker-machine env $(ENVIRONMENT) | grep 'DOCKER_TLS_VERIFY=".*"' | cut -d\" -f2) | |
| HOST=$(shell docker-machine env $(ENVIRONMENT) | grep 'DOCKER_HOST=".*"' | cut -d\" -f2) | |
| CERT_PATH=$(shell docker-machine env $(ENVIRONMENT) | grep 'DOCKER_CERT_PATH=".*"' | cut -d\" -f2) | |
| MACHINE_NAME=$(shell docker-machine env $(ENVIRONMENT) | grep 'DOCKER_MACHINE_NAME=".*"' | cut -d\" -f2) | |
| DOCKER_MACHINE_NAME=$(MACHINE_NAME) | |
| DOCKER_TLS_VERIFY=$(TLS_VERIFY) |
| kubectl get pods | grep Evicted | awk '{print $1}' | xargs kubectl delete pod |
| FROM nginx:alpine | |
| # stock verison from php:alpine image | |
| # ensure www-data user exists | |
| RUN set -x \ | |
| && addgroup -g 82 -S www-data \ | |
| && adduser -u 82 -D -S -G www-data www-data | |
| # 82 is the standard uid/gid for "www-data" in Alpine | |
| # http://git.alpinelinux.org/cgit/aports/tree/main/apache2/apache2.pre-install?h=v3.3.2 |