172 private links
Rex eats regular expressions for breakfast. And so can you! This regex tutorial, one of the most detailed on the web, takes you all the way to mastery.
This page explains what makes this site special among all other regex sites, but first let's answer a burning question:
What is the meaning of life?
That's easy. As per the regex humor page, it's simply
^(?=(?!(.)\1)([^\DO:105-93+30])(?-1)(?<!\d(?<=(?![5-90-3])\d))).[^\WHY?]$
Now for the other burning question…
We ultimately architected UberEATS in much the same way as we would a regular React /Redux web app, eschewing iOS patterns and modules wherever possible. Fortunately for our needs and preferences, web concepts and technologies on the whole translate quite nicely to native development.
L'abandonware consiste à proposer en libre téléchargement d'anciens jeux qui ne sont plus disponibles dans le commerce à ce jour, et ce, depuis longtemps, et dont le service après-vente a été lui aussi abandonné
Il y a déjà de nombreux blogs uniques et passionnants qui donnent tout les bons conseils pour partir ailleurs. Il existe plein de blogs qui décrivent avec brio et émotion chaque merveille du monde à travers chacune des pérégrinations de leurs si différents auteurs.
Ici, il devrait juste s’agir, en courts billets, d’états d’esprit à l’escale, du caractère (extra)ordinaire de la déambulation. Il sera question d’élans, de transports, de stupeurs, de spleen, d’impatience … et de tout ce qui nous catapulte autour du monde.
How to get Switch Keys for Hactool/XCI Decrypting
by PRAGMA Jun 10, 2018 at 10:29 PM
TegraRcmSmash
A reimplementation of fusee-launcher in C++ for Windows platforms.
Lets you launch fusee/shofEL2 payloads to a USB connected Switch in RCM mode.
Chrome Bug: https://www.youtube.com/redirect?event=video_description&v=0uejy9aCNbI&redir_token=9G29Eg5j2LUdpcHnRWyjz7Bzz5V8MTU0MDE1MzEwNkAxNTQwMDY2NzA2&q=https%3A%2F%2Fbugs.chromium.org%2Fp%2Fchromium%2Fissues%2Fdetail%3Fid%3D841105
Orange Tsai: https://twitter.com/orange_8361
A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages! - CODE BLUE: https://www.youtube.com/watch?v=2MslLrPinm0
Slides: https://www.youtube.com/redirect?event=video_description&v=0uejy9aCNbI&redir_token=9G29Eg5j2LUdpcHnRWyjz7Bzz5V8MTU0MDE1MzEwNkAxNTQwMDY2NzA2&q=https%3A%2F%2Fwww.blackhat.com%2Fdocs%2Fus-17%2Fthursday%2Fus-17-Tsai-A-New-Era-Of-SSRF-Exploiting-URL-Parser-In-Trending-Programming-Languages.pdf
Le Piratage du télégraphe Chappe est un détournement du réseau de télégraphie optique entrepris par deux hommes d'affaires bordelais, Louis et François Blanc, entre 1834 et 1836, afin de connaître avant tout le monde la clôture des cours de la rente à la Bourse de Paris.
Le piratage a été rendu possible par la corruption d'un agent télégraphique de Tours, qui ajoutait discrètement le chiffre du cours aux messages envoyés par l'État.
La divulgation de cette manœuvre a contribué au vote de la loi de 1837 sur le monopole public des communications télégraphiques. Il s'agit peut-être d'un des premiers cas de hacking, les frères Blanc exploitant une faille structurelle dans un réseau de télécommunication.
Backup/Restore your Nand + Get your biskeys+tseckeys+keys.txt Guide
by Canna Jul 31, 2018 at 11:54 PM
This Multi Guide Will help you back up your nand, Backup your system information,
Restore your nand, and also Make exfat work on lower system versions.
Only use the files attached if your following my guide/thread
I also recommend you Backup your nand before any
modification of your system to make yourself a clean backup / A Virgin Nand
Also not to use auto rcm Until after your backup
You may also run the "hekate.bin" from your own dongle or method from the
"Payloads to be used with tegra.zip" if you do not wish to use TegraGui
Welcome to SwitchBrew,
a wiki dedicated to homebrew on the Nintendo Switch
Interactive online malware analysis service for dynamic and static research of most types of threats using any environments. Replaces a set of tools for research.
File tests each argument in an attempt to classify it. There are three sets of tests, performed in this order: filesystem tests, magic number tests, and language tests. The first test that succeeds causes the file type to be printed. The type printed will usually contain one of the words text (the file contains only printing characters and a few common control characters and is probably safe to read on an ASCII terminal), executable (the file contains the result of compiling a program in a form understandable to some UNIX kernel or another), or data meaning anything else (data is usually `binary' or non-printable). Exceptions are well-known file formats (core files, tar archives) that are known to contain binary data.
Rosetta Code is a programming chrestomathy site. The idea is to present solutions to the same task in as many different languages as possible, to demonstrate how languages are similar and different, and to aid a person with a grounding in one approach to a problem in learning another. Rosetta Code currently has 898 tasks, 221 draft tasks, and is aware of 704 languages, though we do not (and cannot) have solutions to every task in every language.
Sploitus is а convenient central place for identifying the newest exploits and finding attacks that exploit known vulnerabilities.
Find out what any acronym, abbreviation, or initialism stands for
With more than 1,000,000 human-edited definitions, Acronym Finder is the world's largest and most comprehensive dictionary of acronyms, abbreviations, and initialisms. Combined with the Acronym Attic, Acronym Finder contains more than 5 million acronyms and abbreviations. You can also search for more than 850,000 US and Canadian postal codes.
The OASIS Cyber Threat Intelligence (CTI) TC supports automated information sharing for cybersecurity situational awareness, real-time network defense, and sophisticated threat analysis. STIX and TAXII.
Write down a command-line to see the help text that matches each argument
Les logiciels libres ont aujourd'hui un rôle important dans le monde de la recherche scientifique. Dans le monde de l'entreprise et des administrations, ils tiennent une place de plus en plus importante. Cependant, leur diffusion sous des licences d'origine américaine comme la GNU GPL pose certaines questions de droit, engendrant des incertitudes qui peuvent dissuader des entreprises ou des organisations d'utiliser ou d'apporter leurs contributions aux logiciels libres.
Le CEA, le CNRS et Inria ont ainsi élaboré CeCILL, la première licence qui définit dans ce cadre les principes d'utilisation et de diffusion des logiciels libres tout en restant dans l'esprit de la GNU GPL.
The methodology used to create the SOC-CMM is a scientific research approach called Design Science Research. This type of research has a focus on bridging the gap between theory and practice and works well for areas that have not been extensively (scientifically) studied and clearly defined, as is the case for SOC capability and maturity. The goal of Design Research is the creation of a tangible result of the research effort. In this case, two artefacts were created: the SOC-CMM model, which is an abstract representation of SOCs and the self-assessment tool based on that model to evaluate capability maturity in a SOC.